首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1488篇
  免费   85篇
  国内免费   37篇
化学   233篇
晶体学   9篇
力学   42篇
综合类   58篇
数学   708篇
物理学   560篇
  2024年   1篇
  2023年   40篇
  2022年   55篇
  2021年   59篇
  2020年   34篇
  2019年   38篇
  2018年   24篇
  2017年   61篇
  2016年   53篇
  2015年   44篇
  2014年   82篇
  2013年   128篇
  2012年   83篇
  2011年   79篇
  2010年   94篇
  2009年   98篇
  2008年   108篇
  2007年   95篇
  2006年   81篇
  2005年   45篇
  2004年   42篇
  2003年   38篇
  2002年   33篇
  2001年   23篇
  2000年   13篇
  1999年   15篇
  1998年   15篇
  1997年   14篇
  1996年   20篇
  1995年   9篇
  1994年   16篇
  1993年   4篇
  1992年   7篇
  1991年   10篇
  1990年   2篇
  1989年   5篇
  1988年   3篇
  1987年   3篇
  1986年   3篇
  1985年   4篇
  1984年   7篇
  1983年   8篇
  1982年   3篇
  1981年   3篇
  1978年   5篇
  1977年   2篇
  1969年   1篇
排序方式: 共有1610条查询结果,搜索用时 15 毫秒
61.
After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms, devices and systems. Moreover, we study existing trends, and establish a roadmap for future research in these areas.  相似文献   
62.
In present times, barcode decoders on mobile phones can extract the data content of QR codes. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. This new scheme designs the triple module groups based on the concept of the error correction capability. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. This designed scheme can provide secure and reliable applications for the QR system.  相似文献   
63.
64.
The high demand for lung transplants cannot be matched by an adequate number of lungs from donors. Since fully ex-novo lungs are far from being feasible, tissue engi-neering is actively considering implantation of engineered lungs where the devitalized structure of a donor is used as scaffold to be repopulated by stem cells of the receiv-ing patient. A decellularized donated lung is treated inside a bioreactor where transport through the tracheobronchial tree (TBT) will allow for both deposition of stem cells and nour-ishment for their subsequent growth, thus developing new lung tissue. The key concern is to set optimally the boundary conditions to utilize in the bioreactor. We propose a pre-dictive model of slow liquid ventilation, which combines a one-dimensional (1-D) mathematical model of the TBT and a solute deposition model strongly dependent on fluid velocity across the tree. With it, we were able to track and drive the concentration of a generic solute across the airways, look-ing for its optimal distribution. This was given by properly adjusting the pumps' regime serving the bioreactor. A feed-back system, created by coupling the two models, allowed us to derive the optimal pattern. The TBT model can be easily invertible, thus yielding a straightforward flow/pressure law at the inlet to optimize the efficiency of the bioreactor.  相似文献   
65.
A theoretical scheme is introduced to generate entangled network via Dzyaloshinskii-Moriya (DM) interaction. The dynamics of entanglement between different nodes, which is generated by direct or indirect interaction, is investigated. It is shown that, the direction of (DM) interaction and the locations of the nodes have a sensational effect on the degree of entanglement. The minimum entanglement generated between all the nodes is quantified. The upper and lower bounds of the entanglement depend on the direction of DM interaction, and the repetition of the behavior depends on the strength of DM. The generated entangled nodes are used as quantum channel to perform quantum teleportation, where it is shown that the fidelity of teleporting unknown information between the network members depends on the locations of the members.  相似文献   
66.
67.
A common business strategy to promote product adoption in software industry is to provide a free trial version with limited functionalities of the commercial product to increase the installed user base. The increase of user base will lead to higher value of the software because of positive network effects. However, offering a free trial version may cannibalize some demand of the commercial software. This paper examines the tradeoff between network effects and the cannibalization effect, and aims to uncover the conditions under which firms should introduce the free trial product. We find that when network intensity is strong, it is more profitable for a software monopoly to offer free trial than to segment the market with two versions of different qualities. In addition, this paper solves the joint decision problem of finding the optimal quality for the firm’s free trial software and the optimal price of its commercial product.  相似文献   
68.
The paper presents construction and principle of operation of passive IR detectors (PIR detectors) of a large detection range. Important virtue of these detectors is highly efficient detection of slowly moving or crawling people. The described here PIR detector detects crawling people at the distance of 140 m. To ensure high probability of detection of slowly moving objects, new method of signals analysis was applied. On the basis of the carried out real-time measurements, both probability of detection and false alarms were determined.  相似文献   
69.
In this paper, we present the design of a Polynomial Time Approximation Scheme (PTAS) for the Grade of Service Steiner Minimum Tree (GOSST) problem, which is known to be NP-Complete. Previous research has focused on geometric analyses and different approximation algorithms have been designed. We propose a PTAS that provides a polynomial time, near-optimal solution with performance ratio 1+. The GOSST problem has some important applications. In network design, a fundamental issue for the physical construction of a network structure is the interconnection of many communication sites with the best choice of the connecting lines and the best allocation of the transmission capacities over these lines. Good solutions should provide paths with enough communication capacities between any two sites, with the least network construction costs. Also, the GOSST problem has applications in transportation, for road constructions and some potential uses in CAD in terms of interconnecting the elements on a plane to provide enough flux between any two elements.  相似文献   
70.
For solving minimum cost flow problems, we develop a combinatorial interior point method based on a variant of the algorithm of Karmarkar, described in Gonzaga [3, 4]. Gonzaga proposes search directions generated by projecting certain directions onto the nullspace ofA. By the special combinatorial structure of networks any projection onto the nullspace ofA can be interpreted as a flow in the incremental graph ofG. In particular, to evaluate the new search direction, it is sufficient to choose a negative circuit subject to costs on the arcs depending on the current solution. That approach results in an O(mn 2 L) algorithm wherem denotes the number of vertices,n denotes the number of arcs, andL denotes the total length of the input data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号