首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2451篇
  免费   357篇
  国内免费   78篇
化学   271篇
晶体学   1篇
力学   43篇
综合类   49篇
数学   2230篇
物理学   292篇
  2024年   5篇
  2023年   32篇
  2022年   117篇
  2021年   126篇
  2020年   120篇
  2019年   120篇
  2018年   74篇
  2017年   125篇
  2016年   171篇
  2015年   80篇
  2014年   191篇
  2013年   202篇
  2012年   142篇
  2011年   152篇
  2010年   155篇
  2009年   151篇
  2008年   126篇
  2007年   155篇
  2006年   117篇
  2005年   94篇
  2004年   69篇
  2003年   64篇
  2002年   51篇
  2001年   43篇
  2000年   34篇
  1999年   25篇
  1998年   27篇
  1997年   14篇
  1996年   13篇
  1995年   12篇
  1994年   8篇
  1993年   11篇
  1992年   7篇
  1991年   8篇
  1990年   6篇
  1989年   2篇
  1988年   6篇
  1987年   2篇
  1986年   3篇
  1985年   6篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1981年   4篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
排序方式: 共有2886条查询结果,搜索用时 15 毫秒
111.
Some research on cyber risk has been conducted in the field of information technology, but virtually no research exists in the actuarial domain. As a first step toward a more profound actuarial discussion, we use multidimensional scaling and goodness-of-fit tests to analyze the distribution of data breach information. Our results show that different types of data breaches need to be modeled as distinct risk categories. For severity modeling, the log-skew-normal distribution provides promising results. The findings add to the recent discussion on the use of skewed distributions in actuarial modeling (Vernic, 2006; Bolancé et al., 2008; Eling, 2012). Moreover, they provide useful insights for actuaries working on the implementation of cyber insurance policies. We illustrate the usefulness of our results in two applications on risk measurement and pricing.  相似文献   
112.
本文将数据挖掘中的决策树分类方法运用到工程项目评标数据分析,从200多个天津市工程项目招投标打分数据中,随机抽取15个招投标项目中的67个承包商的评标专家打分数据进行分析,得到中标承包商技术和商务评分分界点,进而得到工程项目潜在风险的预警阈值,然后借助因子分析辨识出风险来源并进行预警。  相似文献   
113.
The aim of this paper is to analyse the operational response of a Synchronised Supply Chain (SSC). To do so, first a new mathematical model of a SSC is presented. An exhaustive Latin Square design of experiments is adopted in order to perform a boundary variation analysis of the main three parameters of the periodic review smoothing (SR) order-up-to policy: i.e., lead time, demand smoothing forecasting factor, and proportional controller of the replenishment rule. The model is then evaluated under a variety of performance measures based on internal process benefits and customer benefits. The main results of the analysis are: (I) SSC responds to violent changes in demand by resolving bullwhip effect and by creating stability in inventories under different parameter settings and (II) in a SSC, long production–distribution lead times could significantly affect customer service level. Both results have important consequences for the design and operation of supply chains.  相似文献   
114.
We observed the polymorphism distribution and coaction of uncoupling protein 3(UCP3)-55C/T,adiponectin(APN)+45T/G and tumor necrosis factor(TNF)-a-308G/A on the onset and development of T2DM in a North...  相似文献   
115.
In this paper we study a family of stochastic orders of random variables defined via the comparison of their percentile residual life functions. Some interpretations of these stochastic orders are given, and various properties of them are derived. The relationships to other stochastic orders are also studied. Finally, some applications in reliability theory and finance are described. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
116.
This article considers a Markov-dependent risk model with a constant dividend barrier. A system of integro-differential equations with boundary conditions satisfied by the expected discounted penalty function, with given initial environment state, is derived and solved. Explicit formulas for the discounted penalty function are obtained when the initial surplus is zero or when all the claim amount distributions are from rational family. In two state model, numerical illustrations with exponential claim amounts are given.  相似文献   
117.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology.  相似文献   
118.
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme.  相似文献   
119.
Let F be a distribution function (d.f.) on [0, ) with finite first moment m >0. We define the integrated tail distribution function F 1 of F by F 1(t)=m-1 0 t (1- F(u))du, t0. In this paper, we obtain sufficient conditions under which implications FSF 1S and F 1S FS hold, where S is the class of subexponential distributions.  相似文献   
120.
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a -VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号