首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1361篇
  免费   164篇
  国内免费   87篇
化学   303篇
晶体学   4篇
力学   574篇
综合类   35篇
数学   298篇
物理学   398篇
  2024年   5篇
  2023年   18篇
  2022年   44篇
  2021年   46篇
  2020年   42篇
  2019年   46篇
  2018年   35篇
  2017年   64篇
  2016年   58篇
  2015年   55篇
  2014年   67篇
  2013年   105篇
  2012年   67篇
  2011年   91篇
  2010年   47篇
  2009年   71篇
  2008年   55篇
  2007年   73篇
  2006年   75篇
  2005年   63篇
  2004年   68篇
  2003年   57篇
  2002年   47篇
  2001年   39篇
  2000年   43篇
  1999年   44篇
  1998年   47篇
  1997年   31篇
  1996年   29篇
  1995年   19篇
  1994年   14篇
  1993年   10篇
  1992年   6篇
  1991年   13篇
  1990年   4篇
  1989年   3篇
  1988年   3篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1982年   1篇
  1975年   1篇
排序方式: 共有1612条查询结果,搜索用时 15 毫秒
921.
In response to the rapid growth of credit-investigation data, data redundancy among credit-investigation agencies, privacy leakages of credit-investigation data subjects, and data security risks have been reported. This study proposes a privacy-protection scheme for a credit-investigation system based on blockchain technology, which realizes the secure sharing of credit-investigation data among multiple entities such as credit-investigation users, credit-investigation agencies, and cloud service providers. This scheme is based on blockchain technology to solve the problem of islanding of credit-investigation data and is based on zero-knowledge-proof technology, which works by submitting a proof to the smart contract to achieve anonymous identity authentication, ensuring that the identity privacy of credit-investigation users is not disclosed; this scheme is also based on searchable-symmetric-encryption technology to realize the retrieval of the ciphertext of the credit-investigation data. A security analysis showed that this scheme guarantees the confidentiality, the availability, the tamper-proofability, and the ciphertext searchability of credit-investigation data, as well as the fairness and anonymity of identity authentication in the credit-investigation data query. An efficiency analysis showed that, compared with similar identity-authentication schemes, the proof key of this scheme is smaller, and the verification time is shorter. Compared with similar ciphertext-retrieval schemes, the time for this scheme to generate indexes and trapdoors and return search results is significantly shorter.  相似文献   
922.
923.
This paper introduces a flux-limited scheme FLOCV for the overlapping control volume (OCV) approach to 2D steady and unsteady convection–diffusion problems on structured non-orthogonal grids. FLOCV switches from second- to first-order interpolation in the presence of extrema. Smooth switching between the two is ensured by weighted average second- and first-order upwind differencing, with the weights being dynamically determined. Five convective test problems are solved using this scheme and results are compared with known analytical solutions. It is found that FLOCV approximately retains second-order accuracy of the base discretization scheme on uniform grids and smooth non-uniform orthogonal grids. It is also found effective in removing oscillations for problems with discontinuities on both orthogonal and non-orthogonal grids, with little degradation of accuracy. © 1997 John Wiley & Sons, Ltd.  相似文献   
924.
Human interaction with the world is dominated by uncertainty. Probability theory is a valuable tool to face such uncertainty. According to the Bayesian definition, probabilities are personal beliefs. Experimental evidence supports the notion that human behavior is highly consistent with Bayesian probabilistic inference in both the sensory and motor and cognitive domain. All the higher-level psychophysical functions of our brain are believed to take the activities of interconnected and distributed networks of neurons in the neocortex as their physiological substrate. Neurons in the neocortex are organized in cortical columns that behave as fuzzy sets. Fuzzy sets theory has embraced uncertainty modeling when membership functions have been reinterpreted as possibility distributions. The terms of Bayes’ formula are conceivable as fuzzy sets and Bayes’ inference becomes a fuzzy inference. According to the QBism, quantum probabilities are also Bayesian. They are logical constructs rather than physical realities. It derives that the Born rule is nothing but a kind of Quantum Law of Total Probability. Wavefunctions and measurement operators are viewed epistemically. Both of them are similar to fuzzy sets. The new link that is established between fuzzy logic, neuroscience, and quantum mechanics through Bayesian probability could spark new ideas for the development of artificial intelligence and unconventional computing.  相似文献   
925.
The drug delivery system enables the release of the active pharmaceutical ingredient to achieve a desired therapeutic response. Conventional drug delivery systems (tablets, capsules, syrups, ointments, etc.) suffer from poor bioavailability and fluctuations in plasma drug level and are unable to achieve sustained release. Without an efficient delivery mechanism, the whole therapeutic process can be rendered useless. Moreover, the drug has to be delivered at a specified controlled rate and at the target site as precisely as possible to achieve maximum efficacy and safety. Controlled drug delivery systems are developed to combat the problems associated with conventional drug delivery. There has been a tremendous evolution in controlled drug delivery systems from the past two decades ranging from macro scale and nano scale to intelligent targeted delivery. The initial part of this review provides a basic understanding of drug delivery systems with an emphasis on the pharmacokinetics of the drug. It also discusses the conventional drug delivery systems and their limitations. Further, controlled drug delivery systems are discussed in detail with the design considerations, classifications and drawings. In addition, nano-drug delivery, targeted and smart drug delivery using stimuli-responsive and intelligent biomaterials is discussed with recent key findings. The paper concludes with the challenges faced and future directions in controlled drug delivery.  相似文献   
926.
We define a finite differences method for triangular grids and we show how to link it to a finite element method. From this new point of view we then analyze properties of the solution and convergence. © 1998 John Wiley & Sons, Inc. Numer Methods Partial Differential Eq 14: 567–579, 1998  相似文献   
927.
This paper presents a simple grid generation method which adopts the uni-directional interpolation idea but only interpolates one co-ordinate between two opposite boundaries. The use of this new scheme showed that (a) it is convenient to use; and (b) compared with the built-in grid generator of certain commercial computational fluid dynamics (CFD) code, it saves time significantly. © 1998 John Wiley & Sons, Ltd.  相似文献   
928.
A boundary conforming two-dimensional structured grid for the irregular domain of the world's ocean is generated numerically using differential equation techniques. It is calculated using block structured methods which allow the inclusion of all major bodies of water including seas and basins, and which preserve slope continuity of the co-ordinate lines across the global domain. The block structure is coupled with an innovative blown-up cube model of the Earth which permits all areas of the global ocean to be modeled with the same resolution, eliminating problems associated with polar singularities. The grid is generated on the curved surface of the Earth (rather than the longitude–latitude plane) by employing the Beltrami operator instead of the standard Laplacian operator. Application of the grid to a steady state heat conduction problem shows the relative computational accuracy and the potential to resolve the complex, smaller scale oceanographic phenomena of great importance to global circulation studies. © 1998 John Wiley & Sons, Ltd.  相似文献   
929.
The single‐electrode readout method has been applied to a coplanar grid (CPG) array CdZnTe detector in order to halve the number of preamplifiers previously needed and to facilitate imaging applications of CPG detectors. A method of predetermining the width of the optimum collecting electrodes has also been proposed, using the calculated optimum relative gain factor G. Meanwhile, a detailed process for calculating the charge induction efficiency (CIE) is presented. To simplify the calculation process, the computational formula of the CIE was deduced through the integration of the weighting potential. For performance evaluation, a 2 × 2 CPG‐array CdZnTe detector was elaborately designed and tested with 137Cs at 662 keV. Experimental results showed the capability of using the CPG‐array CdZnTe detector with single collecting electrode readout for γ‐ray imaging applications, with the same complexity of associated readout electronics as that of the pixelated CdZnTe detectors.  相似文献   
930.
The fast adaptive composite grid (FAC) method is an iterative method for solving discrete boundary value problems on composite grids. McCormick introduced the method in [8] and considered the convergence behaviour for discrete problems resulting from finite volume element discretization on composite grids. In this paper we consider discrete problems resulting from finite difference discretization on composite grids. We distinguish between two obvious discretization approaches at the grid points on the interfaces between fine and coarse subgrids. The FAC method for solving such discrete problems is described. In the FAC method several intergrid transfer operators appear. We study how the convergence behaviour depends on these intergrid transfer operators. Based on theoretical insights, (quasi-)optimal intergrid transfer operators are derived. Numerical results illustrate the fast convergence of the FAC method using these intergrid transfer operators.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号