首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51106篇
  免费   6947篇
  国内免费   5440篇
化学   16326篇
晶体学   1277篇
力学   10692篇
综合类   696篇
数学   15410篇
物理学   19092篇
  2024年   121篇
  2023年   537篇
  2022年   1059篇
  2021年   1231篇
  2020年   1461篇
  2019年   1298篇
  2018年   1349篇
  2017年   1867篇
  2016年   2127篇
  2015年   1689篇
  2014年   2641篇
  2013年   3871篇
  2012年   3187篇
  2011年   3523篇
  2010年   3037篇
  2009年   3348篇
  2008年   3190篇
  2007年   3248篇
  2006年   2968篇
  2005年   2722篇
  2004年   2383篇
  2003年   2124篇
  2002年   1883篇
  2001年   1579篇
  2000年   1515篇
  1999年   1393篇
  1998年   1229篇
  1997年   1049篇
  1996年   881篇
  1995年   744篇
  1994年   678篇
  1993年   585篇
  1992年   575篇
  1991年   416篇
  1990年   346篇
  1989年   274篇
  1988年   260篇
  1987年   176篇
  1986年   126篇
  1985年   138篇
  1984年   129篇
  1983年   64篇
  1982年   102篇
  1981年   77篇
  1980年   43篇
  1979年   67篇
  1978年   52篇
  1977年   48篇
  1976年   21篇
  1974年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
We study the asymptotic distribution of the fill‐up level in a binary trie built over n independent strings generated by a biased memoryless source. The fill‐up level is the number of full levels in a tree. A level is full if it contains the maximum allowable number of nodes (e.g., in a binary tree level k can have up to 2k nodes). The fill‐up level finds many interesting applications, e.g., in the internet IP lookup problem and in the analysis of level compressed tries (LC tries). In this paper, we present a complete asymptotic characterization of the fill‐up distribution. In particular, we prove that this distribution concentrates on one or two points around the most probably value k = ?log1/qn ? log log log n + 1 + log log(p/q)?, where p > q = 1 ? p is the probability of generating the more likely symbol (while q = 1 ? p is the probability of the less likely symbol). We derive our results by analytic methods such as generating functions, Mellin transform, the saddle point method, and analytic depoissonization. We also present some numerical verification of our results. © 2004 Wiley Periodicals, Inc. Random Struct. Alg., 2004  相似文献   
92.
A new parallel storm surge model, the Parallel Environmental Model (PEM), is developed and tested by comparisons with analytic solutions. The PEM is a 2‐D vertically averaged, wetting and drying numerical model and can be operated in explicit, semi‐implicit and fully implicit modes. In the implicit mode, the propagation, Coriolis and bottom friction terms can all be treated implicitly. The advection and diffusion terms are solved with a parallel Eulerian–Lagrangian scheme developed for this study. The model is developed specifically for use on parallel computer systems and will function accordingly in either explicit of implicit modes. Storm boundary conditions are based on a simple exponential decay of pressure from the centre of a storm. The simulated flooding caused by a major Category 5 hurricane making landfall in the Indian River Lagoon, Florida is then presented as an example application of the PEM. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
93.
In this paper, an interior point cutting plane method (IPCPM)is applied to solve optimal power flow (OPF) problems. Comparedwith the simplex cutting plane method (SCPM), the IPCPM is simpler,and efficient because of its polynomial-time characteristic.Issues in implementing IPCPM for OPF problems are addressed,including (1) how to generate cutting planes without using thesimplex tableau, (2) how to identify the basis variables inIPCPM, and (3) how to generate mixed integer cutting planes.The calculation speed of the proposed algorithm is further enhancedby utilizing the sparsity features of the OPF formulation. Numericalsimulations on IEEE 14-300-bus test systems have shown thatthe proposed method is effective.  相似文献   
94.
Imaging of latent fingerprints using time-resolved (TR) method offers a broader platform to eliminate the unwanted background emission. In this paper, a novel TR imaging technique is demonstrated and implemented, which facilitates the detection of latent fingerprints with nanosecond resolution. Simulated experiments were carried out with two overlapping fingerprints treated with two fluorescent powders having different lifetimes in nanosecond range. The dependence of the fluorescence emission intensity in nanosecond resolution of TR imaging is also revealed.  相似文献   
95.
Atmospheric turbulence is an important factor that limits the amount of attenuation a barrier can provide in the outdoor environment. It is therefore important to develop a reliable method to predict its effect on barrier performance. The boundary element method (BEM) has been shown to be a very effective technique for predicting barrier insertion loss in the absence of turbulence. This paper develops a simple and efficient modification of the BEM formulation to predict the insertion loss of a barrier in the presence of atmospheric turbulence. The modification is based on two alternative methods: (1) random realisations of log-amplitude and phase fluctuations of boundary sources and (2) de-correlation of source coherence using the mutual coherence function (MCF). An investigation into the behaviours of these two methods is carried out and simplified forms of the methods developed. Some systematic differences between the predictions from the methods are found. When incorporated into the BEM formulation, the method of random realisations and the method of MCF de-correlation provide predictions that agree well with predictions by the parabolic equation method and by the scattering cross-section method on a variety of thin barrier configurations.  相似文献   
96.
肿瘤微波热疗的温度场预示及热损伤研究   总被引:2,自引:0,他引:2  
本文将热损伤的产生和影响引入到肿瘤的微波热疗中。运用微波能量比吸收率SAR的分布分析了微波在组织中的传输和吸收过程,并对微波热疗过程中的温度场、热损伤分布以及血液灌注率的变化进行了数值模拟。  相似文献   
97.
In this paper, based on the Lame function and Jacobi elliptic function, the perturbation method is appliedto some nonlinear evolution equations to derive their multi-order solutions.  相似文献   
98.
Based on the investigation carried out in Ref. 1, this paper incorporates new studies about the properties of inclusion functions on subintervals while a branch-and-bound algorithm is solving global optimization problems. It is found that the relative place of the global minimum value within the inclusion function value of the objective function at the current interval indicates mostly whether the given interval is close to a minimizer point. This information is used in a heuristic interval rejection rule that can save a considerable amount of computation. Illustrative examples are discussed and an extended numerical study shows the advantages of the new approach.  相似文献   
99.
遥感器CCD驱动器热设计及其在摄像过程中的温度变化   总被引:3,自引:3,他引:0  
丁延卫  卢锷 《光学技术》2003,29(2):172-173
CCD驱动器是航天成像遥感器摄像过程中的主要热源之一。防止CCD驱动器过热是保证其正常工作的重要方面。介绍了遥感器的工作模式和对CCD驱动器采取的热控制措施。通过热平衡试验,利用回归的方法,对CCD驱动器在摄像过程中的温度变化规律进行了分析,同时对热控制效果进行了评估。CCD驱动器工作时升温速率在0.85℃/min左右,整个摄像过程中最高温度约为26℃,所实施的热控制措施效果理想。  相似文献   
100.
The aim of this paper is to propose an algorithm based on the philosophy of the Variable Neighborhood Search (VNS) to solve Multi Depot Vehicle Routing Problems with Time Windows. The paper has two main contributions. First, from a technical point of view, it presents the first application of a VNS for this problem and several design issues of VNS algorithms are discussed. Second, from a problem oriented point of view the computational results show that the approach is competitive with an existing Tabu Search algorithm with respect to both solution quality and computation times.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号