首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5272篇
  免费   519篇
  国内免费   230篇
化学   1211篇
晶体学   12篇
力学   258篇
综合类   190篇
数学   2439篇
物理学   1911篇
  2024年   6篇
  2023年   43篇
  2022年   192篇
  2021年   212篇
  2020年   135篇
  2019年   162篇
  2018年   161篇
  2017年   256篇
  2016年   265篇
  2015年   217篇
  2014年   308篇
  2013年   461篇
  2012年   248篇
  2011年   299篇
  2010年   230篇
  2009年   262篇
  2008年   283篇
  2007年   307篇
  2006年   224篇
  2005年   237篇
  2004年   207篇
  2003年   166篇
  2002年   153篇
  2001年   124篇
  2000年   95篇
  1999年   104篇
  1998年   99篇
  1997年   63篇
  1996年   72篇
  1995年   69篇
  1994年   47篇
  1993年   41篇
  1992年   38篇
  1991年   32篇
  1990年   21篇
  1989年   19篇
  1988年   23篇
  1987年   21篇
  1986年   20篇
  1985年   16篇
  1984年   24篇
  1983年   8篇
  1982年   13篇
  1981年   8篇
  1980年   7篇
  1979年   6篇
  1978年   4篇
  1977年   4篇
  1976年   3篇
  1973年   4篇
排序方式: 共有6021条查询结果,搜索用时 17 毫秒
11.
Liquid and solid cyclic peroxides derived from aliphatic ketones are explosive materials so their enthalpies of vaporization and other thermodynamic or condensed-phase properties cannot be measured directly. In this work the enthalpies of vaporization of peroxides at 298.15 K were estimated simply from gas chromatographic retention times measured at different temperatures. The technique correlates changes in the retention times of compounds whose enthalpies of vaporization are known (called the reference series), with those of the compounds of interest. If t R′ is the adjusted retention time (retention time of each compound minus the retention time of unretained diethyl ether, used as solvent) a plot of ln t R′ against 1/T for each compound (reference compounds and cyclic peroxides) results in a straight line (r 2 > 0.99 for all compounds). The enthalpy of transfer from solution to the vapor state (Δsolg H m) can be obtained by multiplying the slope by the gas constant (R). A second plot correlates the enthalpies of transfer from solution to the vapor state (Δsolg H m), as measured by gas–liquid chromatography (GLC), with enthalpies of vaporization of reference materials (Δvap H m at 298.15 K) available in the literature. C9–C15 fatty acid methyl esters and hydrocarbons were used as reference compounds. The enthalpies of vaporization of the cyclic organic peroxides were calculated from the equation of the line obtained in this second correlation, the slope of which was Δvap H m (at 298.15 K)/Δg sol H m. The experiments were performed under isothermal conditions with a DB-5 capillary column, flame-ionization detection (FID), and nitrogen as carrier gas. The column temperature was varied over a range of at least 30–70 K between 403 and 473 K, with chromatograms being acquired at 10 K intervals. Enthalpies of vaporization of cyclic organic peroxides are not available in the literature, and the values given in this paper, obtained by gas chromatography, are the first to be reported.  相似文献   
12.
Alkylidynephosphanes and -arsanes. I [P ≡ C? S]?[Li(dme)3]+ – Synthesis and Structure O,O′-Diethyl thiocarbonate and bis(tetrahydrofuran)-lithium bis(trimethylsilyl)phosphanide dissolved in 1,2-dimethoxyethane, react below 0°C to give ethoxy trimethylsilane and tris(1,2-dimethoxyethane-O,O′)lithium 2λ3-phosphaethynylsulfanide – [P≡C? S]? [Li(dme)3]+ – ( 1a ). Apart from bis(trimethylsilyl)sulfane or carbon oxide sulfide, dark red concentrated solutions of λ3-phosphaalkyne 1 are also obtained from reactions of carbon disulfide with bis(tetrahydrofuran)-lithium bis(trimethylsilyl)phosphanide or with the homologous lithoxy-methylidynephosphane ( 2 ) [1]. The ir spectrum shows two absorptions at 1762 and 747 cm?1 characteristic for the P≡C and C? S stretching vibrations. The nmr parameters {δ(31P) ? 121.3; δ(13C) 190.8 ppm; 1JCP 18.2 Hz} resemble much more values of diorganylamino-2λ3-phosphaalkynes than those of bis(1,2-dimethoxyethane-O,O′)lithoxy-methylidyne-phosphane ( 2a ). As found by an X-ray structure analysis (P21/c; a = 1192.6(16); b = 1239.1(19); c = 1414.8(26) pm; β = 105.91(13)° at ?100 ± 3°C; Z = 4 formula units; wR = 0.064) of pale yellow crystals (mp. + 16°C) isolated from the reaction with O,O′-diethyl thiocarbonate, the solid is built up of separate [P≡C? S]? and [Li(dme)3]+ ions. Typical bond lengths and angles are: P≡C 155.5(11); C? S 162.0(11); Li? O 206.4(17) to 220.3(20) pm; P≡C? S 178.9(7)°.  相似文献   
13.
A New Tricyclic Sulfur-rich Phosphane From the products of the reaction of P4S3 with tert-Butyliodide the compound (t-Bu(S)P)2P4S3 was isolated in low yield. The compound is stable and has a structure related to the hydrocarbon brexane. By reaction with triphenylphosphin the compounds (t-BuP)(t-Bu(S)P)P4S3 and (t-BuP)2P4S3 were obtained. The 31P-nmr spectra of all compounds were solved and used to determine the structure of the molecules. A complete set of 31P-nmr data is given.  相似文献   
14.
We propose an innovative delta-differencing algorithm that combines software-updating methods with LZ77 data compression. This software-updating method relates to server-side software that creates binary delta files and to client-side software that performs software-update installations. The proposed algorithm creates binary-differencing streams already compressed from an initial phase. We present a software-updating method suitable for OTA software updates and the method’s basic strategies to achieve a better performance in terms of speed, compression ratio or a combination of both. A comparison with publicly available solutions is provided. Our test results show our method, Keops, can outperform an LZMA (Lempel–Ziv–Markov chain-algorithm) based binary differencing solution in terms of compression ratio in two cases by more than 3% while being two to five times faster in decompression. We also prove experimentally that the difference between Keops and other competing delta-creator software increases when larger history buffers are used. In one case, we achieve a three times better performance for a delta rate compared to other competing delta rates.  相似文献   
15.
In the era of the Internet of Things, there are many applications where numerous devices are deployed to acquire information and send it to analyse the data and make informed decisions. In these applications, the power consumption and price of the devices are often an issue. In this work, analog coding schemes are considered, so that an ADC is not needed, allowing the size and power consumption of the devices to be reduced. In addition, linear and DFT-based transmission schemes are proposed, so that the complexity of the operations involved is lowered, thus reducing the requirements in terms of processing capacity and the price of the hardware. The proposed schemes are proved to be asymptotically optimal among the linear ones for WSS, MA, AR and ARMA sources.  相似文献   
16.
Financial and economic time series forecasting has never been an easy task due to its sensibility to political, economic and social factors. For this reason, people who invest in financial markets and currency exchange are usually looking for robust models that can ensure them to maximize their profile and minimize their losses as much as possible. Fortunately, recently, various studies have speculated that a special type of Artificial Neural Networks (ANNs) called Recurrent Neural Networks (RNNs) could improve the predictive accuracy of the behavior of the financial data over time. This paper aims to forecast: (i) the closing price of eight stock market indexes; and (ii) the closing price of six currency exchange rates related to the USD, using the RNNs model and its variants: the Long Short-Term Memory (LSTM) and the Gated Recurrent Unit (GRU). The results show that the GRU gives the overall best results, especially for the univariate out-of-sample forecasting for the currency exchange rates and multivariate out-of-sample forecasting for the stock market indexes.  相似文献   
17.
One of the biggest challenges for the fault diagnosis research of industrial robots is that the normal data is far more than the fault data; that is, the data is imbalanced. The traditional diagnosis approaches of industrial robots are more biased toward the majority categories, which makes the diagnosis accuracy of the minority categories decrease. To solve the imbalanced problem, the traditional algorithm is improved by using cost-sensitive learning, single-class learning and other approaches. However, these algorithms also have a series of problems. For instance, it is difficult to estimate the true misclassification cost, overfitting, and long computation time. Therefore, a fault diagnosis approach for industrial robots, based on the Multiclass Mahalanobis-Taguchi system (MMTS), is proposed in this article. It can be classified the categories by measuring the deviation degree from the sample to the reference space, which is more suitable for classifying imbalanced data. The accuracy, G-mean and F-measure are used to verify the effectiveness of the proposed approach on an industrial robot platform. The experimental results show that the proposed approach’s accuracy, F-measure and G-mean improves by an average of 20.74%, 12.85% and 21.68%, compared with the other five traditional approaches when the imbalance ratio is 9. With the increase in the imbalance ratio, the proposed approach has better stability than the traditional algorithms.  相似文献   
18.
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously. However, most of the studied approaches can only achieve adversarial perturbation through a visible watermark; the quality of the host image is low, and the concealment of data hiding cannot be achieved. In this work, we propose a true data hiding method with adversarial effect for generating high-quality covers. Based on GAN, the data hiding area is selected precisely by limiting the modification strength in order to preserve the fidelity of the image. We devise a genetic algorithm that can explore decision boundaries in an artificially constrained search space to improve the attack effect as well as construct aggressive covert adversarial samples by detecting “sensitive pixels” in ordinary samples to place discontinuous perturbations. The results reveal that the stego-image has good visual quality and attack effect. To the best of our knowledge, this is the first attempt to use covert data hiding to generate adversarial samples based on GAN.  相似文献   
19.
Feature selection (FS) is a vital step in data mining and machine learning, especially for analyzing the data in high-dimensional feature space. Gene expression data usually consist of a few samples characterized by high-dimensional feature space. As a result, they are not suitable to be processed by simple methods, such as the filter-based method. In this study, we propose a novel feature selection algorithm based on the Explosion Gravitation Field Algorithm, called EGFAFS. To reduce the dimensions of the feature space to acceptable dimensions, we constructed a recommended feature pool by a series of Random Forests based on the Gini index. Furthermore, by paying more attention to the features in the recommended feature pool, we can find the best subset more efficiently. To verify the performance of EGFAFS for FS, we tested EGFAFS on eight gene expression datasets compared with four heuristic-based FS methods (GA, PSO, SA, and DE) and four other FS methods (Boruta, HSICLasso, DNN-FS, and EGSG). The results show that EGFAFS has better performance for FS on gene expression data in terms of evaluation metrics, having more than the other eight FS algorithms. The genes selected by EGFAGS play an essential role in the differential co-expression network and some biological functions further demonstrate the success of EGFAFS for solving FS problems on gene expression data.  相似文献   
20.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号