首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7215篇
  免费   1364篇
  国内免费   417篇
化学   2044篇
晶体学   35篇
力学   560篇
综合类   268篇
数学   2457篇
物理学   3632篇
  2024年   29篇
  2023年   130篇
  2022年   485篇
  2021年   379篇
  2020年   239篇
  2019年   196篇
  2018年   162篇
  2017年   298篇
  2016年   358篇
  2015年   275篇
  2014年   494篇
  2013年   580篇
  2012年   481篇
  2011年   453篇
  2010年   414篇
  2009年   471篇
  2008年   423篇
  2007年   444篇
  2006年   373篇
  2005年   280篇
  2004年   238篇
  2003年   247篇
  2002年   243篇
  2001年   178篇
  2000年   188篇
  1999年   152篇
  1998年   135篇
  1997年   116篇
  1996年   101篇
  1995年   59篇
  1994年   78篇
  1993年   67篇
  1992年   36篇
  1991年   30篇
  1990年   32篇
  1989年   16篇
  1988年   16篇
  1987年   12篇
  1986年   20篇
  1985年   18篇
  1984年   15篇
  1983年   3篇
  1982年   6篇
  1981年   7篇
  1979年   5篇
  1977年   5篇
  1974年   1篇
  1972年   1篇
  1967年   1篇
  1959年   4篇
排序方式: 共有8996条查询结果,搜索用时 15 毫秒
11.
Software maintenance is indispensable in the software development process. Developers need to spend a lot of time and energy to understand the software when maintaining the software, which increases the difficulty of software maintenance. It is a feasible method to understand the software through the key classes of the software. Identifying the key classes of the software can help developers understand the software more quickly. Existing techniques on key class identification mainly use static analysis techniques to extract software structure information. Such structure information may contain redundant relationships that may not exist when the software runs and ignores the actual interaction times between classes. In this paper, we propose an approach based on dynamic analysis and entropy-based metrics to identify key classes in the Java GUI software system, called KEADA (identifying KEy clAsses based on Dynamic Analysis and entropy-based metrics). First, KEADA extracts software structure information by recording the calling relationship between classes during the software running process; such structure information takes into account the actual interaction of classes. Second, KEADA represents the structure information as a weighted directed network and further calculates the importance of each node using an entropy-based metric OSE (One-order Structural Entropy). Third, KEADA ranks classes in descending order according to their OSE values and selects a small number of classes as the key class candidates. In order to verify the effectiveness of our approach, we conducted experiments on three Java GUI software systems and compared them with seven state-of-the-art approaches. We used the Friedman test to evaluate all approaches, and the results demonstrate that our approach performs best in all software systems.  相似文献   
12.
Phytotherapy offers obvious advantages in the intervention of Coronary Artery Disease (CAD), but it is difficult to clarify the working mechanisms of the medicinal materials it uses. DGS is a natural vasoprotective combination that was screened out in our previous research, yet its potential components and mechanisms are unknown. Therefore, in this study, HPLC-MS and network pharmacology were employed to identify the active components and key signaling pathways of DGS. Transgenic zebrafish and HUVECs cell assays were used to evaluate the effectiveness of DGS. A total of 37 potentially active compounds were identified that interacted with 112 potential targets of CAD. Furthermore, PI3K-Akt, MAPK, relaxin, VEGF, and other signal pathways were determined to be the most promising DGS-mediated pathways. NO kit, ELISA, and Western blot results showed that DGS significantly promoted NO and VEGFA secretion via the upregulation of VEGFR2 expression and the phosphorylation of Akt, Erk1/2, and eNOS to cause angiogenesis and vasodilation. The result of dynamics molecular docking indicated that Salvianolic acid C may be a key active component of DGS in the treatment of CAD. In conclusion, this study has shed light on the network molecular mechanism of DGS for the intervention of CAD using a network pharmacology-driven strategy for the first time to aid in the intervention of CAD.  相似文献   
13.
Cancer progression is linked to aberrant protein glycosylation due to the overexpression of several glycosylation enzymes. These enzymes are underexploited as potential anticancer drug targets and the development of rapid-screening methods and identification of glycosylation inhibitors are highly sought. An integrated bioinformatics and mass spectrometry-based glycomics-driven glycoproteomics analysis pipeline was performed to identify an N-glycan inhibitor against lung cancer cells. Combined network pharmacology and in silico screening approaches were used to identify a potential inhibitor, pictilisib, against several glycosylation-related proteins, such as Alpha1-6FucT, GlcNAcT-V, and Alpha2,6-ST-I. A glycomics assay of lung cancer cells treated with pictilisib showed a significant reduction in the fucosylation and sialylation of N-glycans, with an increase in high mannose-type glycans. Proteomics analysis and in vitro assays also showed significant upregulation of the proteins involved in apoptosis and cell adhesion, and the downregulation of proteins involved in cell cycle regulation, mRNA processing, and protein translation. Site-specific glycoproteomics analysis further showed that glycoproteins with reduced fucosylation and sialylation were involved in apoptosis, cell adhesion, DNA damage repair, and chemical response processes. To determine how the alterations in N-glycosylation impact glycoprotein dynamics, modeling of changes in glycan interactions of the ITGA5–ITGB1 (Integrin alpha 5-Integrin beta-1) complex revealed specific glycosites at the interface of these proteins that, when highly fucosylated and sialylated, such as in untreated A549 cells, form greater hydrogen bonding interactions compared to the high mannose-types in pictilisib-treated A549 cells. This study highlights the use of mass spectrometry to identify a potential glycosylation inhibitor and assessment of its impact on cell surface glycoprotein abundance and protein–protein interaction.  相似文献   
14.
As multilayer networks are widely applied in modern society, numerous studies have shown the impact of a multilayer network structure and the network nature on the proportion of cooperators in the network. In this paper, we use Barabási–Albert scale-free networks (BA) and Watts and Strogatz networks (WS) to build a multilayer network structure, and we propose a new strategy-updating rule called “cooperation-defection dominance”, which can be likened to dominant and recessive traits in biogenetics. With the newly constructed multilayer network structure and the strategy-updating rules, based on the simulation results, we find that in the BA-BA network, the cooperation dominance strategy can make the networks with different rs show a cooperative trend, while the defection dominance strategy only has an obvious effect on the network cooperation with a larger r. When the BA network is connected to the WS network, we find that the effect of strategy on the proportion of cooperators in the network decreases, and the main influencing factor is the structure of the network. In the three-layer network, the cooperation dominance strategy has a greater impact on the BA network, and the proportion of the cooperators is enhanced more than under the natural evolution strategy, but the promotion effect is still smaller than that of the two-layer BA network because of the WS network. Under the defection dominance strategy, the WS layer appears different from the first two strategies, and we conclude through simulation that when the payoff parameter is at the middle level, its cooperator proportion will be suppressed, and we deduce that the proportion of cooperators and defectors, as well as the payoff, play an important role.  相似文献   
15.
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously. However, most of the studied approaches can only achieve adversarial perturbation through a visible watermark; the quality of the host image is low, and the concealment of data hiding cannot be achieved. In this work, we propose a true data hiding method with adversarial effect for generating high-quality covers. Based on GAN, the data hiding area is selected precisely by limiting the modification strength in order to preserve the fidelity of the image. We devise a genetic algorithm that can explore decision boundaries in an artificially constrained search space to improve the attack effect as well as construct aggressive covert adversarial samples by detecting “sensitive pixels” in ordinary samples to place discontinuous perturbations. The results reveal that the stego-image has good visual quality and attack effect. To the best of our knowledge, this is the first attempt to use covert data hiding to generate adversarial samples based on GAN.  相似文献   
16.
The determination of directed control paths in complex networks is important because control paths indicate the structure of the propagation of control signals through edges. A challenging problem is to identify them in complex networked systems characterized by different types of interactions that form multilayer networks. In this study, we describe a graph pattern called the conserved control path, which allows us to model a common control structure among different types of relations. We present a practical conserved control path detection method (CoPath), which is based on a maximum-weighted matching, to determine the paths that play the most consistent roles in controlling signal transmission in multilayer networks. As a pragmatic application, we demonstrate that the control paths detected in a multilayered pan-cancer network are statistically more consistent. Additionally, they lead to the effective identification of drug targets, thereby demonstrating their power in predicting key pathways that influence multiple cancers.  相似文献   
17.
Owing to the loss of effective information and incomplete feature extraction caused by the convolution and pooling operations in a convolution subsampling network, the accuracy and speed of current speech processing architectures based on the conformer model are influenced because the shallow features of speech signals are not completely extracted. To solve these problems, in this study, we researched a method that used a capsule network to improve the accuracy of feature extraction in a conformer-based model, and then, we proposed a new end-to-end model architecture for speech recognition. First, to improve the accuracy of speech feature extraction, a capsule network with a dynamic routing mechanism was introduced into the conformer model; thus, the structural information in speech was preserved, and it was input to the conformer blocks via sequestered vectors; the learning ability of the conformed-based model was significantly enhanced using dynamic weight updating. Second, a residual network was added to the capsule blocks, thus, the mapping ability of our model was improved and the training difficulty was reduced. Furthermore, the bi-transformer model was adopted in the decoding network to promote the consistency of the hypotheses in different directions through bidirectional modeling. Finally, the effectiveness and robustness of the proposed model were verified against different types of recognition models by performing multiple sets of experiments. The experimental results demonstrated that our speech recognition model achieved a lower word error rate without a language model because of the higher accuracy of speech feature extraction and learning using our model architecture with a capsule network. Furthermore, our model architecture benefited from the advantage of the capsule network and the conformer encoder, and also has potential for other speech-related applications.  相似文献   
18.
网络关注度是测量潜在旅游者对目的地旅游关注情况及需求变化的重要手段之一。基于百度指数,以我国31个省(区、市)(不含港、澳、台)的泰国旅游网络关注度为研究对象,运用季节性强度指数、地理集中度指数、赫芬达尔-赫希曼指数、地理探测器等方法,探讨我国居民对泰国旅游网络关注度的时空演化规律及其影响因素。结果表明:从时序演化上看,2011—2019年泰国旅游网络关注度呈波动上升态势,可划分为快速上升期和平稳发展期2个阶段,地区季节性差异显著,3月、7月、12月为泰国旅游网络关注度的高峰时段;从空间分异上看,泰国旅游网络关注度空间分异变化不大,空间集聚趋于分散状态,整体呈“东高-西低”的阶梯状递减特征,高关注度地区主要集中在东部地区及四川省,低关注度地区则主要分布于除四川省外的西部省份;从影响因素上看,经济发展水平(人均可支配收入、GDP)、交通便利程度、贸易开放度以及国际旅游开放度共同影响泰国旅游网络关注度的空间分布格局。  相似文献   
19.
Abstract

The Cu(II) ion-based polymeric complexes [Cu(2,2′-bpy).(N3)2]n (I), [Cu2(2,2′-bpy)2.(N3)4]n (II), and monomeric complex [Cu(2,2′-bpy).(NO3)2].5H2O (III) have been synthesized with rigid (–N3) and aromatic (2,2′-bpy = 2,2′-bipyridyl) ligand. The rigid azide group is responsible for the formation of 1-D extended structures in complexes I and II where as in the case of complex III, a monomeric complex is formed due to lack of a bridging group like –N3, resulting in limitation in dimensionality. The thermal stability of the 1-D complexes is comparatively higher than monomeric complex III. Hirshfeld surface analysis has also been applied to investigate other weak interactions and compared with the results from single-crystal X-ray data. Due to the presence of paramagnetic metal centers and long metal···metal distances in complexes I and II and presence of lattice water molecules in complex III, decrease in luminescence intensities have been observed. To attain further insights into the aforementioned interesting species, some chemical concepts such as highest occupied molecular orbital–lowest unoccupied molecular orbital gap, electronic chemical potential, chemical hardness, and electrophilicity index, identified as a derivative of electronic energy, have also been emphasized employing the quantum chemical calculations in the framework of the density functional theory method using the M06-2X/ 6-31G** level of study. Further, these complexes have been used to synthesize copper nanoparticles by applying a green synthetic route.  相似文献   
20.
By sequentially adding line segments to a line or disks to a surface at random positions without overlaps, we obtain configurations of the one- and two-dimensional random sequential adsorption (RSA) problem. We have simulated the one- and two-dimensional problem with periodic boundary condition. The one-dimensional simulations are compared with the exact analytical solutions to give an estimate of the accuracy of the simulation. In two dimensions the geometrical properties of the RSA configuration are discussed and in addition known results of the RSA process are reproduced. Various statistical distributions of the Voronoi-Dirichlet (VD) network corresponding to the RSA disk configuration are analyzed. In order to characterize pores in the RSA configuration, we introduce circular holes. There is a direct correspondence between vertices of the VD network and these holes, and also between direct/indirect geometrical neighbors and these holes. The hole size distribution is found to be a parabola. We also find general relations that connect the asymptotic behavior of the surface coverage, the correlation function, and the hole size distribution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号