首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16160篇
  免费   1321篇
  国内免费   379篇
化学   1508篇
晶体学   62篇
力学   674篇
综合类   166篇
数学   3698篇
物理学   4864篇
无线电   6888篇
  2024年   35篇
  2023年   164篇
  2022年   465篇
  2021年   565篇
  2020年   480篇
  2019年   311篇
  2018年   267篇
  2017年   443篇
  2016年   606篇
  2015年   523篇
  2014年   966篇
  2013年   1079篇
  2012年   881篇
  2011年   950篇
  2010年   723篇
  2009年   925篇
  2008年   980篇
  2007年   1055篇
  2006年   910篇
  2005年   787篇
  2004年   619篇
  2003年   623篇
  2002年   545篇
  2001年   409篇
  2000年   445篇
  1999年   295篇
  1998年   346篇
  1997年   182篇
  1996年   158篇
  1995年   170篇
  1994年   115篇
  1993年   96篇
  1992年   91篇
  1991年   68篇
  1990年   53篇
  1989年   51篇
  1988年   62篇
  1987年   56篇
  1986年   44篇
  1985年   76篇
  1984年   53篇
  1983年   30篇
  1982年   31篇
  1981年   20篇
  1980年   13篇
  1979年   18篇
  1978年   13篇
  1977年   12篇
  1976年   15篇
  1973年   10篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
颗粒流的动力学模型和实验研究进展   总被引:14,自引:3,他引:14  
吴清松  胡茂彬 《力学进展》2002,32(2):250-258
首先叙述了颗粒流研究的背景和基本概念,接着概述了颗粒流动力学研究的三种基本数学力学模型:颗粒动理论(kinetic theory)模型、摩擦塑性模型和离散元模拟模型.介绍了它们的基本原理,并分析了各个模型的优缺点和适用范围.随之,对颗粒流的实验研究情况作了简要的介绍,列举了研究中几种常用的试验方法和观测手段,以及观测到的一些典型现象.最后,我们简述了颗粒流研究的主要困难,并提出了某些有待解决的研究课题.   相似文献   
82.
After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms, devices and systems. Moreover, we study existing trends, and establish a roadmap for future research in these areas.  相似文献   
83.
In present times, barcode decoders on mobile phones can extract the data content of QR codes. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. This new scheme designs the triple module groups based on the concept of the error correction capability. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. This designed scheme can provide secure and reliable applications for the QR system.  相似文献   
84.
85.
We consider the “partial information decomposition” (PID) problem, which aims to decompose the information that a set of source random variables provide about a target random variable into separate redundant, synergistic, union, and unique components. In the first part of this paper, we propose a general framework for constructing a multivariate PID. Our framework is defined in terms of a formal analogy with intersection and union from set theory, along with an ordering relation which specifies when one information source is more informative than another. Our definitions are algebraically and axiomatically motivated, and can be generalized to domains beyond Shannon information theory (such as algorithmic information theory and quantum information theory). In the second part of this paper, we use our general framework to define a PID in terms of the well-known Blackwell order, which has a fundamental operational interpretation. We demonstrate our approach on numerous examples and show that it overcomes many drawbacks associated with previous proposals.  相似文献   
86.
The existing work has conducted in-depth research and analysis on global differential privacy (GDP) and local differential privacy (LDP) based on information theory. However, the data privacy preserving community does not systematically review and analyze GDP and LDP based on the information-theoretic channel model. To this end, we systematically reviewed GDP and LDP from the perspective of the information-theoretic channel in this survey. First, we presented the privacy threat model under information-theoretic channel. Second, we described and compared the information-theoretic channel models of GDP and LDP. Third, we summarized and analyzed definitions, privacy-utility metrics, properties, and mechanisms of GDP and LDP under their channel models. Finally, we discussed the open problems of GDP and LDP based on different types of information-theoretic channel models according to the above systematic review. Our main contribution provides a systematic survey of channel models, definitions, privacy-utility metrics, properties, and mechanisms for GDP and LDP from the perspective of information-theoretic channel and surveys the differential privacy synthetic data generation application using generative adversarial network and federated learning, respectively. Our work is helpful for systematically understanding the privacy threat model, definitions, privacy-utility metrics, properties, and mechanisms of GDP and LDP from the perspective of information-theoretic channel and promotes in-depth research and analysis of GDP and LDP based on different types of information-theoretic channel models.  相似文献   
87.
We reconsider model II of Orban et al. (J. Chem. Phys. 1968, 49, 1778–1783), a two-dimensional lattice-gas system featuring a crystalline phase and two distinct fluid phases (liquid and vapor). In this system, a particle prevents other particles from occupying sites up to third neighbors on the square lattice, while attracting (with decreasing strength) particles sitting at fourth- or fifth-neighbor sites. To make the model more realistic, we assume a finite repulsion at third-neighbor distance, with the result that a second crystalline phase appears at higher pressures. However, the similarity with real-world substances is only partial: Upon closer inspection, the alleged liquid–vapor transition turns out to be a continuous (albeit sharp) crossover, even near the putative triple point. Closer to the standard picture is instead the freezing transition, as we show by computing the free-energy barrier relative to crystal nucleation from the “liquid”.  相似文献   
88.
Tropomyosin (TM) is an important crustacean (Scylla paramamosain) allergen. This study aimed to assess Maillard-reacted TM (TM-G) induction of allergenic responses with cell and mouse models. We analyzed the difference of sensitization and the ability to induce immune tolerance between TM and TM-G by in vitro and in vivo models, then we compared the relationship between glycation sites of TM-G and epitopes of TM. In the in vitro assay, we discovered that the sensitization of TM-G was lower than TM, and the ability to stimulate mast cell degranulation decreased from 55.07 ± 4.23% to 27.86 ± 3.21%. In the serum of sensitized Balb/c mice, the level of specific IgE produced by TM-G sensitized mice was significantly lower than TM, and the levels of interleukins 4 and interleukins 13 produced by Th2 cells in spleen lymphocytes decreased by 82.35 ± 5.88% and 83.64 ± 9.09%, respectively. In the oral tolerance model, the ratio of Th2/Th1 decreased from 4.05 ± 0.38 to 1.69 ± 0.19. Maillard reaction masked the B cell epitopes of TM and retained some T cell epitopes. Potentially, Maillard reaction products (MRPs) can be used as tolerance inducers for allergen-specific immunotherapy.  相似文献   
89.
Dual-specific tyrosine phosphorylation regulated kinase 1 (DYRK1A) has been regarded as a potential therapeutic target of neurodegenerative diseases, and considerable progress has been made in the discovery of DYRK1A inhibitors. Identification of pharmacophoric fragments provides valuable information for structure- and fragment-based design of potent and selective DYRK1A inhibitors. In this study, seven machine learning methods along with five molecular fingerprints were employed to develop qualitative classification models of DYRK1A inhibitors, which were evaluated by cross-validation, test set, and external validation set with four performance indicators of predictive classification accuracy (CA), the area under receiver operating characteristic (AUC), Matthews correlation coefficient (MCC), and balanced accuracy (BA). The PubChem fingerprint-support vector machine model (CA = 0.909, AUC = 0.933, MCC = 0.717, BA = 0.855) and PubChem fingerprint along with the artificial neural model (CA = 0.862, AUC = 0.911, MCC = 0.705, BA = 0.870) were considered as the optimal modes for training set and test set, respectively. A hybrid data balancing method SMOTETL, a combination of synthetic minority over-sampling technique (SMOTE) and Tomek link (TL) algorithms, was applied to explore the impact of balanced learning on the performance of models. Based on the frequency analysis and information gain, pharmacophoric fragments related to DYRK1A inhibition were also identified. All the results will provide theoretical supports and clues for the screening and design of novel DYRK1A inhibitors.  相似文献   
90.
This paper examines space averaging methods applied to structural level differences measured in lightweight building structures (two beam junction and single plate and beam junction). The methods studied include the averaging assuming a constant input force, the averaging based on a constant vibration level across the source element, and the arithmetic averaging of level differences. Tests indicate that a fairly steady input force can be easily produced when using an impulsive source such as a hammer; the constant input force method is then appropriate and can be used to space average level differences (the two beam structure showing a standard deviation of 0.1 dB from the averaging based on levels normalised to the force). On the other hand, acceleration levels can exhibit significant variations with position due to the low mode count and modal overlap of some lightweight elements such as timber beams. Variations in the vibration level across the source element can then be responsible for large inaccuracies in the level difference calculated from the constant level assumption, the two beams’ results showing errors greater than 5 dB at several 1/3 octave band frequencies. The latter averaging method is then inappropriate and should not be used.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号