首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3435篇
  免费   525篇
  国内免费   289篇
化学   458篇
晶体学   1篇
力学   178篇
综合类   66篇
数学   1226篇
物理学   1015篇
无线电   1305篇
  2024年   8篇
  2023年   38篇
  2022年   104篇
  2021年   87篇
  2020年   106篇
  2019年   112篇
  2018年   91篇
  2017年   118篇
  2016年   133篇
  2015年   123篇
  2014年   206篇
  2013年   277篇
  2012年   216篇
  2011年   219篇
  2010年   198篇
  2009年   214篇
  2008年   253篇
  2007年   254篇
  2006年   226篇
  2005年   159篇
  2004年   166篇
  2003年   140篇
  2002年   113篇
  2001年   107篇
  2000年   81篇
  1999年   73篇
  1998年   71篇
  1997年   48篇
  1996年   52篇
  1995年   33篇
  1994年   38篇
  1993年   23篇
  1992年   22篇
  1991年   17篇
  1990年   17篇
  1989年   15篇
  1988年   4篇
  1987年   10篇
  1986年   12篇
  1985年   9篇
  1984年   10篇
  1983年   3篇
  1982年   9篇
  1981年   6篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1977年   5篇
  1974年   3篇
  1957年   2篇
排序方式: 共有4249条查询结果,搜索用时 15 毫秒
101.
102.
The obstacle-avoiding rectilinear Steiner minimal tree (OARSMT) problem is a hot topic in very-large-scale integration physical design. In practice, most of the obstacles occupy the device layer and certain lower metal layers. Therefore, we can place wires on top of the obstacles. To maximize routing resources over obstacles, we propose a heuristic for constructing a rectilinear Steiner tree with slew constraints. Our algorithm adopts an extended rectilinear full Steiner tree grid as the routing graph. We mark two types of Steiner point candidates, which are used for constructing Steiner trees and refining solutions. A shortest path heuristic variant is designed for constructing Steiner trees and it takes into account slew constraint by inhibiting growth. Furthermore, we use a pre-computed strategy to avoid calculating slew rate repeatedly. Experimental results show that our algorithm maximizes routing resources over obstacles and saves routing resources outside obstacles. Compared with the conventional OARSMT algorithm, our algorithm reduces the wire length outside obstacles by as much as 18.74% and total wire length by as much as 6.03%. Our algorithm improves the latest related algorithm by approximately 2% in terms of wire length within a reasonable running time. Additionally, calculating the slew rate only accounts for approximately 15% of the total runing time.  相似文献   
103.
In this paper, we are interested in the following question: given an arbitrary Steiner triple system on vertices and any 3‐uniform hypertree on vertices, is it necessary that contains as a subgraph provided ? We show the answer is positive for a class of hypertrees and conjecture that the answer is always positive.  相似文献   
104.
Detailed gas-phase chemical kinetic models are widely used in combustion research, and many new mechanisms for different fuels and reacting conditions are developed each year. Recent works have highlighted the need for error checking when preparing such models, but a useful community tool to perform such analysis is missing. In this work, we present a simple online tool to screen chemical kinetic mechanisms for bimolecular reactions exceeding collision limits. The tool is implemented on a user-friendly website, cloudflame.kaust.edu.sa, and checks three different classes of bimolecular reactions; (ie, pressure independent, pressure-dependent falloff, and pressure-dependent PLOG). In addition, two other online modules are provided to check thermodynamic properties and transport parameters to help kinetic model developers determine the sources of errors for reactions that are not collision limit compliant. Furthermore, issues related to unphysically fast timescales can remain an issue even if all bimolecular reactions are within collision limits. Therefore, we also present a procedure to screen ultrafast reaction timescales using computational singular perturbation. For demonstration purposes only, three versions of the rigorously developed AramcoMech are screened for collision limit compliance and ultrafast timescales, and recommendations are made for improving the models. Larger models for biodiesel surrogates, tetrahydropyran, and gasoline surrogates are also analyzed for exemplary purposes. Numerical simulations with updated kinetic parameters are presented to show improvements in wall-clock time when resolving ultrafast timescales.  相似文献   
105.
106.
Using insights from the forest ecology literature, we analyze the effect of injured trees on stand composition and carbon stored in above‐ground biomass and the implications for forest management decisions. Results from a Faustmann model with data for a tropical forest on Kalimantan show that up to 50% of the basal area of the stand before harvest can consist of injured trees. Considering injured trees leads to an increase in the amount of carbon in above‐ground biomass of up to 165%. These effects are larger under reduced impact logging than under conventional logging. The effects on land expectation value and cutting cycle are relatively small. The results suggest that considering injured trees in models for tropical forest management is important for the correct assessment of the potential of financial programs to store carbon and conserve forest ecosystem services in managed tropical forests, such as reducing emissions from deforestation and forest degradation and payment for ecosystem services. Recommendations for Resource Managers
  • Considering the role of injured trees is important for managing tropical forests
  • These trees can cover up to 50% of basal area and contain more than 50% of the carbon stored in above‐ground biomass
  • Reduced impact logging leads to a larger basal area of injured trees and more carbon stored in injured trees than conventional logging
  • Injured trees play an important role when assessing the potential for carbon storage in the context of payment for forest ecosystem services.
  相似文献   
107.
With the rapid development and widespread application of Wireless Body Area Networks (WBANs), the traditional centralized system architecture cannot handle the massive data generated by the edge devices. Meanwhile, in order to ensure the security of physiological privacy data and the identity privacy of patients, this paper presents a privacy protection strategy for Mobile Edge Computing(MEC) enhanced WBANs, which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency, high reliability within a high-demand data security scenario. On this basis, the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data. Furthermore, a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability, data integrity and reduced delay. The security performance analysis and simulation results show that our proposed strategy not only reduces the delay, but also secures the privacy and transmission of sensitive WBANs data.  相似文献   
108.
In recent years, hierarchical model-based clustering has provided promising results in a variety of applications. However, its use with large datasets has been hindered by a time and memory complexity that are at least quadratic in the number of observations. To overcome this difficulty, this article proposes to start the hierarchical agglomeration from an efficient classification of the data in many classes rather than from the usual set of singleton clusters. This initial partition is derived from a subgraph of the minimum spanning tree associated with the data. To this end, we develop graphical tools that assess the presence of clusters in the data and uncover observations difficult to classify. We use this approach to analyze two large, real datasets: a multiband MRI image of the human brain and data on global precipitation climatology. We use the real datasets to discuss ways of integrating the spatial information in the clustering analysis. We focus on two-stage methods, in which a second stage of processing using established methods is applied to the output from the algorithm presented in this article, viewed as a first stage.  相似文献   
109.
This paper presents a geocast technique for underwater sensor networks. The model named as Routing and Multicast Tree based Geocasting (RMTG) (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) has been designed for underwater sensor networks. In our previous work (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) we proposed only a theoretical model for underwater geocasting. The RMTG technique uses greedy forwarding and previous hop handshaking to route the packets towards the geocast region and further disseminates the data within the geocast region by creating a multicast shortest path tree. We also presented various link broken scenarios along with their solutions. The proposed model does not use the flooding technique to deliver the packets inside the geocast region that is used in most of the geocasting techniques. In this paper, we present the simulated RMTG model. The simulation results show that the proposed model provides an efficient distribution of data in the geocast region in terms of node mobility handling, packet delivery ratio and a better end‐to‐end latency. Most of the work on geocasting has been done for mobile and vehicular ad hoc networks; hence we present in this paper a novel simulated model for underwater environment. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
110.
Two criteria in a combinatorial problem are often combined in a weighted sum objective using a weighting parameter between 0 and 1. For special problem types, e.g., when one of the criteria is a bottleneck value, efficient algorithms are known that solve for a given value of the weighting parameter.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号