全文获取类型
收费全文 | 924篇 |
免费 | 101篇 |
国内免费 | 30篇 |
专业分类
化学 | 138篇 |
晶体学 | 1篇 |
力学 | 18篇 |
综合类 | 53篇 |
数学 | 536篇 |
物理学 | 309篇 |
出版年
2024年 | 3篇 |
2023年 | 19篇 |
2022年 | 63篇 |
2021年 | 57篇 |
2020年 | 38篇 |
2019年 | 44篇 |
2018年 | 17篇 |
2017年 | 52篇 |
2016年 | 37篇 |
2015年 | 21篇 |
2014年 | 41篇 |
2013年 | 54篇 |
2012年 | 43篇 |
2011年 | 35篇 |
2010年 | 33篇 |
2009年 | 47篇 |
2008年 | 69篇 |
2007年 | 40篇 |
2006年 | 36篇 |
2005年 | 34篇 |
2004年 | 29篇 |
2003年 | 32篇 |
2002年 | 24篇 |
2001年 | 18篇 |
2000年 | 7篇 |
1999年 | 12篇 |
1998年 | 7篇 |
1997年 | 9篇 |
1996年 | 14篇 |
1995年 | 3篇 |
1994年 | 8篇 |
1993年 | 8篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 5篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 6篇 |
1986年 | 13篇 |
1985年 | 10篇 |
1984年 | 8篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 7篇 |
1978年 | 3篇 |
1977年 | 4篇 |
1976年 | 7篇 |
1974年 | 4篇 |
排序方式: 共有1055条查询结果,搜索用时 14 毫秒
1.
Defining speed of diffusion as the amount of time it takes to get from one penetration level to a higher one, we introduce a dynamic model in which we study the link between pricing policy, speed of diffusion, and number of competitors in the market. Our analysis shows that, in the case of strategic (oligopolistic) competition, the speed of diffusion has an important influence on the optimal pricing policy. In particular, we find that higher speeds of diffusion create an incentive to strategically interacting firms to lower their prices. 相似文献
2.
本文实证研究了创业投资产业与金融体系的内在关系,并对目前我国以银行为中心的金融体系下发展创业投资产业提出了一些建议. 相似文献
3.
This study presents a compact optical configuration that can generate a multiplex dot-matrix hologram with complex interlaced images for anti-counterfeiting applications on valuable paper. Varying the orientation of the interference plane can enable the multiplex hologram to be recorded without changing the interference angle of two laser beams. With its simple asymmetric optical setup, a multiplex hologram with many interlaced images can be efficiently fabricated, increasing the cost of imitation. Experimental details of the asymmetric optical setup are also described. 相似文献
4.
Nobuyuki Hanaki 《Complexity》2004,9(5):41-50
This article seeks to ascertain whether the strategy‐learning model of Hanaki, Sethi, Erev, and Peterhansl (2003) better accounts for observed behavior than do the various action‐learning models. It does so by measuring the goodness‐of‐fit of the models' predictions against published experimental results for such games as Coordination, Prisoner's Dilemma, and Chicken. The fit is measured via the mean squared deviation (MSD) between the observed behavior and the one predicted by the model. The results show that, for Chicken, the strategy‐learning model fits the observed data much better than do the action‐learning models. The best action‐learning model, on the other hand, fits the observed data well in Coordination. Overall, the strength of the strategy‐learning model is best shown in games where alternations between the two stage‐game Nash equilibria are often observed in the laboratory experiments. © 2004 Wiley Periodicals, Inc. Complexity 9: 41–50, 2004 相似文献
5.
证券价格按几何布朗运动变化的微观解释 总被引:10,自引:1,他引:9
杨智元 《数学的实践与认识》2003,33(3):52-55
金融市场研究中经常不加解释地假设证券价格按几何布朗运动变化 .本文通过假定投资者要求来自证券的期望收益率与证券价格无关 ,在理想市场的前提条件下 ,对证券价格运动将遵循有漂移率的几何布朗运动给予严格的证明 . 相似文献
6.
Quantum Key Distribution Using Four-Qubit W State 总被引:3,自引:0,他引:3
CAO Hai-Jing SONG He-Shan 《理论物理通讯》2006,46(1):65-68
A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication. 相似文献
7.
为了科学构建原油价格波动与国民经济发展的关系,在借鉴国内外专家学者相关模型基础上,考虑不同国民经济指标对油价波动的时滞反馈等因素,构建油价波动对国民经济影响模型.利用原油价格波动对国民经济发展的动态模型,对模型的各部分关系系数进行确定,最后根据所得到的模型对国民经济影响进行实际分析与预测,并得出规避油价波动影响风险的措施. 相似文献
8.
Noninferior Nash Strategies for Multi-Team Systems 总被引:1,自引:0,他引:1
This paper is concerned with the optimization of systems that are controlled by several teams of decision makers. The decision makers within each team cooperate for the benefit of their team. On the other hand, the teams compete among themselves in order to achieve an objective that relates to the overall performance of the system. An approach that merges concepts from team theory and game theory for dealing with such systems and a solution called the noninferior Nash strategy are introduced. This multi-team solution provides a new framework for analyzing hierarchically controlled systems so as to address complicated coordination problems among the decision makers. The properties of the noninferior Nash solution in static multi-team systems are investigated and necessary conditions for its existence are derived. Analytical expressions for the noninferior Nash strategies are derived for a class of linear-quadratic static multi-team games. In order to deal with the issue of nonuniqueness of the solution, the concept of a noninferior Nash strategy with a team leader is introduced. Several examples are presented to illustrate the results. 相似文献
9.
吴慧卓 《纯粹数学与应用数学》2003,19(1):16-21
典型的进化策略受自然进化过程的启发而成为求解全局优化问题的重要方法。传统的ES变异算子作为一个主要的进化技术是建立在正态分布的随机变量基础上的,本文提出了基于指数分布的进化策略由于采用了新的变异算子有效地减少了产生探试解的成本,从而优于传统的进化策略。 相似文献
10.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption
system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image,
is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original
information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching
or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial
filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture
without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations
have confirmed the validity of the proposed encryption scheme and simple decryption architecture. 相似文献