首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   924篇
  免费   101篇
  国内免费   30篇
化学   138篇
晶体学   1篇
力学   18篇
综合类   53篇
数学   536篇
物理学   309篇
  2024年   3篇
  2023年   19篇
  2022年   63篇
  2021年   57篇
  2020年   38篇
  2019年   44篇
  2018年   17篇
  2017年   52篇
  2016年   37篇
  2015年   21篇
  2014年   41篇
  2013年   54篇
  2012年   43篇
  2011年   35篇
  2010年   33篇
  2009年   47篇
  2008年   69篇
  2007年   40篇
  2006年   36篇
  2005年   34篇
  2004年   29篇
  2003年   32篇
  2002年   24篇
  2001年   18篇
  2000年   7篇
  1999年   12篇
  1998年   7篇
  1997年   9篇
  1996年   14篇
  1995年   3篇
  1994年   8篇
  1993年   8篇
  1992年   3篇
  1991年   5篇
  1990年   5篇
  1989年   6篇
  1988年   5篇
  1987年   6篇
  1986年   13篇
  1985年   10篇
  1984年   8篇
  1983年   3篇
  1982年   4篇
  1981年   4篇
  1980年   4篇
  1979年   7篇
  1978年   3篇
  1977年   4篇
  1976年   7篇
  1974年   4篇
排序方式: 共有1055条查询结果,搜索用时 14 毫秒
1.
Defining speed of diffusion as the amount of time it takes to get from one penetration level to a higher one, we introduce a dynamic model in which we study the link between pricing policy, speed of diffusion, and number of competitors in the market. Our analysis shows that, in the case of strategic (oligopolistic) competition, the speed of diffusion has an important influence on the optimal pricing policy. In particular, we find that higher speeds of diffusion create an incentive to strategically interacting firms to lower their prices.  相似文献   
2.
本文实证研究了创业投资产业与金融体系的内在关系,并对目前我国以银行为中心的金融体系下发展创业投资产业提出了一些建议.  相似文献   
3.
Ying Tsung Lu  Sien Chi 《Optik》2003,114(4):161-167
This study presents a compact optical configuration that can generate a multiplex dot-matrix hologram with complex interlaced images for anti-counterfeiting applications on valuable paper. Varying the orientation of the interference plane can enable the multiplex hologram to be recorded without changing the interference angle of two laser beams. With its simple asymmetric optical setup, a multiplex hologram with many interlaced images can be efficiently fabricated, increasing the cost of imitation. Experimental details of the asymmetric optical setup are also described.  相似文献   
4.
This article seeks to ascertain whether the strategy‐learning model of Hanaki, Sethi, Erev, and Peterhansl (2003) better accounts for observed behavior than do the various action‐learning models. It does so by measuring the goodness‐of‐fit of the models' predictions against published experimental results for such games as Coordination, Prisoner's Dilemma, and Chicken. The fit is measured via the mean squared deviation (MSD) between the observed behavior and the one predicted by the model. The results show that, for Chicken, the strategy‐learning model fits the observed data much better than do the action‐learning models. The best action‐learning model, on the other hand, fits the observed data well in Coordination. Overall, the strength of the strategy‐learning model is best shown in games where alternations between the two stage‐game Nash equilibria are often observed in the laboratory experiments. © 2004 Wiley Periodicals, Inc. Complexity 9: 41–50, 2004  相似文献   
5.
证券价格按几何布朗运动变化的微观解释   总被引:10,自引:1,他引:9  
金融市场研究中经常不加解释地假设证券价格按几何布朗运动变化 .本文通过假定投资者要求来自证券的期望收益率与证券价格无关 ,在理想市场的前提条件下 ,对证券价格运动将遵循有漂移率的几何布朗运动给予严格的证明 .  相似文献   
6.
Quantum Key Distribution Using Four-Qubit W State   总被引:3,自引:0,他引:3  
A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication.  相似文献   
7.
为了科学构建原油价格波动与国民经济发展的关系,在借鉴国内外专家学者相关模型基础上,考虑不同国民经济指标对油价波动的时滞反馈等因素,构建油价波动对国民经济影响模型.利用原油价格波动对国民经济发展的动态模型,对模型的各部分关系系数进行确定,最后根据所得到的模型对国民经济影响进行实际分析与预测,并得出规避油价波动影响风险的措施.  相似文献   
8.
Noninferior Nash Strategies for Multi-Team Systems   总被引:1,自引:0,他引:1  
This paper is concerned with the optimization of systems that are controlled by several teams of decision makers. The decision makers within each team cooperate for the benefit of their team. On the other hand, the teams compete among themselves in order to achieve an objective that relates to the overall performance of the system. An approach that merges concepts from team theory and game theory for dealing with such systems and a solution called the noninferior Nash strategy are introduced. This multi-team solution provides a new framework for analyzing hierarchically controlled systems so as to address complicated coordination problems among the decision makers. The properties of the noninferior Nash solution in static multi-team systems are investigated and necessary conditions for its existence are derived. Analytical expressions for the noninferior Nash strategies are derived for a class of linear-quadratic static multi-team games. In order to deal with the issue of nonuniqueness of the solution, the concept of a noninferior Nash strategy with a team leader is introduced. Several examples are presented to illustrate the results.  相似文献   
9.
典型的进化策略受自然进化过程的启发而成为求解全局优化问题的重要方法。传统的ES变异算子作为一个主要的进化技术是建立在正态分布的随机变量基础上的,本文提出了基于指数分布的进化策略由于采用了新的变异算子有效地减少了产生探试解的成本,从而优于传统的进化策略。  相似文献   
10.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations have confirmed the validity of the proposed encryption scheme and simple decryption architecture.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号