首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   96087篇
  免费   9419篇
  国内免费   7825篇
化学   27106篇
晶体学   348篇
力学   7138篇
综合类   1322篇
数学   25593篇
物理学   25047篇
无线电   26777篇
  2024年   214篇
  2023年   957篇
  2022年   1635篇
  2021年   1994篇
  2020年   2111篇
  2019年   2172篇
  2018年   1917篇
  2017年   2403篇
  2016年   2781篇
  2015年   2764篇
  2014年   4393篇
  2013年   6125篇
  2012年   4795篇
  2011年   5155篇
  2010年   4259篇
  2009年   5153篇
  2008年   5780篇
  2007年   6235篇
  2006年   5882篇
  2005年   4917篇
  2004年   4457篇
  2003年   4448篇
  2002年   3919篇
  2001年   3341篇
  2000年   3158篇
  1999年   2748篇
  1998年   2469篇
  1997年   2055篇
  1996年   1922篇
  1995年   1680篇
  1994年   1536篇
  1993年   1307篇
  1992年   1248篇
  1991年   1000篇
  1990年   799篇
  1989年   669篇
  1988年   589篇
  1987年   452篇
  1986年   380篇
  1985年   449篇
  1984年   453篇
  1983年   221篇
  1982年   350篇
  1981年   413篇
  1980年   314篇
  1979年   297篇
  1978年   221篇
  1977年   209篇
  1976年   156篇
  1974年   113篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
3.
In mine planning problems, cutoff grade optimization defines a threshold at every time period such that material above this value is processed, and the rest is considered waste. In orebodies with multiple minerals, which occur in practice, the natural extension is to consider a cutoff surface. We show that in two dimensions the optimal solution is a line, and in n dimensions it is a hyperplane.  相似文献   
4.
This paper infers from a generalized Picone identity the uniqueness of the stable positive solution for a class of semilinear equations of superlinear indefinite type, as well as the uniqueness and global attractivity of the coexistence state in two generalized diffusive prototypes of the symbiotic and competing species models of Lotka–Volterra. The optimality of these uniqueness theorems reveals the tremendous strength of the Picone identity.  相似文献   
5.
The effect of the emergency perception of bystanders of cyberbullying victims on helping behaviors is often neglected in research on cyberbullying. In this study, we explored the influence of this cognitive factor on cyber-bystanders’ helping tendencies as well as elucidated possible underlying processes. The results of two studies were reported. In Study 1, 150 undergraduates read a true case of a girl experiencing cyberbullying. The results indicated that when the participants perceived the victim’s situation to be more critical (i.e., higher emergency perception), their helping tendencies were stronger, partly through increased state empathy followed by feelings of responsibility to help. In Study 2, we randomly assigned 300 undergraduates to two groups. The low emergency group read the same cyberbullying case as Study 1, whereas the cyberbullying case read by the high emergency group contained additional emergency information of the victim. The results indicated that the high emergency group expressed stronger helping tendencies than did the low emergency group. This effect was caused by a stronger perception that the victim was in an emergency situation, which not only strengthened the participants’ helping tendencies directly but also indirectly through increasing their state empathy and feelings of responsibility to help.  相似文献   
6.
In this paper we consider minimizers of the functionalmin{λ1(Ω)++λk(Ω)+Λ|Ω|,:ΩD open} where DRd is a bounded open set and where 0<λ1(Ω)λk(Ω) are the first k eigenvalues on Ω of an operator in divergence form with Dirichlet boundary condition and with Hölder continuous coefficients. We prove that the optimal sets Ω have finite perimeter and that their free boundary ΩD is composed of a regular part, which is locally the graph of a C1,α-regular function, and a singular part, which is empty if d<d, discrete if d=d and of Hausdorff dimension at most dd if d>d, for some d{5,6,7}.  相似文献   
7.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
8.
科学评价大学生科研创新能力对我国科研水平的提高具有重要意义.采用机器学习模型来预测大学生科研能力可以起到良好的效果,提出一种GAXGBoost模型来实现对大学生的科研能力预测.此模型是以Xgboost算法为基础,然后充分利用遗传算法的全局搜索能力自动搜索Xgboost最优超参数,避免了人为经验调参不准确的缺陷,最后采用精英选择策略以此确保每一轮都是最佳的进化结果.通过分析表明,所采用的GAXGBoost模型在大学生科研能力预测的结果中具有很高的精度,将此模型与Logistic Regression、Random Forest、SVM等模型进行对比,GAXGBoost模型的预测精度最高.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号