首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   57796篇
  免费   2776篇
  国内免费   2762篇
自然科学   63334篇
  2024年   158篇
  2023年   712篇
  2022年   1027篇
  2021年   1040篇
  2020年   747篇
  2019年   291篇
  2018年   1116篇
  2017年   1287篇
  2016年   991篇
  2015年   1338篇
  2014年   1842篇
  2013年   1720篇
  2012年   2103篇
  2011年   3004篇
  2010年   2840篇
  2009年   2883篇
  2008年   3263篇
  2007年   3344篇
  2006年   2180篇
  2005年   2123篇
  2004年   1618篇
  2003年   1579篇
  2002年   1686篇
  2001年   1618篇
  2000年   1738篇
  1999年   2714篇
  1998年   2404篇
  1997年   2453篇
  1996年   2256篇
  1995年   2002篇
  1994年   1748篇
  1993年   1490篇
  1992年   1338篇
  1991年   1192篇
  1990年   1020篇
  1989年   895篇
  1988年   755篇
  1987年   463篇
  1986年   240篇
  1985年   89篇
  1984年   16篇
  1983年   6篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Many pretrained deep learning models have been released to help engineers and researchers develop deep learning-based systems or conduct research with minimall effort. Previous work has shown that at secret message can be embedded in neural network parameters without compromising the accuracy of the model. Malicious developers can, therefore, hide malware or other baneful information in pretrained models, causing harm to society. Hence, reliable detection of these vicious pretrained models is urgently needed. We analyze existing approaches for hiding messages and find that they will ineluctably cause biases in the parameter statistics. Therefore, we propose steganalysis methods for steganography on neural network parameters that extract statistics from benign and malicious models and build classifiers based on the extracted statistics. To the best of our knowledge, this is the first study on neural network steganalysis. The experimental results reveal that our proposed algorithm can effectively detect a model with an embedded message. Notably, our detection methods are still valid in cases where the payload of the stego model is low.  相似文献   
2.
为探究区块链技术在生鲜农产品流通过程中如何保障质量安全,利用演化博弈方法探究监管部门与生鲜农产品生产商关于生鲜食品质量安全溯源博弈过程.构建监管部门与生鲜农产品生产商的质量安全溯源的博弈支付矩阵,并进一步确立质量安全溯源的复制动态方程.通过对二维复制动态系统进行求解初步得到系统的平衡点,再分析平衡点的局部稳定性情况.结果显示,当生产商生产质量安全生鲜产品的收益大于生产不安全生鲜产品的收益时,双方博弈将最终演化到理想状态(1,0),即生产商将生产质量安全的生鲜农产品而监管部门选择不监管.由此可知,当生产商生产质量不安全的产品会获得更多收益时,监管部门可以采取罚金的方式来规范生产商安全生产.  相似文献   
3.
随着信息技术发展,设备健康数据与知识图谱技术结合为设备健康发展带来新的发展机遇,知识图谱利用其多种特异性优势,使企业系统中积累的海量设备维修数据得到有效整合利用.本文提出基于知识图谱的核电设备健康管理知识建模与分析方法,并根据实体关系模型构建维修知识图谱本体框架,同时基于核电企业实际的维修工单数据,从统计分析和关联分析两方面取得良好的实践效果.研究结果表明,知识图谱能够在设备维修知识的集成上解决传统的数据孤岛问题,同时能基于故障的可视化分析为维修人员和管理人员提供决策和知识支持.  相似文献   
4.
For evaluating the influence of the Chinese renminbi(RMB) joining in the special drawing right(SDR) basket on RMB's internationalization, the authors systemically study the risk spillover networks and examine the dynamic relationship of exchange rates among the SDR currencies including the US dollar(USD), European Union euro(EUR), Japanese yen(JPY) and British pound(GBP).The empirical results demonstrate that the USD takes a dominant position and holds the biggest risk spillover to other currencies, and the RMB's inclusion to the SDR basket makes the risk spillover to get average, giving rise to the SDR currency system more stable to a certain degree. The inclusion of the RMB in the SDR not only can reduce the systematic risk of the SDR, but also has a certain impact on the international exchange rate markets. Nowadays, in front of the growing trade friction, more such researches could help to effectively deal with the currency disputes.  相似文献   
5.
为提高移动通信系统的性能,构建了一个存在主网络干扰和窃听者的双向认知中继网络的物理层安全传输模型,设计了一种中继选择和功率分配的联合优化策略,用于对抗窃听者,保护收发节点的信息传输。通过仿真分析得出,此非凸优化问题限制条件较多,难以保证粒子群优化算法随机生成的初始解的可行性,从而造成求解困难。提出了一种基于可变网格优化和粒子群优化算法的混合优化算法。仿真结果表明此算法提高了次级网络的保密速率,提升了次级网络的安全性能。  相似文献   
6.
7.
8.
9.
The α7 nicotinic receptor is a promising drug target for neurological and inflammatory disorders. Although it is the homomeric member of the family, a novel α7β2 heteromeric receptor has been discovered. To decipher the functional contribution of the β2 subunit, we generated heteromeric receptors with fixed stoichiometry by two different approaches comprising concatenated and unlinked subunits. Receptors containing up to three β2 subunits are functional. As the number of β2 subunits increases in the pentameric arrangement, the durations of channel openings and activation episodes increase progressively probably due to decreased desensitization. The prolonged activation episodes conform the kinetic signature of α7β2 and may have an impact on neuronal excitability. For activation of α7β2 receptors, an α7/α7 binding-site interface is required, thus indicating that the three β2 subunits are located consecutively in the pentameric arrangement. α7-positive allosteric modulators (PAMs) are emerging as novel therapeutic drugs. The presence of β2 in the pentamer affects neither type II PAM potentiation nor activation by an allosteric agonist whereas it impairs type I PAM potentiation. This first single-channel study provides fundamental basis required to decipher the role and function of the novel α7β2 receptor and opens doors to develop selective therapeutic drugs.  相似文献   
10.
The growth and proliferation of metazoan cells are driven by cellular nutrient status and by extracellular growth factors. Growth factor receptors on cell surfaces initiate biochemical signals that increase anabolic metabolism and macropinocytosis, an actin-dependent endocytic process in which relatively large volumes of extracellular solutes and nutrients are internalized and delivered efficiently into lysosomes. Macropinocytosis is prominent in many kinds of cancer cells, and supports the growth of cells transformed by oncogenic K-Ras. Growth factor receptor signaling and the overall metabolic status of the cell are coordinated in the cytoplasm by the mechanistic target-of-rapamycin complex-1 (mTORC1), which positively regulates protein synthesis and negatively regulates molecular salvage pathways such as autophagy. mTORC1 is activated by two distinct Ras-related small GTPases, Rag and Rheb, which associate with lysosomal membranes inside the cell. Rag recruits mTORC1 to the lysosomal surface where Rheb directly binds to and activates mTORC1. Rag is activated by both lysosomal luminal and cytosolic amino acids; Rheb activation requires phosphoinositide 3-kinase, Akt, and the tuberous sclerosis complex-1/2. Signals for activation of Rag and Rheb converge at the lysosomal membrane, and several lines of evidence support the idea that growth factor-dependent endocytosis facilitates amino acid transfer into the lysosome leading to the activation of Rag. This review summarizes evidence that growth factor-stimulated macropinocytosis is essential for amino acid-dependent activation of mTORC1, and that increased solute accumulation by macropinocytosis in transformed cells supports unchecked cell growth.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号