首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   104063篇
  免费   4879篇
  国内免费   3217篇
数理化   112159篇
  2024年   106篇
  2023年   592篇
  2022年   1067篇
  2021年   1068篇
  2020年   1101篇
  2019年   1041篇
  2018年   11161篇
  2017年   10899篇
  2016年   7273篇
  2015年   2115篇
  2014年   1816篇
  2013年   2351篇
  2012年   6127篇
  2011年   12763篇
  2010年   7158篇
  2009年   7511篇
  2008年   8223篇
  2007年   10113篇
  2006年   1566篇
  2005年   2427篇
  2004年   2354篇
  2003年   2617篇
  2002年   1610篇
  2001年   756篇
  2000年   801篇
  1999年   778篇
  1998年   716篇
  1997年   664篇
  1996年   681篇
  1995年   578篇
  1994年   459篇
  1993年   437篇
  1992年   337篇
  1991年   313篇
  1990年   287篇
  1989年   244篇
  1988年   203篇
  1987年   181篇
  1986年   150篇
  1985年   140篇
  1984年   105篇
  1983年   86篇
  1982年   93篇
  1981年   60篇
  1980年   58篇
  1979年   48篇
  1914年   45篇
  1912年   40篇
  1909年   41篇
  1908年   40篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
How, in a discretized model, to utilize the duality and complementarity of two saddle point variational principles is considered in the paper. A homology family of optimality conditions, different from the conventional saddle point conditions of the domain-decomposed Hellinger-Reissner principle, is derived to enhance stability of hybrid finite element schemes. Based on this, a stabilized hybrid method is presented by associating element-interior displacement with an element-boundary one in a nonconforming manner. In addition, energy compatibility of strain-enriched displacements with respect to stress terms is introduced to circumvent Poisson-locking.

  相似文献   

52.
On effectiveness of wiretap programs in mapping social networks   总被引:1,自引:0,他引:1  
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost. Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php  相似文献   
53.
For ϕ a δ-subharmonic function, sharp results are obtained that connectA(r, ϕ), B(r, ϕ) andT(r, ϕ), whereA(r, ϕ)=inf|z|=r ϕ(z),B(r, ϕ)=sup|z|=r ϕ(z), andT(r, ϕ) is the Nevanlinna characteristics.  相似文献   
54.
55.
The fusion evaporation reaction 122Sn(14N, 4n)132La was used to populate the high-spin states of 132La at the beam energy of 60 MeV. A new band consisting of mostly E2 transitions has been discovered. This band has the interesting links to the ground state 2- and the isomeric state 6-. A new transition of energy 351 keV connecting the low-spin states of the positive-parity band based on the πh 11/2 ⊗ νh 11/2 particle configuration, has been found. This has played a very important role in resolving the existing ambiguities and inconsistencies in the spin assignment of the band head. Received: 12 August 2002 / Accepted: 18 March 2003 / Published online: 7 May 2003  相似文献   
56.
The results of a numerical study are described in which the interactions of a primary shock wave with a secondary diaphragm in expansion tubes are taken into account. The developing wave pattern in the interacting process of the shock with a secondary diaphragm are visualized by many kinds of figures (e.g., the time-distance diagrams of the wave phenomena on the axis, the acoustic impedance contours, and the time histories of the pitot pressure on the axis), and the influences of the shape and rupture process of the diaphragm on the quality of the test gas are explored.  相似文献   
57.
In order to reduce infant mortality in the municipality of Rio de Janeiro it is desired to encourage all mothers-to-be to attend the appropriate health care facilities. A 3-level hierarchical prenatal–neonatal health care system is described together with a basic model for optimising accessibility to facilities. A genetic algorithm to solve the basic model is developed and some numerical experience reported. Extensions to the basic model and planned future research are briefly indicated.  相似文献   
58.
 We prove a precise inversion of adjunction formula for the log variety (ℂ d +1,X), where X is a non-degenerate hypersurface. As a corollary, the minimal log discrepancies of non-degenerate normal hypersurface singularities are bounded by dimension. Received: 17 September 2002 / Revised version: 22 November 2002 Published online: 14 February 2003 Current address: DPMMS, CMS, University of Cambridge, Wilberforce Road, Cambridge CB3 0WB, England. e-mail: f.ambro@dpmms.cam.ac.uk Mathematics Subject Classification (2000): Primary 14B05; Secondary 14M25, 52B20  相似文献   
59.
Amphiphilic tris(2,2′‐bipyridine)ruthenium‐cored star‐shaped polymers consisting of one polystyrene block and two poly(N‐isopropylacrylamide) blocks were prepared by the “arm‐first” method in which RAFT polymerization and nonconvalent ligand–metal complexation were employed. The prepared amphiphilic star‐shaped metallopolymers are able to form micelles in water. The size and distribution of the micelles were studied by dynamic light scattering and transmission electron microscopy techniques. Preliminary studies indicate that the polymer concentration and the hydrophilic poly(N‐isopropylacrylamide) block length can affect the morphologies of the formed metal‐interfaced core–shell micelles in water. © 2007 Wiley Periodicals, Inc. J Polym Sci Part A: Polym Chem 45: 4204–4210, 2007  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号