首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10083篇
  免费   1080篇
  国内免费   650篇
化学   229篇
晶体学   41篇
力学   4591篇
综合类   119篇
数学   5026篇
物理学   1807篇
  2024年   6篇
  2023年   98篇
  2022年   102篇
  2021年   170篇
  2020年   279篇
  2019年   228篇
  2018年   257篇
  2017年   298篇
  2016年   360篇
  2015年   256篇
  2014年   408篇
  2013年   766篇
  2012年   463篇
  2011年   553篇
  2010年   477篇
  2009年   558篇
  2008年   538篇
  2007年   583篇
  2006年   551篇
  2005年   566篇
  2004年   488篇
  2003年   476篇
  2002年   439篇
  2001年   402篇
  2000年   362篇
  1999年   354篇
  1998年   332篇
  1997年   265篇
  1996年   216篇
  1995年   169篇
  1994年   132篇
  1993年   98篇
  1992年   112篇
  1991年   103篇
  1990年   74篇
  1989年   45篇
  1988年   33篇
  1987年   34篇
  1986年   29篇
  1985年   34篇
  1984年   24篇
  1983年   25篇
  1982年   13篇
  1981年   7篇
  1980年   6篇
  1979年   6篇
  1977年   4篇
  1973年   2篇
  1959年   2篇
  1957年   3篇
排序方式: 共有10000条查询结果,搜索用时 218 毫秒
31.
In the present paper we give necessary and sufficient conditions for the subgroup separability of the fundamental group of a finite graph of groups with finitely generated abelian vertex groups.

  相似文献   

32.
A preconditioning approach based on the artificial compressibility formulation is extended to solve the governing equations for unsteady turbulent reactive flows with heat release, at low Mach numbers, on an unstructured hybrid grid context. Premixed reactants are considered and a flamelet approach for combustion modelling is adopted using a continuous quenched mean reaction rate. An overlapped cell‐vertex finite volume method is adopted as a discretisation scheme. Artificial dissipation terms for hybrid grids are explicitly added to ensure a stable, discretised set of equations. A second‐order, explicit, hybrid Runge–Kutta scheme is applied for the time marching in pseudo‐time. A time derivative of the dependent variable is added to recover the time accuracy of the preconditioned set of equations. This derivative is discretised by an implicit, second‐order scheme. The resulting scheme is applied to the calculation of an infinite planar (one‐dimensional) turbulent premixed flame propagating freely in reactants whose turbulence is supposed to be frozen, homogeneous and isotropic. The accuracy of the results obtained with the proposed method proves to be excellent when compared to the data available in the literature. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
33.
We consider the Signorini problem with Coulomb friction in elasticity. Sufficient conditions of non‐uniqueness are obtained for the continuous model. These conditions are linked to the existence of real eigenvalues of an operator in a Hilbert space. We prove that, under appropriate conditions, real eigenvalues exist for a non‐local Coulomb friction model. Finite element approximation of the eigenvalue problem is considered and numerical experiments are performed. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
34.
For the Boussinesq approximation of the equations of coupled heat and fluid flow in a porous medium we show that the corresponding system of partial differential equations possesses a global attractor. We give lower and upper bounds of the Hausdorff dimension of the attractor depending on a physical parameter of the system, namely the Rayleigh number of the flow. Numerical experiments confirm the theoretical findings and raise new questions on the structure of the solutions of the system. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
35.
In this paper, a unified approach for analysing finite dimensional approximations to a class of partial differential equations boundary value problems (second‐kind Fredholm differential equations) is introduced. The approach is shown to be general despite of its extremely simple form. In particular, it is expected to be useful in the convergence analysis of finite element methods for solving PDE problems. Three specific examples are presented to illustrate the broad applicability of the approach. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
36.
美式期权定价中非局部问题的有限元方法   总被引:2,自引:1,他引:1  
在本文中 ,我们关心的是美式期权的有限元方法 .首先 ,根据 [4 ]我们对所讨论的问题引进一个新奇的实用的方法 ,它涉及到对原问题重新形成准确的数学公式 ,使得数值解的计算可以在非常小的区域上进行 ,从而该算法计算速度快精度高 .进而 ,我们利用超逼近分析技术得到了有限元解关于 L2 -模的最优估计 .  相似文献   
37.
38.
We study the solvability and Galerkin approximation of an exterior hyperelastic interface problem arising in plane elasticity. The weak formulation is obtained from an appropriate combination of a mixed finite element approach with a Dirichlet-to-Neumann method. The derivation of our results is based on some tools from nonlinear functional analysis and the Babuska-Brezzi theory for variational problems with constraints.  相似文献   
39.
The analysis of mechanical structures using the Finite Element Method in the framework of large elastoplastic strain, needs frequent remeshing of the deformed domain during computation. Indeed, the remeshing is due to the large geometrical distortion of finite elements and the adaptation to the physical behavior of the solution. This paper gives the necessary steps to remesh a mechanical structure during large elastoplastic deformations with damage. An important part of this process is constituted by geometrical and physical error estimates. The proposed method is integrated in a computational environment using the ABAQUS/Explicit solver and the BL2D-V2 adaptive mesher. To cite this article: H. Borouchaki et al., C. R. Mecanique 330 (2002) 709–716.  相似文献   
40.
Montgomery Multiplication in GF(2k)   总被引:8,自引:0,他引:8  
We show that the multiplication operation c=a · b · r-1 in the field GF(2k can be implemented significantly faster in software than the standard multiplication, where r is a special fixed element of the field. This operation is the finite field analogue of the Montgomery multiplication for modular multiplication of integers. We give the bit-level and word-level algorithms for computing the product, perform a thorough performance analysis, and compare the algorithm to the standard multiplication algorithm in GF(2k. The Montgomery multiplication can be used to obtain fast software implementations of the discrete exponentiation operation, and is particularly suitable for cryptographic applications where k is large.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号