首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   558篇
  免费   25篇
  国内免费   38篇
化学   12篇
力学   25篇
综合类   12篇
数学   494篇
物理学   78篇
  2024年   2篇
  2023年   4篇
  2022年   6篇
  2021年   11篇
  2020年   15篇
  2019年   14篇
  2018年   8篇
  2017年   5篇
  2016年   18篇
  2015年   3篇
  2014年   16篇
  2013年   30篇
  2012年   18篇
  2011年   22篇
  2010年   20篇
  2009年   29篇
  2008年   33篇
  2007年   35篇
  2006年   39篇
  2005年   34篇
  2004年   41篇
  2003年   23篇
  2002年   31篇
  2001年   24篇
  2000年   32篇
  1999年   14篇
  1998年   13篇
  1997年   16篇
  1996年   10篇
  1995年   9篇
  1994年   12篇
  1993年   5篇
  1992年   5篇
  1991年   2篇
  1990年   2篇
  1988年   1篇
  1987年   2篇
  1985年   1篇
  1984年   4篇
  1982年   1篇
  1980年   2篇
  1979年   1篇
  1978年   3篇
  1976年   1篇
  1972年   1篇
  1971年   1篇
  1969年   1篇
  1959年   1篇
排序方式: 共有621条查询结果,搜索用时 16 毫秒
81.
We present a bounded modified realisability and a bounded functional interpretation of intuitionistic nonstandard arithmetic with nonstandard principles.The functional interpretation is the intuitionistic counterpart of Ferreira and Gaspar's functional interpretation and has similarities with Van den Berg, Briseid and Safarik's functional interpretation but replacing finiteness by majorisability.We give a threefold contribution: constructive content and proof-theoretical properties of nonstandard arithmetic; filling a gap in the literature; being in line with nonstandard methods to analyse compactness arguments.  相似文献   
82.
Greg Oman  Adam Salminen 《代数通讯》2018,46(5):2109-2122
In Oman and Salminen [19 Oman, G., Salminen, A. Residually small commutative rings. J. Commut. Algebra (17 pages as a preprint, to appear). [Google Scholar]], the authors introduce and study residually small rings, defined as follows: an infinite commutative ring R with identity is residually smallif for every rR?{0}, there exists an ideal Ir of R such that r?Ir and |RIr|<|R|. The purpose of this note is to extend our study. In particular, we continue our investigation of residually small rings and then generalize this notion to modules.  相似文献   
83.
We introduce a new axiom called inductive dichotomy, a weak variant of the axiom of inductive definition, and analyze the relationships with other variants of inductive definition and with related axioms, in the general second order framework, including second order arithmetic, second order set theory and higher order arithmetic. By applying these results to the investigations on the determinacy axioms, we show the following. (i) Clopen determinacy is consistency-wise strictly weaker than open determinacy in these frameworks, except second order arithmetic; this is an enhancement of Schweber–Hachtman separation of open and clopen determinacy into the consistency-wise separation. (ii) Hausdorff–Kuratowski hierarchy of differences of opens is faithfully reflected by the hierarchy of consistency strengths of corresponding parameter-free determinacies in the aforementioned frameworks; this result is valid also in second order arithmetic only except clopen determinacy.  相似文献   
84.
Liu  Jianya  Wu  Jie  Xi  Ping 《中国科学 数学(英文版)》2020,63(1):23-38
We consider the numberπ(x,y;q,a)of primes p≤such that p≡a(mod q)and(p-a)/q is free of prime factors greater than y.Assuming a suitable form of Elliott-Halberstam conjecture,it is proved thatπ(x,y:q,a)is asymptotic to p(log(x/q)/log y)π(x)/φ(q)on average,subject to certain ranges of y and q,where p is the Dickman function.Moreover,unconditional upper bounds are also obtained via sieve methods.As a typical application,we may control more effectively the number of shifted primes with large prime factors.  相似文献   
85.
In this paper we design and implement rigorous algorithms for computing symbolic dynamics for piecewise-monotone-continuous maps of the interval. The algorithms are based on computing forwards and backwards approximations of the boundary, discontinuity and critical points. We explain how to handle the discontinuities in the symbolic dynamics which occur when the computed partition element boundaries are not disjoint. The method is applied to compute the symbolic dynamics and entropy bounds for the return map of the singular limit of a switching system with hysteresis and the forced Van der Pol equation.  相似文献   
86.
The main purpose of this paper is to give a proof of quantitative resonance and condensation principles via Baire category arguments in contrast to the gliding hump method used previously. Thereby a new nonquantitative resonance principle is established which is concerned with dominated convergence in Frechet spaces, by the way yielding more detailed information on the structure of the underlying spaces. On the other hand, Baire's approach is an easy tool to develop condensation principles by considering residual sets. Finally, some typical applications concerning trigonometric Fourier partial sums may illustrate the result received.  相似文献   
87.
We propose a generalization of the structured doubling algorithm to compute invariant subspaces of structured matrix pencils that arise in the context of solving linear quadratic optimal control problems. The new algorithm is designed to attain better accuracy when the classical Riccati equation approach for the solution of the optimal control problem is not well suited because the stable and unstable invariant subspaces are not well separated (because of eigenvalues near or on the imaginary axis) or in the case when the Riccati solution does not exist at all. We analyze the convergence of the method and compare the new method with the classical structured doubling algorithm as well as some structured QR methods. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
88.
Abstract

Motivated by the increasing interest in past-dependent asset pricing models, shown in recent years by market practitioners and prominent authors such as Hobson and Rogers (1998 Hobson, D. and Rogers, L. C. G. 1998. Complete models with stochastic volatility. Mathematical Finance, 8(1): 2748.  [Google Scholar], Complete models with stochastic volatility, Mathematical Finance, 8(1), pp. 27–48), we explore option pricing techniques for arithmetic Asian options under a stochastic delay differential equation approach. We obtain explicit closed-form expressions for a number of lower and upper bounds and compare their accuracy numerically.  相似文献   
89.
It is recommended in the mathematics education literature that pupils be presented with equality statements that can be assessed for numerical balance by attending to notational structure rather than computation. I describe an alternative, diagrammatic approach in which pupils do not assess statements but instead use them to make substitutions of notation. I report on two trials of a computer-based task conducted with pairs of pupils and highlight two findings. First, the pupils found it useful to articulate the distinct substitutive effects of commutative (‘swap’, ‘switch’) and partitional (‘split’, ‘separate’) statements when working on the task. Secondly, the pupils did not notice that some of the statements presented were in fact false, which suggests their substituting activities were independent of numerical equivalence conceptions. This demonstrates that making substitutions offers task designers a mathematical utility for equality statements that is distinct from, but complementary to, assessing numerical balance.  相似文献   
90.
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号