全文获取类型
收费全文 | 4284篇 |
免费 | 333篇 |
国内免费 | 357篇 |
专业分类
化学 | 167篇 |
力学 | 175篇 |
综合类 | 107篇 |
数学 | 3971篇 |
物理学 | 554篇 |
出版年
2024年 | 3篇 |
2023年 | 67篇 |
2022年 | 80篇 |
2021年 | 132篇 |
2020年 | 135篇 |
2019年 | 113篇 |
2018年 | 121篇 |
2017年 | 116篇 |
2016年 | 137篇 |
2015年 | 82篇 |
2014年 | 160篇 |
2013年 | 344篇 |
2012年 | 156篇 |
2011年 | 227篇 |
2010年 | 195篇 |
2009年 | 278篇 |
2008年 | 272篇 |
2007年 | 292篇 |
2006年 | 272篇 |
2005年 | 228篇 |
2004年 | 177篇 |
2003年 | 172篇 |
2002年 | 181篇 |
2001年 | 144篇 |
2000年 | 155篇 |
1999年 | 132篇 |
1998年 | 107篇 |
1997年 | 92篇 |
1996年 | 74篇 |
1995年 | 53篇 |
1994年 | 55篇 |
1993年 | 34篇 |
1992年 | 26篇 |
1991年 | 17篇 |
1990年 | 17篇 |
1989年 | 5篇 |
1988年 | 13篇 |
1987年 | 10篇 |
1986年 | 24篇 |
1985年 | 27篇 |
1984年 | 13篇 |
1983年 | 9篇 |
1982年 | 9篇 |
1981年 | 5篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1957年 | 3篇 |
排序方式: 共有4974条查询结果,搜索用时 15 毫秒
101.
An interpolating spline-based approach is presented for modeling multi-flexible-body systems in the divide-and-conquer (DCA) scheme. This algorithm uses the floating frame of reference formulation and piecewise spline functions to construct and solve the non-linear equations of motion of the multi-flexible-body system undergoing large rotations and translations. The new approach is compared with the flexible DCA (FDCA) that uses the assumed modes method [1]. The FDCA, in many cases, must resort to sub-structuring to accurately model the deformation of the system. We demonstrate, through numerical examples, that the interpolating spline-based approach is comparable in accuracy and superior in efficiency to the FDCA. The present approach is appropriate for modeling flexible mechanisms with thin 1D bodies undergoing large rotations and translations, including those with irregular shapes. As such, the present approach extends the current capability of the DCA to model deformable systems. The algorithm retains the theoretical logarithmic complexity inherent in the DCA when implemented in parallel. 相似文献
102.
《Discrete Mathematics》2023,346(6):113349
The problem of reconstructing the characteristic polynomial of a graph of order at least 3 from the collection of characteristic polynomials of its vertex-deleted subgraphs was posed by Cvetkovi? in 1973 as a spectral counter part to the well-known Ulam's reconstruction conjecture. Over the last 50 years, this problem has received notable attention, many positive results have been obtained, but in the general case the problem is still unresolved. In particular, no counter example is found in literature. In this expository paper we survey classical and some more recent results concerning the polynomial reconstruction problem, discuss some related problems, variations and generalizations. 相似文献
103.
We extend the concept of the difference dimension polynomial of a difference field extension to difference local algebras. The main theorem of the paper establishes the existence and form of the dimension polynomial associated with the localization of a finitely generated well-mixed difference algebra at a prime reflexive difference ideal. 相似文献
104.
105.
Hollow materials with different configurations are of interest due to their unique structural features, which induce interesting properties e.g. catalysis. Here, the synthesis of asymmetrical hollow ball‐in‐tube (HBT) structured CeO2 is reported, which is achieved using a dual template engaged solid–liquid interfacial reaction. In this reaction, the SiO2 sphere (hard template)‐embedded Ce(OH)CO3 nanorod (sacrificial template) composite is first treated with NaOH solution, followed by an acid wash to obtain asymmetrical hollow structured CeO2. Such HBT structured CeO2 is demonstrated to be a good support for Au nanoparticles toward CO oxidation as compared to simple hollow CeO2 nanotubes, leading to significantly increase catalytic activity. 相似文献
106.
Sheldon P. Gordon 《International Journal of Mathematical Education in Science & Technology》2017,48(3):455-473
This article takes a closer look at the problem of approximating the exponential and logarithmic functions using polynomials. Either as an alternative to or a precursor to Taylor polynomial approximations at the precalculus level, interpolating polynomials are considered. A measure of error is given and the behaviour of the error function is analysed. The results of interpolating polynomials are compared with those of Taylor polynomials. 相似文献
107.
LAO HUI-XUE 《东北数学》2012,28(2)
Under the assumption of sixth power large sieve mean-value of Dirichlet L-function,we improve Bombieri's theorem in short intervals by virtue of the large sieve method and Heath-Brown's identity. 相似文献
108.
Hai Q. Dinh Xiaoqiang Wang Hongwei Liu Songsak Sriboonchitta 《Discrete Mathematics》2019,342(5):1456-1470
Let be an odd prime, , be positive integers, be nonzero elements of the finite field such that . In this paper, we show that, for any positive integer , the Hamming distances of all repeated-root -constacyclic codes of length can be determined by those of certain simple-root -constacyclic codes of length . Using this result, Hamming distances of all constacyclic codes of length are obtained. As an application, we identify all MDS -constacyclic codes of length . 相似文献
109.
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity. 相似文献