首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5387篇
  免费   647篇
  国内免费   298篇
化学   361篇
晶体学   5篇
力学   550篇
综合类   143篇
数学   3455篇
物理学   1818篇
  2024年   15篇
  2023年   40篇
  2022年   39篇
  2021年   111篇
  2020年   146篇
  2019年   140篇
  2018年   120篇
  2017年   161篇
  2016年   169篇
  2015年   130篇
  2014年   192篇
  2013年   376篇
  2012年   230篇
  2011年   241篇
  2010年   198篇
  2009年   244篇
  2008年   302篇
  2007年   311篇
  2006年   297篇
  2005年   242篇
  2004年   226篇
  2003年   254篇
  2002年   261篇
  2001年   238篇
  2000年   246篇
  1999年   187篇
  1998年   165篇
  1997年   121篇
  1996年   102篇
  1995年   67篇
  1994年   90篇
  1993年   64篇
  1992年   66篇
  1991年   72篇
  1990年   55篇
  1989年   46篇
  1988年   48篇
  1987年   38篇
  1986年   27篇
  1985年   37篇
  1984年   52篇
  1983年   24篇
  1982年   20篇
  1981年   30篇
  1980年   14篇
  1979年   15篇
  1978年   15篇
  1977年   11篇
  1976年   11篇
  1973年   6篇
排序方式: 共有6332条查询结果,搜索用时 421 毫秒
101.
The dynamics of the one-dimensional spin glass with asymmetric interactions between neighboring spins is considered. We confine ourselves to discrete couplings with values ±J. We show that the algebraic decay of the remanent magnetization of the infinite ±J-spin chain at zero temperature is only valid for symmetric couplings. Our analytical investigations as well as computer simulations show stretched exponential decay for any finite concentration of antisymmetric bonds. Thus, the asymmetric ±J-spin chain shows an asymmetry-induced phase transition at zero temperature.  相似文献   
102.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations have confirmed the validity of the proposed encryption scheme and simple decryption architecture.  相似文献   
103.
本文对广义风险过程中的渐近方差作了非参数估计,得出并证明了两个定理,为广义风险过程中破产概率的区间估计作了理论准备.  相似文献   
104.
黄世华  王海宇 《发光学报》1998,19(3):199-201
通过在Bloch方程中增加描述对频率微扰的随机过程项{ω(t)},我们讨论了系统在窄谱带的光激发后的光谱扩散。特别是以下两种情况:1)如果ω以相同的概率变化为系综中的任一ω’,光谱是一个指数式衰减的定域峰和指数式增长的动态非均匀背底的叠加。2)如果ω'到ω的概率仅与|ω’-ω|有关,非定域峰随时间变宽。作为一个例子,我们讨论了频率受多个独立随机电报过程调制的系统中的光谱扩散。  相似文献   
105.
Functional central limit theorems for triangular arrays of rowwise independent stochastic processes are established by a method replacing tail probabilities by expectations throughout. The main tool is a maximal inequality based on a preliminary version proved by P. Gaenssler and Th. Schlumprecht. Its essential refinement used here is achieved by an additional inequality due to M. Ledoux and M. Talagrand. The entropy condition emerging in our theorems was introduced by K. S. Alexander, whose functional central limit theorem for so-calledmeasure-like processeswill be also regained. Applications concern, in particular, so-calledrandom measure processeswhich include function-indexed empirical processes and partial-sum processes (with random or fixed locations). In this context, we obtain generalizations of results due to K. S. Alexander, M. A. Arcones, P. Gaenssler, and K. Ziegler. Further examples include nonparametric regression and intensity estimation for spatial Poisson processes.  相似文献   
106.
Let l be the critical exponent associated with the probability thatl independentN-step ordinary random walks, starting at nearby points, are mutually avoiding. Using Monte Carlo methods combined with a maximum-likelihood data analysis, we find that in two dimensions 2=0.6240±0.0005±0.0011 and 3=1.4575±0.0030±0.0052, where the first error bar represents systematic error due to corrections to scaling (subjective 95% confidence limits) and the second error bar represents statistical error (classical 95% confidence limits). These results are in good agreement with the conformal-invariance predictions 2=5/8 and 3=35/24.  相似文献   
107.
Any global minimization algorithm is made by several local searches performed sequentially. In the classical multistart algorithm, the starting point for each new local search is selected at random uniformly in the region of interest. In the tunneling algorithm, such a starting point is required to have the same function value obtained by the last local minimization. We introduce the class of acceptance-rejection based algorithms in order to investigate intermediate procedures. A particular instance is to choose at random the new point approximately according to a Boltzmann distribution, whose temperatureT is updated during the algorithm. AsT 0, such distribution peaks around the global minima of the cost function, producing a kind of random tunneling effect. The motivation for such an approach comes from recent works on the simulated annealing approach in global optimization. The resulting algorithm has been tested on several examples proposed in the literature.  相似文献   
108.
The transversal Stokes flow of a Newtonian fluid through random and Sierpinski carpets is numerically calculated and the transversal permeability derived. In random carpets derived from site percolation, the average macroscopic permeability varies as (- c)3/2, close to the critical porosity c. This exponent is found to be slightly different from the conductivity exponent. Results for Sierpinski carpets are presented up to the fourth generation. The Carman equation is not verified in these two model porous media.  相似文献   
109.
Consider a unit sphere on which are placed N random spherical caps of area 4p(N). We prove that if % MathType!MTEF!2!1!+-% feaafeart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr% 4rNCHbGeaGGipm0dc9vqaqpepu0xbbG8F4rqqrFfpeea0xe9Lq-Jc9% vqaqpepm0xbba9pwe9Q8fs0-yqaqpepae9pg0FirpepeKkFr0xfr-x% fr-xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaWaa0aaaeaaca% qGSbGaaeyAaiaab2gaaaWaaeWaaeaacaWGWbWaaeWaaeaacaWGobaa% caGLOaGaayzkaaGaai4Taiaad6eacaGGVaGaaeiBaiaab+gacaqGNb% Gaaeiiaiaad6eaaiaawIcacaGLPaaacqGH8aapcaaIXaaaaa!454E!\[\overline {{\rm{lim}}} \left( {p\left( N \right)\cdotN/{\rm{log }}N} \right) < 1\], then the probability that the sphere is completely covered by N caps tends to 0 as N , and if % MathType!MTEF!2!1!+-% feaafeart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr% 4rNCHbGeaGGipm0dc9vqaqpepu0xbbG8F4rqqrFfpeea0xe9Lq-Jc9% vqaqpepm0xbba9pwe9Q8fs0-yqaqpepae9pg0FirpepeKkFr0xfr-x% fr-xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaWaaWaaaeaaca% qGSbGaaeyAaiaab2gaaaWaaeWaaeaacaWGWbWaaeWaaeaacaWGobaa% caGLOaGaayzkaaGaai4Taiaad6eacaGGVaGaaeiBaiaab+gacaqGNb% Gaaeiiaiaad6eaaiaawIcacaGLPaaacqGH+aGpcaaIXaaaaa!4551!\[\underline {{\rm{lim}}} \left( {p\left( N \right)\cdotN/{\rm{log }}N} \right) > 1\], then for any integer n>0 the probability that each point of the sphere is covered more than n times tends to 1 as N .  相似文献   
110.
Consider a sequenceF 1,F 2,... of i.i.d. random transformations from a countable setV toV. Such a sequence describes a discrete-time stochastic flow onV, in which the position at timen of a particle that started at sitex isM n(x), whereM n =F n F n–1 F 1. We give conditions on the law ofF 1 for the sequence (M n) to be tight, and describe the possible limiting law. an example called the block charge model is introduced. The results can be formulated as a statement about the convergence in distribution of products of infinite-dimensional random stochastic matrices. In practical terms, they describe the possible equilibria for random motions of systems of particles on a countable set, without births or deaths, where each site may be occupied by any number of particles, and all particles at a particular site move together.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号