全文获取类型
收费全文 | 5498篇 |
免费 | 568篇 |
国内免费 | 348篇 |
专业分类
化学 | 513篇 |
晶体学 | 13篇 |
力学 | 988篇 |
综合类 | 57篇 |
数学 | 2582篇 |
物理学 | 2261篇 |
出版年
2023年 | 46篇 |
2022年 | 60篇 |
2021年 | 104篇 |
2020年 | 129篇 |
2019年 | 114篇 |
2018年 | 140篇 |
2017年 | 130篇 |
2016年 | 163篇 |
2015年 | 171篇 |
2014年 | 246篇 |
2013年 | 427篇 |
2012年 | 225篇 |
2011年 | 269篇 |
2010年 | 222篇 |
2009年 | 295篇 |
2008年 | 343篇 |
2007年 | 383篇 |
2006年 | 314篇 |
2005年 | 270篇 |
2004年 | 235篇 |
2003年 | 262篇 |
2002年 | 227篇 |
2001年 | 190篇 |
2000年 | 233篇 |
1999年 | 186篇 |
1998年 | 157篇 |
1997年 | 134篇 |
1996年 | 81篇 |
1995年 | 87篇 |
1994年 | 73篇 |
1993年 | 82篇 |
1992年 | 57篇 |
1991年 | 51篇 |
1990年 | 40篇 |
1989年 | 29篇 |
1988年 | 31篇 |
1987年 | 34篇 |
1986年 | 23篇 |
1985年 | 18篇 |
1984年 | 18篇 |
1983年 | 5篇 |
1982年 | 15篇 |
1981年 | 14篇 |
1980年 | 8篇 |
1979年 | 14篇 |
1978年 | 12篇 |
1977年 | 10篇 |
1976年 | 6篇 |
1973年 | 12篇 |
1972年 | 4篇 |
排序方式: 共有6414条查询结果,搜索用时 15 毫秒
21.
Jeannette H. C. Woerner 《商业与工业应用随机模型》2005,21(1):27-44
In the framework of stochastic volatility models we examine estimators for the integrated volatility based on the pth power variation (i.e. the sum of pth absolute powers of the log‐returns). We derive consistency and distributional results for the estimators given high‐frequency data, especially taking into account what kind of process we may add to our model without affecting the estimate of the integrated volatility. This may on the one hand be interpreted as a possible flexibility in modelling, for example adding jumps or even leaving the framework of semimartingales by adding a fractional Brownian motion, or on the other hand as robustness against model misspecification. We will discuss possible choices of p under different model assumptions and irregularly spaced data. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
22.
23.
Miklós Csörgő 《Periodica Mathematica Hungarica》2005,50(1-2):1-27
Summary This article provides a glimpse of some of the highlights of the joint work of Endre Csáki and Pál Révész since 1979. The topics of this short exploration of the rich stochastic milieu of this inspiring collaboration revolve around Brownian motion, random walks and their long excursions, local times and additive functionals, iterated processes, almost sure local and global central limit theorems, integral functionals of geometric stochastic processes, favourite sites--favourite values and jump sizes for random walk and Brownian motion, random walking in a random scenery, and large void zones and occupation times for coalescing random walks. 相似文献
24.
K. Kubilius 《Acta Appl Math》2003,78(1-3):233-242
We consider the integral equation driven by a standard Brownian motion and by a fractional Brownian motion. Sufficient conditions under which the equation has a weak solution are obtained. 相似文献
25.
In-time motion adjustment in laser cladding manufacturing process for improving dimensional accuracy and surface finish of the formed part 总被引:2,自引:0,他引:2
This paper presents in-time motion adjustment in laser cladding manufacturing process as a means to improve dimensional accuracy and surface finish of the built part. Defects occurring during laser cladding degrade the part quality such as dimensional accuracy and surface finish. In this paper, in-time motion adjustment strategy was presented to remedy and eliminate defects occurring during laser cladding to improve the dimensional accuracy and surface finish. Based on the relationship between the motion of laser head relative to the growing part and other parameters in effects on clad profile, the laser traverse speed, stand-off distance and laser approach orientation to the existing clad layer were adjusted by instructions from a close-loop control system in real time to remedy and eliminate defects. The results of the experiments verified the effects of in-time motion adjustment on dimensional accuracy and surface finish. 相似文献
26.
Yan Zhibin 《东北数学》1998,(2)
SomeNotesaboutTanaka'sEquationYanZhibin(严质彬)(DepartmentofMathematics,HarbinInstituteofTechnology,Harbin,150001)AbstractLet{Wt... 相似文献
27.
HANXI'AN HUANGXILI 《高校应用数学学报(英文版)》1998,13(4):445-450
For two rational quadratic B-spline curves with same control vertexes, the cross ratio of four eollinear points are represented; which are any one of the vertexes, and the two points that the ray initialing from the vertex intersects with the corresponding segments of the twocurves, and the point the ray intersecting with the connecting line between the two neighboring vertexes. Different from rational quadratic Beeier curves, the value is generally related with the loeation of the ray, and the necessary and sufficient condition o5 the ratio being independent of the ray‘s loeation is showed. Alsn another cross ratio o5 the following four collinear points are suggested, i.e. one vertex, the points that the ray from the initlal vertex intersects respectivdy with the curve segmentt the line connecting the segments end points, and the line connecting the two neighboring vertexes. This cross ratio is concerned only whh the ray‘s location, butnot with the weights of the curve. Furthermore, the cross ratio is projective invariant under the projective transformation between the two segments. 相似文献
28.
Zhao Xuelei 《数学年刊B辑(英文版)》1997,18(1):47-54
GIRSANOV’STHEOREMONABSTRACTWIENERSPACESZHANGYINNANAbstractLet(E,H,μ)beanabstractWienerspaceinthesenseofL.Gros.Itisprovedth... 相似文献
29.
The equivalent geometrical configurations of linear ordered orthogonal arrays are determined when their strengths are 3 and 4. Existence of such geometrical configurations is investigated. They are also useful in the study of (T, M, S)-nets. 相似文献
30.
Ross Anderson Cunsheng Ding Tor Helleseth Torleiv Klove 《Designs, Codes and Cryptography》1998,15(2):111-124
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes. 相似文献