全文获取类型
收费全文 | 401篇 |
免费 | 20篇 |
国内免费 | 31篇 |
专业分类
化学 | 4篇 |
晶体学 | 1篇 |
力学 | 44篇 |
综合类 | 8篇 |
数学 | 338篇 |
物理学 | 57篇 |
出版年
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 15篇 |
2019年 | 2篇 |
2018年 | 5篇 |
2017年 | 14篇 |
2016年 | 17篇 |
2015年 | 18篇 |
2014年 | 32篇 |
2013年 | 43篇 |
2012年 | 33篇 |
2011年 | 39篇 |
2010年 | 25篇 |
2009年 | 35篇 |
2008年 | 22篇 |
2007年 | 44篇 |
2006年 | 38篇 |
2005年 | 22篇 |
2004年 | 6篇 |
2003年 | 3篇 |
2002年 | 6篇 |
2001年 | 5篇 |
2000年 | 7篇 |
1999年 | 10篇 |
1995年 | 1篇 |
排序方式: 共有452条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
The resilient dissipative dynamic output feedback control problem for a class of uncertain Markov jump Lur’e systems with piecewise homogeneous transition probabilities and time-varying delays in the discrete-time domain are examined in this study. The designed controller can tolerate additive uncertainties in the controller gain matrix, which result from controller implementations. The time-varying delays are also supposed to be mode-dependent with lower and upper bounds known a priori. By constructing a Lyapunov–Krasovskii functional candidate, the sufficient conditions regarding the existence of desired resilient dissipative controllers are obtained in terms of linear matrix inequalities, thereby ensuring that the resulting closed-loop system is stochastically stable and strictly dissipative. Two numerical examples were established to illustrate the effectiveness of the proposed theoretical results. 相似文献
5.
Luxing Yang Moez Draief Xiaofan Yang 《Mathematical Methods in the Applied Sciences》2017,40(5):1396-1413
The node‐based epidemic modeling is an effective approach to the understanding of the impact of the structure of the propagation network on the epidemics of electronic virus. In view of the heterogeneity of the propagation network, a heterogeneous node‐based SIRS model is proposed. Theoretical analysis shows that the maximum eigenvalue of a matrix related to the model determines whether viruses tend to extinction or persist. When viruses persist, the connectedness of the propagation network implies the existence and uniqueness of a viral equilibrium, and a set of sufficient conditions for the global stability of the viral equilibrium are given. Numerical examples verify the correctness of our results. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
6.
MAXIMAL ELEMENTS OF A FAMILY OF GB-MAJORIZED MAPPINGS IN PRODUCT FC-SPACES AND APPLICATIONS 总被引:1,自引:1,他引:1
丁协平 《应用数学和力学(英文版)》2006,27(12):1607-1618
A new family of GB-majorized mappings from a topological space into a finite continuous topological spaces (in short, FC-space) involving a better admissible set-valued mapping is introduced. Some existence theorems of maximal elements for the family of GB-majorized mappings are proved under noncompact setting of product FCspaces. Some applications to fixed point and system of minimax inequalities are given in product FC-spaces. These theorems improve, unify and generalize many important results in recent literature. 相似文献
7.
Electrostatic damped field characteristics in non-thermal fast positron and electron plasma having fluids of positive and negative pair ions have been discussed when collisional frequencies parameters are taken into account. The damped and forced form of Kadomtsev-Petviashvili (DKP) equations have been obtained. The plasma parameters effects of electron density ratio, the negative ionic density ratio, the pair ionic charge ratio, the density of positron ratio, the collisional frequencies, ion mass ratio and the fast non-thermality on the electrostatic damped and forced field formations, as observed in D-F -ionosphere and laboratory experiments have been investigated. 相似文献
8.
Ismail A. Haj Waseem Hafiz Muhammad Ishtiaq Muhammad Jamal Sajjad Shaukat Khan Majid 《International Journal of Theoretical Physics》2021,60(5):1720-1741
International Journal of Theoretical Physics - Most of the enciphering structures are based on the transformation of mediums by describing the strict criteria. The presented article is based on... 相似文献
9.
Hierarchical and probabilistic quantum state sharing via a non-maximally entangled stateHierarchical and probabilistic quantum state sharing via a non-maximally entangled stateHierarchical and probabilistic quantum state sharing via a non-maximally entangled state 下载免费PDF全文
A scheme that probabilistically realizes hierarchical quantum state sharing of an arbitrary unknown qubit state with a four-qubit non-maximally entangled 丨X) state is presented in this paper. In the scheme, the sender Alice distributes a quantum secret with a Bell-state measurement and publishes her measurement outcomes via a classical channel to three agents who are divided into two grades. One agent is in the upper grade, while the other two agents are in the lower grade. Then by introducing an ancillary qubit, the agent of the upper grade only needs the assistance of any one of the other two agents for probabilistically obtaining the secret, while an agent of the lower grade needs the help of both the other two agents by using a controlled-NOT operation and a proper positive operator-valued measurement instead of the usual projective measurement. In other words, the agents of two different grades have different authorities to reconstruct Alice's secret in a probabilistic manner. The scheme can also be modified to implement the threshold-controlled teleportation. 相似文献
10.
《Communications in Nonlinear Science & Numerical Simulation》2014,19(6):1884-1897
This paper proposes a novel color image cryptosystem based on synchronization of two different six-dimensional hyperchaotic systems. In the transmitter end, we apply the drive system to generate the diffusion matrices and scrambling ones, which are used to change the image pixel value and position, respectively. Thus the ciphered image is obtained. In the receiver, synchronization of two nonidentical hyperchaotic systems can be achieved by designing the appropriate controllers. The response system is employed to yield the corresponding diffusion matrices and scrambling ones using the same generation method in the encryption algorithm. Then the cipher-image can be decrypted by the decryption algorithm, which is similar to that of the encryption process but in the reversed order. The experimental results show that the presented image cryptosystem has high security and can resist noise and crop attacks. 相似文献