全文获取类型
收费全文 | 10002篇 |
免费 | 362篇 |
专业分类
化学 | 231篇 |
力学 | 342篇 |
综合类 | 19篇 |
数学 | 8817篇 |
物理学 | 955篇 |
出版年
2023年 | 36篇 |
2022年 | 124篇 |
2021年 | 146篇 |
2020年 | 144篇 |
2019年 | 161篇 |
2018年 | 290篇 |
2017年 | 266篇 |
2016年 | 211篇 |
2015年 | 309篇 |
2014年 | 404篇 |
2013年 | 903篇 |
2012年 | 751篇 |
2011年 | 668篇 |
2010年 | 670篇 |
2009年 | 725篇 |
2008年 | 594篇 |
2007年 | 573篇 |
2006年 | 384篇 |
2005年 | 290篇 |
2004年 | 230篇 |
2003年 | 251篇 |
2002年 | 221篇 |
2001年 | 169篇 |
2000年 | 183篇 |
1999年 | 155篇 |
1998年 | 133篇 |
1997年 | 161篇 |
1996年 | 134篇 |
1995年 | 115篇 |
1994年 | 91篇 |
1993年 | 91篇 |
1992年 | 89篇 |
1991年 | 78篇 |
1990年 | 69篇 |
1989年 | 49篇 |
1988年 | 54篇 |
1987年 | 41篇 |
1986年 | 34篇 |
1985年 | 82篇 |
1984年 | 62篇 |
1983年 | 38篇 |
1982年 | 28篇 |
1981年 | 28篇 |
1980年 | 23篇 |
1979年 | 21篇 |
1978年 | 22篇 |
1977年 | 12篇 |
1976年 | 21篇 |
1975年 | 11篇 |
1974年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 21 毫秒
1.
This paper deals with the synchronization of uncertain unified chaotic system in the presence of two kinds of disturbances,
white noise and bounded power signal. A sliding mode controller (SMC) is established to guarantee the sliding motion. Moreover,
a proportional-integral (PI) switching surface is used to determine the performance of the system in the sliding motion. Also,
by using a mixed H
2/H
∞ approach, the effect of external disturbances on the sliding motion is reduced. The necessary parameters of constructing
controller and switching surface are found via semidefinite programming (SDP) which can be solved effectively by a standard
software. Finally, a numerical simulation is presented to show the effectiveness of the proposed method. 相似文献
2.
Yongjian Liu 《Nonlinear dynamics》2012,67(1):89-96
This paper studies the problem of the circuit implementation and the finite-time synchronization for the 4D (four-dimensional)
Rabinovich hyperchaotic system. The electronic circuit of 4D hyperchaotic system is designed. It is rigorously proven that
global finite-time synchronization can be achieved for hyperchaotic systems which have uncertain parameters. 相似文献
3.
Roelof Helmers I. Wayan Mangku 《Annals of the Institute of Statistical Mathematics》2012,64(6):1261-1279
We construct and investigate a (1−α)-upper prediction bound for a future observation of a cyclic Poisson process using past data. A normal based confidence interval for our upper prediction bound is established. A comparison of the new prediction bound with a simpler nonparametric prediction bound is also given. 相似文献
4.
We prove that a complex (κ, μ)-space with κ < 1 is a locally homogeneous complex contact metric manifold. Also, a complex (κ, μ)-space has either κ = 1 or is GH-locally symmetric. 相似文献
5.
Fritz Gesztesy Alexander Gomilko Fedor Sukochev Yuri Tomilov 《Israel Journal of Mathematics》2012,188(1):195-219
The purpose of this note is to answer a question A. E. Nussbaum formulated in 1964 about the possible equivalence between
weak measurability of a family of densely defined, closed operators {T(t)}
t∈ℝ in a separable complex Hilbert space H\mathcal{H} on one hand, and the notion of measurability of the 2 × 2 operator-valued matrix of projections {(P(Γ(T(t)))
j,k
)1⩽j,k⩽2}
t∈ℝ onto the graph Γ(T(t)) of T(t) on the other, in the negative. 相似文献
6.
Dimplekumar N. Chalishajar 《Journal of Optimization Theory and Applications》2012,154(2):672-684
This paper is concerned with controllability of a partial neutral functional differential inclusion of second order with impulse effect and infinite delay. We introduce a new phase space to prove the controllability of an inclusion which consists of an impulse effect with infinite delay. We claim that the phase space considered by different authors is not correct. We establish the controllability of mild solutions using a fixed point theorem for contraction multi-valued maps and without assuming compactness of the family of cosine operators. 相似文献
7.
Giovanni Stracquadanio Elisa Pappalardo Panos M. Pardalos 《Journal of Optimization Theory and Applications》2012,155(3):1008-1024
The design of circular antenna arrays is a challenging optimization problem, which requires ad-hoc methods to fulfill the engineering requirements. In this work, we introduce the Mesh Adaptive Basin Hopping algorithm to tackle such problem effectively; the experimental results show that the new approach proposed outperforms the state-of-the-art methods, both in terms of quality of the solutions and computational efficiency. 相似文献
8.
Karoline Johansson Stevan Pilipović Nenad Teofanov Joachim Toft 《Monatshefte für Mathematik》2012,166(2):181-199
We introduce admissible lattices and Gabor pairs to define discrete versions of wave-front sets with respect to Fourier–Lebesgue and modulation spaces. We prove that these wave-front sets agree with each other and with corresponding wave-front sets of “continuous type”. This implies that the coefficients of a Gabor frame expansion of f are parameter dependent, and describe the wave-front set of f. 相似文献
9.
The following system considered in this paper:where \({p > 1, p^* > 1 (1/p + 1/p^* = 1)}\) and \({\phi_q(z) = |z|^{q-2}z}\) for q = p or q = p *. This system is referred to as a half-linear system. The coefficient f(t) is assumed to be bounded, but the coefficients e(t), g(t) and h(t) are not necessarily bounded. Sufficient conditions are obtained for global asymptotic stability of the zero solution. Our results can be applied to not only the case that the signs of f(t) and g(t) change like the periodic function but also the case that f(t) and g(t) irregularly have zeros. Some suitable examples are included to illustrate our results.
相似文献
$$x' = -\,e(t)x + f(t)\phi_{p^*}(y), \qquad y'= -\,(p-1)g(t)\phi_p(x) - (p-1)h(t)y,$$
10.
Miodrag J. Mihaljevi? Sugata Gangopadhyay Goutam Paul Hideki Imai 《Periodica Mathematica Hungarica》2012,65(2):205-227
This paper considers security implications of k-normal Boolean functions when they are employed in certain stream ciphers. A generic algorithm is proposed for cryptanalysis of the considered class of stream ciphers based on a security weakness of k-normal Boolean functions. The proposed algorithm yields a framework for mounting cryptanalysis against particular stream ciphers within the considered class. Also, the proposed algorithm for cryptanalysis implies certain design guidelines for avoiding certain weak stream cipher constructions. A particular objective of this paper is security evaluation of stream cipher Grain-128 employing the developed generic algorithm. Contrary to the best known attacks against Grain-128 which provide complexity of a secret key recovery lower than exhaustive search only over a subset of secret keys which is just a fraction (up to 5%) of all possible secret keys, the cryptanalysis proposed in this paper provides significantly lower complexity than exhaustive search for any secret key. The proposed approach for cryptanalysis primarily depends on the order of normality of the employed Boolean function in Grain-128. Accordingly, in addition to the security evaluation insights of Grain-128, the results of this paper are also an evidence of the cryptographic significance of the normality criteria of Boolean functions. 相似文献