首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10002篇
  免费   362篇
化学   231篇
力学   342篇
综合类   19篇
数学   8817篇
物理学   955篇
  2023年   36篇
  2022年   124篇
  2021年   146篇
  2020年   144篇
  2019年   161篇
  2018年   290篇
  2017年   266篇
  2016年   211篇
  2015年   309篇
  2014年   404篇
  2013年   903篇
  2012年   751篇
  2011年   668篇
  2010年   670篇
  2009年   725篇
  2008年   594篇
  2007年   573篇
  2006年   384篇
  2005年   290篇
  2004年   230篇
  2003年   251篇
  2002年   221篇
  2001年   169篇
  2000年   183篇
  1999年   155篇
  1998年   133篇
  1997年   161篇
  1996年   134篇
  1995年   115篇
  1994年   91篇
  1993年   91篇
  1992年   89篇
  1991年   78篇
  1990年   69篇
  1989年   49篇
  1988年   54篇
  1987年   41篇
  1986年   34篇
  1985年   82篇
  1984年   62篇
  1983年   38篇
  1982年   28篇
  1981年   28篇
  1980年   23篇
  1979年   21篇
  1978年   22篇
  1977年   12篇
  1976年   21篇
  1975年   11篇
  1974年   9篇
排序方式: 共有10000条查询结果,搜索用时 21 毫秒
1.
This paper deals with the synchronization of uncertain unified chaotic system in the presence of two kinds of disturbances, white noise and bounded power signal. A sliding mode controller (SMC) is established to guarantee the sliding motion. Moreover, a proportional-integral (PI) switching surface is used to determine the performance of the system in the sliding motion. Also, by using a mixed H 2/H approach, the effect of external disturbances on the sliding motion is reduced. The necessary parameters of constructing controller and switching surface are found via semidefinite programming (SDP) which can be solved effectively by a standard software. Finally, a numerical simulation is presented to show the effectiveness of the proposed method.  相似文献   
2.
This paper studies the problem of the circuit implementation and the finite-time synchronization for the 4D (four-dimensional) Rabinovich hyperchaotic system. The electronic circuit of 4D hyperchaotic system is designed. It is rigorously proven that global finite-time synchronization can be achieved for hyperchaotic systems which have uncertain parameters.  相似文献   
3.
We construct and investigate a (1−α)-upper prediction bound for a future observation of a cyclic Poisson process using past data. A normal based confidence interval for our upper prediction bound is established. A comparison of the new prediction bound with a simpler nonparametric prediction bound is also given.  相似文献   
4.
We prove that a complex (κ, μ)-space with κ < 1 is a locally homogeneous complex contact metric manifold. Also, a complex (κ, μ)-space has either κ = 1 or is GH-locally symmetric.  相似文献   
5.
The purpose of this note is to answer a question A. E. Nussbaum formulated in 1964 about the possible equivalence between weak measurability of a family of densely defined, closed operators {T(t)} t∈ℝ in a separable complex Hilbert space H\mathcal{H} on one hand, and the notion of measurability of the 2 × 2 operator-valued matrix of projections {(P(Γ(T(t))) j,k )1⩽j,k⩽2} t∈ℝ onto the graph Γ(T(t)) of T(t) on the other, in the negative.  相似文献   
6.
This paper is concerned with controllability of a partial neutral functional differential inclusion of second order with impulse effect and infinite delay. We introduce a new phase space to prove the controllability of an inclusion which consists of an impulse effect with infinite delay. We claim that the phase space considered by different authors is not correct. We establish the controllability of mild solutions using a fixed point theorem for contraction multi-valued maps and without assuming compactness of the family of cosine operators.  相似文献   
7.
The design of circular antenna arrays is a challenging optimization problem, which requires ad-hoc methods to fulfill the engineering requirements. In this work, we introduce the Mesh Adaptive Basin Hopping algorithm to tackle such problem effectively; the experimental results show that the new approach proposed outperforms the state-of-the-art methods, both in terms of quality of the solutions and computational efficiency.  相似文献   
8.
We introduce admissible lattices and Gabor pairs to define discrete versions of wave-front sets with respect to Fourier–Lebesgue and modulation spaces. We prove that these wave-front sets agree with each other and with corresponding wave-front sets of “continuous type”. This implies that the coefficients of a Gabor frame expansion of f are parameter dependent, and describe the wave-front set of f.  相似文献   
9.
The following system considered in this paper:
$$x' = -\,e(t)x + f(t)\phi_{p^*}(y), \qquad y'= -\,(p-1)g(t)\phi_p(x) - (p-1)h(t)y,$$
where \({p > 1, p^* > 1 (1/p + 1/p^* = 1)}\) and \({\phi_q(z) = |z|^{q-2}z}\) for q = p or q = p *. This system is referred to as a half-linear system. The coefficient f(t) is assumed to be bounded, but the coefficients e(t), g(t) and h(t) are not necessarily bounded. Sufficient conditions are obtained for global asymptotic stability of the zero solution. Our results can be applied to not only the case that the signs of f(t) and g(t) change like the periodic function but also the case that f(t) and g(t) irregularly have zeros. Some suitable examples are included to illustrate our results.
  相似文献   
10.
This paper considers security implications of k-normal Boolean functions when they are employed in certain stream ciphers. A generic algorithm is proposed for cryptanalysis of the considered class of stream ciphers based on a security weakness of k-normal Boolean functions. The proposed algorithm yields a framework for mounting cryptanalysis against particular stream ciphers within the considered class. Also, the proposed algorithm for cryptanalysis implies certain design guidelines for avoiding certain weak stream cipher constructions. A particular objective of this paper is security evaluation of stream cipher Grain-128 employing the developed generic algorithm. Contrary to the best known attacks against Grain-128 which provide complexity of a secret key recovery lower than exhaustive search only over a subset of secret keys which is just a fraction (up to 5%) of all possible secret keys, the cryptanalysis proposed in this paper provides significantly lower complexity than exhaustive search for any secret key. The proposed approach for cryptanalysis primarily depends on the order of normality of the employed Boolean function in Grain-128. Accordingly, in addition to the security evaluation insights of Grain-128, the results of this paper are also an evidence of the cryptographic significance of the normality criteria of Boolean functions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号