全文获取类型
收费全文 | 2485篇 |
免费 | 291篇 |
国内免费 | 318篇 |
专业分类
化学 | 159篇 |
晶体学 | 1篇 |
力学 | 156篇 |
综合类 | 83篇 |
数学 | 1965篇 |
物理学 | 730篇 |
出版年
2023年 | 19篇 |
2022年 | 36篇 |
2021年 | 50篇 |
2020年 | 56篇 |
2019年 | 66篇 |
2018年 | 72篇 |
2017年 | 79篇 |
2016年 | 74篇 |
2015年 | 61篇 |
2014年 | 107篇 |
2013年 | 240篇 |
2012年 | 115篇 |
2011年 | 132篇 |
2010年 | 143篇 |
2009年 | 152篇 |
2008年 | 199篇 |
2007年 | 194篇 |
2006年 | 164篇 |
2005年 | 144篇 |
2004年 | 117篇 |
2003年 | 120篇 |
2002年 | 125篇 |
2001年 | 93篇 |
2000年 | 109篇 |
1999年 | 91篇 |
1998年 | 54篇 |
1997年 | 58篇 |
1996年 | 54篇 |
1995年 | 36篇 |
1994年 | 23篇 |
1993年 | 13篇 |
1992年 | 6篇 |
1991年 | 16篇 |
1990年 | 14篇 |
1989年 | 10篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1986年 | 7篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 6篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1936年 | 2篇 |
排序方式: 共有3094条查询结果,搜索用时 15 毫秒
1.
2.
3.
Chi-Kwong Li Ming-Cheng Tsai Ya-Shu Wang Ngai-Ching Wong 《Journal of Mathematical Analysis and Applications》2022,505(2):125522
Let L be an additive map between (real or complex) matrix algebras sending Hermitian idempotent matrices to Hermitian idempotent matrices. We show that there are nonnegative integers with and an unitary matrix U such that We also extend this result to the (complex) von Neumann algebra setting, and provide a supplement to the Dye-Bunce-Wright Theorem asserting that every additive map of Hermitian idempotents extends to a Jordan ?-homomorphism. 相似文献
4.
《Discrete Mathematics》2022,345(7):112796
We introduce the active partition of the ground set of an oriented matroid perspective (or morphism, or quotient, or strong map) on a linearly ordered ground set. The reorientations obtained by arbitrarily reorienting parts of the active partition share the same active partition. This yields an equivalence relation for the set of reorientations of an oriented matroid perspective, whose classes are enumerated by coefficients of the Tutte polynomial, and a remarkable partition of the set of reorientations into Boolean lattices, from which we get a short direct proof of a 4-variable expansion formula for the Tutte polynomial in terms of orientation activities. This formula was given in the last unpublished preprint by Michel Las Vergnas; the above equivalence relation and notion of active partition generalize a former construction in oriented matroids by Michel Las Vergnas and the author; and the possibility of such a proof technique in perspectives was announced in the aforementioned preprint. We also briefly highlight how the 5-variable expansion of the Tutte polynomial in terms of subset activities in matroid perspectives comes in a similar way from the known partition of the power set of the ground set into Boolean lattices related to subset activities (and we complete the proof with a property which was missing in the literature). In particular, the paper applies to matroids and oriented matroids on a linearly ordered ground set, and applies to graph and directed graph homomorphisms on a linearly ordered edge-set. 相似文献
5.
The photodissociation dynamics of isocyanic acid (HNCO) has been studied by the timesliced velocity map ion imaging technique at 193 nm. The NH(aΔ) products were measured via (2+1) resonance enhanced multiphoton ionization. Images have been accumulated for the NH(aΔ) rotational states in the ground and vibrational excited state (v=0 and 1). The center-of-mass translational energy distribution derived from the NH(aΔ) images implies that the CO vibrational distributions are inverted for most of the measured NH(v|j) internal states. The anisotropic product angular distribution observed indicates a rapid dissociation process for the N-C bond cleavage. A bimodal rotational state distribution of CO(v) has been observed, this result implies that isocyanic acid dissociates in the S1 state in two different pathways. 相似文献
6.
In this paper we prove a shadowing lemma for pseudo orbits made by quasi-hyperbolic strings. We allow singularities in question and hence, in particular, the quasi-hyperbolic strings are formulated by the rescaled linear Poincaré flow instead of the usual linear Poincaré flow. We also introduce the sectional Poincaré map and rescaled sectional Poincaré map for Lipschitz vector fields on Banach spaces in the article. 相似文献
7.
Mojtaba Bakherad 《Linear and Multilinear Algebra》2019,67(5):871-885
In this paper, we define the generalised relative operator entropy and investigate some of its properties such as subadditivity and homogeneity. As application of our result, we obtain the information inequality. In continuation, we establish some reverses of the operator entropy inequalities under certain conditions by using the Mond–Pe?ari? method. 相似文献
8.
设■:D→R~3确定了以等温参数表示的极小曲面M,其中D是全平面R~2的开子区域,那么极小曲面的Gauss映射g(z)是D上的亚纯函数.Xavier与Chao提出了一个尚未解决的问题:任意给定区域■上的亚纯函数g(z),它是否是某完备极小曲面的Gauss映射?本文证明了若开平面C上的亚纯函数g(z)的零点列或极点列的收敛指数小于1/2,则g(z)—定是某完备极小曲面的Gauss映射. 相似文献
9.
Fatiha Mesdoui Nabil Shawagfeh Adel Ouannas 《Mathematical Methods in the Applied Sciences》2021,44(1):1003-1012
This study considers the problem of control and synchronization between fractional‐order and integer‐order, N‐components reaction‐diffusion systems with nonidentical coefficients and different nonlinear parts. The control scheme is designed using the Lyapunov direct method. The results are exemplified by two significant biochemical models, namely, the fractional‐order Lengyel‐Epstein model and the Gray‐Scott model. To illustrate the effectiveness of the proposed scheme, numerical simulations are performed in one and two space dimensions using Homotopy Analysis Method (HAM). 相似文献
10.
An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree 下载免费PDF全文
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree. Firstly, other programming software is used to perform the middle order traversal, and the plaintext image is sorted according to the middle order traversal sequence on the permutation. Secondly, the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value. Finally, the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix. The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness. 相似文献