全文获取类型
收费全文 | 486篇 |
免费 | 19篇 |
国内免费 | 33篇 |
专业分类
化学 | 18篇 |
力学 | 70篇 |
综合类 | 4篇 |
数学 | 357篇 |
物理学 | 89篇 |
出版年
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 3篇 |
2020年 | 8篇 |
2019年 | 11篇 |
2018年 | 12篇 |
2017年 | 12篇 |
2016年 | 16篇 |
2015年 | 10篇 |
2014年 | 16篇 |
2013年 | 34篇 |
2012年 | 20篇 |
2011年 | 22篇 |
2010年 | 30篇 |
2009年 | 31篇 |
2008年 | 47篇 |
2007年 | 29篇 |
2006年 | 27篇 |
2005年 | 29篇 |
2004年 | 25篇 |
2003年 | 21篇 |
2002年 | 24篇 |
2001年 | 11篇 |
2000年 | 8篇 |
1999年 | 11篇 |
1998年 | 15篇 |
1997年 | 10篇 |
1996年 | 3篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 7篇 |
1992年 | 6篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1974年 | 1篇 |
排序方式: 共有538条查询结果,搜索用时 343 毫秒
1.
2.
S. Yakubovich 《Integral Transforms and Special Functions》2019,30(3):190-204
New index transforms, involving squares of Kelvin functions, are investigated. Mapping properties and inversion formulas are established for these transforms in Lebesgue spaces. The results are applied to solve a boundary value problem on the wedge for a fourth order partial differential equation. 相似文献
3.
《Mathematische Nachrichten》2017,290(17-18):2759-2774
Here we give a new approach to the Paley–Wiener theorem in a Mellin analysis setting which avoids the use of the Riemann surface of the logarithm and analytical branches and is based on new concepts of polar‐analytic function in the Mellin setting and Mellin–Bernstein spaces. A notion of Hardy spaces in the Mellin setting is also given along with applications to exponential sampling formulas of optical physics. 相似文献
4.
Viorel Catană 《Applicable analysis》2017,96(6):1047-1057
The aim of this paper is to study the asymptotic behavior of one- dimensional modified Stockwell transform of a tempered distribution signal through the quasiasymptotic behavior at origin or infinity of the signal itself. More precisely, we give some Abelian results which mean that we derive the asymptotic properties of the S-transform of a tempered signal from the quasiasymptotic properties of the signal itself and we do also the opposite. So, we also give some Tauberian results which describe some quasiasymptotic properties of the tempered signal by means of the asymptotic properties of its Stockwell transform. 相似文献
5.
6.
Considered is a Yoffe crack in an infinite strip of functionally grated material (FGM) subjected to antiplane shear. The shear moduli in two directions of FGM are assumed to be of exponential form. The dynamic stress intensity factor and strain energy density factor at the crack tip are obtained by using integral transforms and dual-integral equations. The numerical results show that the decrease of the strain energy density factor varies with the shear moduli gradient, and the increase of the strain energy density factor varies with the increase of the moving crack speed. The ratio of shear moduli in material vertical orientation has a great influence on the strain energy density factor. 相似文献
7.
The paper presents a solution to the problem of thermal conduction and thermoelasticity for a thin shallow spherical shell
heated by a concentrated or local impulsive heat source moving over the shell surface. It is assumed that temperature is linearly
distributed across the shell thickness and that the shell, on its sides, exchanges heat with the environment in accordance
with Newton’s law of cooling. The Fourier and Laplace transforms are used to find an analytic solution. The dependence of
the temperature field and stress/strain components on the type of heating and the form of heat source is studied
__________
Translated from Prikladnaya Mekhanika, Vol. 42, No. 11, pp. 85–92, November 2006. 相似文献
8.
L.I. Slepyan M.V. Ayzenberg-Stepanenko 《Journal of the mechanics and physics of solids》2002,50(8):1591-1625
A semi-infinite crack growing along a straight line in an unbounded triangular-cell lattice and in lattice strips is under examination. Elastic and standard-material viscoelastic lattices are considered. Using the superposition similar to that used for a square-cell lattice (J. Mech. Phys. Solids 48 (2000) 927) an irregular stress distribution is revealed on the crack line in mode II: the strain of the crack-front bond is lower than that of the next bond. A further notable fact about mode II concerns the bonds on the crack line in the lattice strip deformed by a ‘rigid machine’. If the alternate bonds, such that are inclined differently than the crack-front bond, are removed, the stresses in the crack-front bond and in the other intact bonds decrease. These facts result in irregular quasi-static and dynamic crack growth. In particular, in a wide range of conditions for mode II, consecutive bond breaking becomes impossible. The most surprising phenomenon is the formation of a binary crack consisting of two branches propagating on the same line. It appears that the consecutive breaking of the right-slope bonds—as one branch of the crack—can proceed at a speed different from that for the left-slope bonds—as another branch. One of these branches can move faster than the other, but with time they can change places. Some irregularities are observed in mode I as well. Under the influence of viscosity, crack growth can be stabilized and crack speed can be low when viscosity is high; however, in mode II irregularities in the crack growth remain. It is found that crack speed is a discontinuous function of the creep and relaxation times. 相似文献
9.
针对假设股价的对数收益率布朗运动在期权定价时产生的无法解释股价对数收益率的尖峰厚尾和序列相关性的缺陷,采用了Zhang提出的非对称漂移双gamma跳-扩散过程来描述资产(股价)的对数收益率运动形态(该过程是kou提出的双指数跳-扩散过程的推广),并利用Esscher风险中性变换,研究了幂型期权的定价公式.还设计了两种创新的幂型期权,在非对称漂移双gamma跳-扩散过程下给出了相应的定价公式. 相似文献
10.
In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people׳s attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks. 相似文献