首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   486篇
  免费   19篇
  国内免费   33篇
化学   18篇
力学   70篇
综合类   4篇
数学   357篇
物理学   89篇
  2023年   3篇
  2022年   2篇
  2021年   3篇
  2020年   8篇
  2019年   11篇
  2018年   12篇
  2017年   12篇
  2016年   16篇
  2015年   10篇
  2014年   16篇
  2013年   34篇
  2012年   20篇
  2011年   22篇
  2010年   30篇
  2009年   31篇
  2008年   47篇
  2007年   29篇
  2006年   27篇
  2005年   29篇
  2004年   25篇
  2003年   21篇
  2002年   24篇
  2001年   11篇
  2000年   8篇
  1999年   11篇
  1998年   15篇
  1997年   10篇
  1996年   3篇
  1995年   6篇
  1994年   7篇
  1993年   7篇
  1992年   6篇
  1990年   2篇
  1989年   5篇
  1988年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
  1982年   1篇
  1980年   2篇
  1977年   2篇
  1976年   2篇
  1974年   1篇
排序方式: 共有538条查询结果,搜索用时 343 毫秒
1.
2.
New index transforms, involving squares of Kelvin functions, are investigated. Mapping properties and inversion formulas are established for these transforms in Lebesgue spaces. The results are applied to solve a boundary value problem on the wedge for a fourth order partial differential equation.  相似文献   
3.
《Mathematische Nachrichten》2017,290(17-18):2759-2774
Here we give a new approach to the Paley–Wiener theorem in a Mellin analysis setting which avoids the use of the Riemann surface of the logarithm and analytical branches and is based on new concepts of polar‐analytic function in the Mellin setting and Mellin–Bernstein spaces. A notion of Hardy spaces in the Mellin setting is also given along with applications to exponential sampling formulas of optical physics.  相似文献   
4.
The aim of this paper is to study the asymptotic behavior of one- dimensional modified Stockwell transform of a tempered distribution signal through the quasiasymptotic behavior at origin or infinity of the signal itself. More precisely, we give some Abelian results which mean that we derive the asymptotic properties of the S-transform of a tempered signal from the quasiasymptotic properties of the signal itself and we do also the opposite. So, we also give some Tauberian results which describe some quasiasymptotic properties of the tempered signal by means of the asymptotic properties of its Stockwell transform.  相似文献   
5.
6.
Considered is a Yoffe crack in an infinite strip of functionally grated material (FGM) subjected to antiplane shear. The shear moduli in two directions of FGM are assumed to be of exponential form. The dynamic stress intensity factor and strain energy density factor at the crack tip are obtained by using integral transforms and dual-integral equations. The numerical results show that the decrease of the strain energy density factor varies with the shear moduli gradient, and the increase of the strain energy density factor varies with the increase of the moving crack speed. The ratio of shear moduli in material vertical orientation has a great influence on the strain energy density factor.  相似文献   
7.
The paper presents a solution to the problem of thermal conduction and thermoelasticity for a thin shallow spherical shell heated by a concentrated or local impulsive heat source moving over the shell surface. It is assumed that temperature is linearly distributed across the shell thickness and that the shell, on its sides, exchanges heat with the environment in accordance with Newton’s law of cooling. The Fourier and Laplace transforms are used to find an analytic solution. The dependence of the temperature field and stress/strain components on the type of heating and the form of heat source is studied __________ Translated from Prikladnaya Mekhanika, Vol. 42, No. 11, pp. 85–92, November 2006.  相似文献   
8.
A semi-infinite crack growing along a straight line in an unbounded triangular-cell lattice and in lattice strips is under examination. Elastic and standard-material viscoelastic lattices are considered. Using the superposition similar to that used for a square-cell lattice (J. Mech. Phys. Solids 48 (2000) 927) an irregular stress distribution is revealed on the crack line in mode II: the strain of the crack-front bond is lower than that of the next bond. A further notable fact about mode II concerns the bonds on the crack line in the lattice strip deformed by a ‘rigid machine’. If the alternate bonds, such that are inclined differently than the crack-front bond, are removed, the stresses in the crack-front bond and in the other intact bonds decrease. These facts result in irregular quasi-static and dynamic crack growth. In particular, in a wide range of conditions for mode II, consecutive bond breaking becomes impossible. The most surprising phenomenon is the formation of a binary crack consisting of two branches propagating on the same line. It appears that the consecutive breaking of the right-slope bonds—as one branch of the crack—can proceed at a speed different from that for the left-slope bonds—as another branch. One of these branches can move faster than the other, but with time they can change places. Some irregularities are observed in mode I as well. Under the influence of viscosity, crack growth can be stabilized and crack speed can be low when viscosity is high; however, in mode II irregularities in the crack growth remain. It is found that crack speed is a discontinuous function of the creep and relaxation times.  相似文献   
9.
针对假设股价的对数收益率布朗运动在期权定价时产生的无法解释股价对数收益率的尖峰厚尾和序列相关性的缺陷,采用了Zhang提出的非对称漂移双gamma跳-扩散过程来描述资产(股价)的对数收益率运动形态(该过程是kou提出的双指数跳-扩散过程的推广),并利用Esscher风险中性变换,研究了幂型期权的定价公式.还设计了两种创新的幂型期权,在非对称漂移双gamma跳-扩散过程下给出了相应的定价公式.  相似文献   
10.
In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people׳s attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号