全文获取类型
收费全文 | 340篇 |
免费 | 68篇 |
国内免费 | 21篇 |
专业分类
化学 | 27篇 |
力学 | 47篇 |
综合类 | 10篇 |
数学 | 209篇 |
物理学 | 136篇 |
出版年
2023年 | 4篇 |
2022年 | 9篇 |
2021年 | 18篇 |
2020年 | 26篇 |
2019年 | 17篇 |
2018年 | 23篇 |
2017年 | 20篇 |
2016年 | 23篇 |
2015年 | 14篇 |
2014年 | 29篇 |
2013年 | 31篇 |
2012年 | 20篇 |
2011年 | 22篇 |
2010年 | 21篇 |
2009年 | 19篇 |
2008年 | 9篇 |
2007年 | 11篇 |
2006年 | 11篇 |
2005年 | 20篇 |
2004年 | 10篇 |
2003年 | 11篇 |
2002年 | 7篇 |
2001年 | 11篇 |
2000年 | 3篇 |
1999年 | 7篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有429条查询结果,搜索用时 15 毫秒
2.
We study conditions on the matrix mask of a vector subdivision scheme ensuring that certain polynomial input vectors yield polynomial output again. The conditions are in terms of a recurrence formula for the vectors which determine the structure of polynomial input with this property. From this recurrence, we obtain an algorithm to determine polynomial input of maximal degree. The algorithm can be used in the design of masks to achieve a high order of polynomial reproduction. 相似文献
3.
L. Villa P. D' Agati C. Mansueto C. Pellerito M. Scopelliti T. Fiore L. Nagy L. Pellerito 《应用有机金属化学》2003,17(2):106-112
Ascidia malaca gametes before fertilization incubated in 10?5 or 10?7 M solutions of tributyltin(IV) chloride, TBTCl, for 3 h appear highly damaged under transmission electron microscopy observation. Also, the fertilization process is affected by the compound: the damaged spermatozoa are present in the vitelline coat and the egg does not cleave. An increase of microbodies, structurally similar to peroxisomes, have been detected in the egg peripheral cytoplasm, probably in relation to their role in alleviating damage to some cellular components. The results have shown that the reproduction of ascidians under unfavourable environmental conditions is prevented. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
4.
Eiji Yanagida 《Journal of Dynamics and Differential Equations》2007,19(4):895-914
This paper is concerned with the irregular behavior of solutions for Fisher’s equation when initial data do not decay in a
regular way at the spatial infinity. In the one-dimensional case, we show the existence of a solution whose profile and average
speed are not convergent. In the higher-dimensional case, we show the existence of expanding fronts with arbitrarily prescribed
profiles. We also show the existence of irregularly expanding fronts whose profile varies in time. Proofs are based on some
estimate of the difference of two distinct solutions and a comparison technique.
Dedicated to Professor Pavol Brunovsky on his 70th birthday. 相似文献
5.
Let Ω be a region in ℝn and letp = Pi )
i
1m
, be a partition ofΩ into a finite number of closed subsets having piecewise C2 boundaries of finite(n - 1 )dimensional measure. Let τ:Ω→Ω be piecewise C2 onP where, τi = τ|pi is aC
2 diffeomorphism onto its image, and expanding in the sense that there exists α > 1 such that for anyi = 1, 2,...,m ‖Dτi
-1 ‖ < α-1, where Dτi
-1 is the derivative matrixτ
i
- 1 and |‖·‖ is the Euclidean matrix norm. By means of an example, we will show that the simple bound of one-dimensional dynamics
cannot be generalized to higher dimensions. In fact, we will construct a piecewise expanding C2 transformation on a fixed partition with a finite number of elements in ℝ2, but which has an arbitrarily large number of ergodic, absolutely continuous invariant measures 相似文献
6.
Vasiliy A. Ustimenko 《Acta Appl Math》2002,74(2):117-153
A combinatorial method of encryption with a similarity to the classical scheme of linear coding has been suggested by the author. The general idea is to treat vertices of a graph as messages and arcs of a certain length as encryption tools. We will study the quality of such an encryption in the case of graphs of high girth by comparing the probability to guess the message, (vertex) at random with the probability of breaking the key, i.e. guessing the encoding arc. In fact, the quality is good for graphs which are close to the Erdös bound, defined by the Even Cycle Theorem.In the case of parallelotopic graphs, there is a uniform way to match arcs with strings in a certain alphabet. Among parallelotopic graphs we distinguish linguistic graphs of affine type whose vertices (messages) and arcs (encoding tools) both could be naturally identified with vectors over the GF(q), and neighbors of the vertex defined by a system of linear equations. We will discuss families of linguistic and parallelotopic graphs of increasing girth as the source for assymmetric cryptographic functions and related open key algorithms.Several constructions of families of linguistic graphs of high girth with good quality, complexity and expansion coefficients will be considered. Some of those constructions have been obtained via group-theoretical and geometrical techniques. 相似文献
7.
对薄层柱壳爆炸膨胀断裂过程的研究 总被引:10,自引:2,他引:8
本文提出了一个用于描述动态破坏发展过程的损伤度函数。从这个损伤度函数出发,把材料特征性方程取为强化粘塑性本构方程形式,导出了薄层柱壳爆炸膨胀运动在两种近似下(恒定膨胀速度近似合恒定应变速率近似)断裂判据的解析表达式。结果分析表明,在上述条件下,存在着一个动态断裂“塑性峰”,在这个峰值条件的应变率下,柱壳出现贯穿断裂时刻的应变最大。以软钢为算例,本断裂判据可以比较好地解释Иванов和陈大年等给出的实验结果。这时,动态断裂“塑性峰”对应的应变率为4×104 s-1,相应的应变约为60%~80%。 相似文献
8.
Abayomi Samuel Oke Oluwafemi Isaac Bada Ganiyu Rasaq Victoria Adodo 《Mathematical Methods in the Applied Sciences》2022,45(1):137-149
Coronavirus pandemic (COVID-19) hit the world in December 2019, and only less than 5% of the 15 million cases were recorded in Africa. A major call for concern was the significant rise from 2% in May 2020 to 4.67% by the end of July 15, 2020. This drastic increase calls for quick intervention in the transmission and control strategy of COVID-19 in Africa. A mathematical model to theoretically investigate the consequence of ignoring asymptomatic cases on COVID-19 spread in Africa is proposed in this study. A qualitative analysis of the model is carried out with and without re-infection, and the reproduction number is obtained under re-infection. The results indicate that increasing case detection to detect asymptomatically infected individuals will be very effective in containing and reducing the burden of COVID-19 in Africa. In addition, the fact that it has not been confirmed whether a recovered individual can be re-infected or not, then enforcing a living condition where recovered individuals are not allowed to mix with the susceptible or exposed individuals will help in containing the spread of COVID-19. 相似文献
9.
An age-structured pertussis model with covert infection is proposed to understand the effect of covert infection on the recurrence of pertussis. It is found that vaccination only for young children does not have a decisive effect on whooping cough control. It is shown that although the vaccine coverage rate is relatively high, the model has a backward bifurcation for a larger covert infection rate. In addition, sufficient conditions for the disease-free steady state to be globally asymptotically stable are obtained. 相似文献
10.
Multistrain diseases, which are infected through individual contacts, pose severe public health threat nowadays. In this paper, we build competitive and mutative two‐strain edge‐based compartmental models using probability generation function (PGF) and pair approximation (PA). Both of them are ordinary differential equations. Their basic reproduction numbers and final size formulas are explicitly derived. We show that the formula gives a unique positive final epidemic size when the reproduction number is larger than unity. We further consider competitive and mutative multistrain diseases spreading models and compute their basic reproduction numbers. We perform numerical simulations that show some dynamical properties of the competitive and mutative two‐strain models. 相似文献