首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   340篇
  免费   68篇
  国内免费   21篇
化学   27篇
力学   47篇
综合类   10篇
数学   209篇
物理学   136篇
  2023年   4篇
  2022年   9篇
  2021年   18篇
  2020年   26篇
  2019年   17篇
  2018年   23篇
  2017年   20篇
  2016年   23篇
  2015年   14篇
  2014年   29篇
  2013年   31篇
  2012年   20篇
  2011年   22篇
  2010年   21篇
  2009年   19篇
  2008年   9篇
  2007年   11篇
  2006年   11篇
  2005年   20篇
  2004年   10篇
  2003年   11篇
  2002年   7篇
  2001年   11篇
  2000年   3篇
  1999年   7篇
  1998年   4篇
  1997年   6篇
  1996年   4篇
  1995年   3篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
排序方式: 共有429条查询结果,搜索用时 15 毫秒
1.
2.
We study conditions on the matrix mask of a vector subdivision scheme ensuring that certain polynomial input vectors yield polynomial output again. The conditions are in terms of a recurrence formula for the vectors which determine the structure of polynomial input with this property. From this recurrence, we obtain an algorithm to determine polynomial input of maximal degree. The algorithm can be used in the design of masks to achieve a high order of polynomial reproduction.  相似文献   
3.
Ascidia malaca gametes before fertilization incubated in 10?5 or 10?7 M solutions of tributyltin(IV) chloride, TBTCl, for 3 h appear highly damaged under transmission electron microscopy observation. Also, the fertilization process is affected by the compound: the damaged spermatozoa are present in the vitelline coat and the egg does not cleave. An increase of microbodies, structurally similar to peroxisomes, have been detected in the egg peripheral cytoplasm, probably in relation to their role in alleviating damage to some cellular components. The results have shown that the reproduction of ascidians under unfavourable environmental conditions is prevented. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
4.
This paper is concerned with the irregular behavior of solutions for Fisher’s equation when initial data do not decay in a regular way at the spatial infinity. In the one-dimensional case, we show the existence of a solution whose profile and average speed are not convergent. In the higher-dimensional case, we show the existence of expanding fronts with arbitrarily prescribed profiles. We also show the existence of irregularly expanding fronts whose profile varies in time. Proofs are based on some estimate of the difference of two distinct solutions and a comparison technique. Dedicated to Professor Pavol Brunovsky on his 70th birthday.  相似文献   
5.
Let Ω be a region in ℝn and letp = Pi ) i 1m , be a partition ofΩ into a finite number of closed subsets having piecewise C2 boundaries of finite(n - 1 )dimensional measure. Let τ:Ω→Ω be piecewise C2 onP where, τi = τ|pi is aC 2 diffeomorphism onto its image, and expanding in the sense that there exists α > 1 such that for anyi = 1, 2,...,m ‖Dτi -1 ‖ < α-1, where Dτi -1 is the derivative matrixτ i - 1 and |‖·‖ is the Euclidean matrix norm. By means of an example, we will show that the simple bound of one-dimensional dynamics cannot be generalized to higher dimensions. In fact, we will construct a piecewise expanding C2 transformation on a fixed partition with a finite number of elements in ℝ2, but which has an arbitrarily large number of ergodic, absolutely continuous invariant measures  相似文献   
6.
A combinatorial method of encryption with a similarity to the classical scheme of linear coding has been suggested by the author. The general idea is to treat vertices of a graph as messages and arcs of a certain length as encryption tools. We will study the quality of such an encryption in the case of graphs of high girth by comparing the probability to guess the message, (vertex) at random with the probability of breaking the key, i.e. guessing the encoding arc. In fact, the quality is good for graphs which are close to the Erdös bound, defined by the Even Cycle Theorem.In the case of parallelotopic graphs, there is a uniform way to match arcs with strings in a certain alphabet. Among parallelotopic graphs we distinguish linguistic graphs of affine type whose vertices (messages) and arcs (encoding tools) both could be naturally identified with vectors over the GF(q), and neighbors of the vertex defined by a system of linear equations. We will discuss families of linguistic and parallelotopic graphs of increasing girth as the source for assymmetric cryptographic functions and related open key algorithms.Several constructions of families of linguistic graphs of high girth with good quality, complexity and expansion coefficients will be considered. Some of those constructions have been obtained via group-theoretical and geometrical techniques.  相似文献   
7.
对薄层柱壳爆炸膨胀断裂过程的研究   总被引:10,自引:2,他引:8  
 本文提出了一个用于描述动态破坏发展过程的损伤度函数。从这个损伤度函数出发,把材料特征性方程取为强化粘塑性本构方程形式,导出了薄层柱壳爆炸膨胀运动在两种近似下(恒定膨胀速度近似合恒定应变速率近似)断裂判据的解析表达式。结果分析表明,在上述条件下,存在着一个动态断裂“塑性峰”,在这个峰值条件的应变率下,柱壳出现贯穿断裂时刻的应变最大。以软钢为算例,本断裂判据可以比较好地解释Иванов和陈大年等给出的实验结果。这时,动态断裂“塑性峰”对应的应变率为4×104 s-1,相应的应变约为60%~80%。  相似文献   
8.
Coronavirus pandemic (COVID-19) hit the world in December 2019, and only less than 5% of the 15 million cases were recorded in Africa. A major call for concern was the significant rise from 2% in May 2020 to 4.67% by the end of July 15, 2020. This drastic increase calls for quick intervention in the transmission and control strategy of COVID-19 in Africa. A mathematical model to theoretically investigate the consequence of ignoring asymptomatic cases on COVID-19 spread in Africa is proposed in this study. A qualitative analysis of the model is carried out with and without re-infection, and the reproduction number is obtained under re-infection. The results indicate that increasing case detection to detect asymptomatically infected individuals will be very effective in containing and reducing the burden of COVID-19 in Africa. In addition, the fact that it has not been confirmed whether a recovered individual can be re-infected or not, then enforcing a living condition where recovered individuals are not allowed to mix with the susceptible or exposed individuals will help in containing the spread of COVID-19.  相似文献   
9.
An age-structured pertussis model with covert infection is proposed to understand the effect of covert infection on the recurrence of pertussis. It is found that vaccination only for young children does not have a decisive effect on whooping cough control. It is shown that although the vaccine coverage rate is relatively high, the model has a backward bifurcation for a larger covert infection rate. In addition, sufficient conditions for the disease-free steady state to be globally asymptotically stable are obtained.  相似文献   
10.
Multistrain diseases, which are infected through individual contacts, pose severe public health threat nowadays. In this paper, we build competitive and mutative two‐strain edge‐based compartmental models using probability generation function (PGF) and pair approximation (PA). Both of them are ordinary differential equations. Their basic reproduction numbers and final size formulas are explicitly derived. We show that the formula gives a unique positive final epidemic size when the reproduction number is larger than unity. We further consider competitive and mutative multistrain diseases spreading models and compute their basic reproduction numbers. We perform numerical simulations that show some dynamical properties of the competitive and mutative two‐strain models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号