全文获取类型
收费全文 | 2643篇 |
免费 | 40篇 |
国内免费 | 8篇 |
专业分类
化学 | 1614篇 |
晶体学 | 16篇 |
力学 | 107篇 |
数学 | 492篇 |
物理学 | 462篇 |
出版年
2022年 | 36篇 |
2021年 | 49篇 |
2020年 | 47篇 |
2019年 | 28篇 |
2018年 | 29篇 |
2017年 | 24篇 |
2016年 | 73篇 |
2015年 | 40篇 |
2014年 | 50篇 |
2013年 | 130篇 |
2012年 | 132篇 |
2011年 | 142篇 |
2010年 | 87篇 |
2009年 | 81篇 |
2008年 | 142篇 |
2007年 | 144篇 |
2006年 | 131篇 |
2005年 | 126篇 |
2004年 | 104篇 |
2003年 | 99篇 |
2002年 | 81篇 |
2001年 | 44篇 |
2000年 | 34篇 |
1999年 | 31篇 |
1998年 | 27篇 |
1997年 | 38篇 |
1996年 | 58篇 |
1995年 | 28篇 |
1994年 | 38篇 |
1993年 | 28篇 |
1992年 | 35篇 |
1991年 | 28篇 |
1990年 | 22篇 |
1989年 | 31篇 |
1988年 | 20篇 |
1987年 | 22篇 |
1986年 | 23篇 |
1985年 | 25篇 |
1984年 | 27篇 |
1983年 | 27篇 |
1982年 | 30篇 |
1981年 | 17篇 |
1980年 | 24篇 |
1979年 | 19篇 |
1978年 | 16篇 |
1977年 | 17篇 |
1976年 | 13篇 |
1975年 | 12篇 |
1973年 | 15篇 |
1971年 | 10篇 |
排序方式: 共有2691条查询结果,搜索用时 15 毫秒
991.
Jeremiah Rushchitsky Carlo Cattani Sergiy Sinchilo 《Mathematical and Computer Modelling of Dynamical Systems: Methods, Tools and Applications in Engineering and Related Sciences》2013,19(3-4):331-352
Our object of interest is nonlinear interaction of waves in elastic materials. The new model of a material is proposed that takes into account the mechanism of simultaneous quadratic and cubic nonlinear deformations. Introduction of cubic nonlinearity into the model makes the general wave picture more complicated and creates new possibilities for the wave analysis. We present four possibilities for the evolution of profiles of plane harmonic waves. It is noted that quadratic and cubic nonlinearities emerge first of all in the second and third harmonics generation, respectively. Further, we discuss the results of computer modelling of the wave profile evolution. The influence of the progress of second and third harmonics on the wave profile evolution is studied separately. We study separately how second and third harmonics influence the evolution of the wave profile. We also investigate how the progress of harmonics depends on the initial frequency and amplitude. We find two distinct schemes of the evolution progress: the scheme (in) with four stages for the second harmonics and the scheme with three stages for the third harmonics. As a result the influence of both harmonics could be observed simultaneously, and such a case is demonstrated in the paper. Nevertheless this phenomenon is not necessarily present in every material which explains the absence of experimental observations of the third harmonics by this time. 相似文献
992.
Here we give a quantitative Voronovskaya formula for a class of Mellin convolution operators of type
(Twf)(s) = ò0+¥ Kw(zs-1)f(z)\fracdzz.({T_w}f)(s) = {\int_0^{+\infty}} {K_w}(zs^{-1})f(z)\frac{dz}{z}. 相似文献
993.
W. A. Sokalski P. C. Hariharan Herbert E. Popkie Joyce J. Kaufman Carlo Petrongolo 《International journal of quantum chemistry》1980,18(1):173-184
The transport of C6H5O? (or similarly charged moieties) through a lipoidal membrane may possibly be facilitated by forming complexes with the neutral compound. Thus, theoretical studies were performed on the model [C6H5OH ?OC6H5]? molecular complex to obtain some information concerning the possible molecular and electronic structure of such complexes. Ab initio MODPOT /VRDDO SCF calculations were carried out on the neutral-anion dimer [C6H5OH ?OC6H5] to optimize the equilibrium geometry. Electrostatic molecular potential contour maps have been generated from the ab initio MODPOT /VRDDO results in the molecular plane and in the plane perpendicular to the molecular plane and intersecting the hydrogen bond O ?H? O. Difference maps have also been generated showing the change of potential on complex formation. There is a decrease of electrostatic interactions of the phenoxide anion upon complex formation with the neutral phenol. Counterpoise corrections for basis set size could not be made since calculation of the phenoxide anions in the basis set of the phenol plus the phenoxide anion led to an excited state for the phenoxide anion. This behavior is somewhat similar to that occurring in the stabilization method for excited states of negative ions as the size of the basis set is increased. 相似文献
994.
The bin packing problem consists of finding the minimum number of bins, of given capacity D, required to pack a set of objects, each having a certain weight. We consider the high-multiplicity version of the problem, in which there are only C different weight values. We show that when C=2 the problem can be solved in time O( log D). For the general case, we give an algorithm which provides a solution requiring at most C−2 bins more than the optimal solution, i.e., an algorithm that is asymptotically exact. For fixed C, the complexity of the algorithm is O(poly( log D)), where poly(·) is a polynomial function not depending on C. 相似文献
995.
In this paper we present the spatial discretization of the thermal element model for coupled electrothermal simulation introduced in [1] with a suitable multiscale Finite Element scheme. The structure of the local matrices for the the thermal element is presented in detail and some preliminary numerical results are reported. (© 2008 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim) 相似文献
996.
We prove that there are no networks homeomorphic to the Greek “Theta” letter (a double cell) embedded in the plane with two triple junctions with angles of 120 degrees, such that under the motion by curvature they are self–similarly shrinking.This fact completes the classification of the self–similarly shrinking networks in the plane with at most two triple junctions, see [5, 10, 25, 2]. 相似文献
997.
Carlo Delfin S. Estadilla Aurelio A. de los Reyes V 《Mathematical Methods in the Applied Sciences》2020,43(18):10690-10710
The human immunodeficiency virus (HIV) impairs a person's immune system against many infections and some types of cancer, leading to acquired immunodeficiency syndrome (AIDS), which is characterized by severe illnesses. The number of HIV infections in the Philippines has increased, more than doubled, within the last decade. This alarming HIV crisis in the country requires urgent actions. In this study, a mathematical model is developed to describe the disease transmission in the Philippines. Disease-free and endemic equilibria are obtained, stability analysis is performed, and the basic reproduction number is computed. Sensitivity analyses and subset selection are performed to identify influential parameters and to determine an identifiable parameter set given measurements, respectively. Available data on the number of asymptomatic aware infectious, those who are in the AIDS stage, and those under treatment are utilized to estimate key epidemiological parameters such as transmission, treatment, and screening rates. Uncertainty of these parameter estimates is quantified through bootstrapping method. Furthermore, intervention strategies are investigated in the framework of optimal control theory. Control measures include precaution, HIV screening, antiretroviral treatment, and pre-exposure prophylaxis (PrEP) treatment. These various control efforts are compared with regard to cost efficiency and effectiveness in reducing the number of infected individuals. Given limited available control measures, the PrEP-only scenario is shown to be the most cost-effective, followed by other scenarios that combine PrEP with other controls. 相似文献
998.
Carlo Sempi 《Annali dell'Universita di Ferrara》1979,25(1):63-68
Résumé On introduit une opération d'élagage plus faible que celle introduite dans [1]; on montre cependant la validité des mêmes
théorèmes de caractérisation dans la famille des entropies additives et subadditives.
Riassunto Si introduce un'operazione di pruning più generale di quella introdotta in [1]; si mostra tuttavia che valgono gli stessi teoremi di caratterizzazione nella famiglia delle entropie additive e subadditive.相似文献 999.
Improved Schemes for Visual Cryptography 总被引:8,自引:0,他引:8
Carlo Blundo Annalisa De Bonis Alfredo De Santis 《Designs, Codes and Cryptography》2001,24(3):255-278
A (k,n)-threshold visual cryptography scheme ((k,n)-threshold VCS, for short) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the visual recovery of the secret image, but by inspecting less than k shares one cannot gain any information on the secret image. The visual recovery consists of xeroxing the shares onto transparencies, and then stacking them. Any k shares will reveal the secret image without any cryptographic computation.In this paper we analyze visual cryptography schemes in which the reconstruction of black pixels is perfect, that is, all the subpixels associated to a black pixel are black. For any value of k and n, where 2 k n, we give a construction for (k,n)-threshold VCS which improves on the best previously known constructions with respect to the pixel expansion (i.e., the number of subpixels each pixel of the original image is encoded into). We also provide a construction for coloured (2,n)-threshold VCS and for coloured (n,n)-threshold VCS. Both constructions improve on the best previously known constructions with respect to the pixel expansion. 相似文献
1000.
Carlo Mannino Gianpaolo Oriolo Federico Ricci Sunil Chandran 《Operations Research Letters》2007,35(1):1-9
We introduce a poly-time algorithm for the maximum weighted stable set problem, when a certain representation is given for a graph. The algorithm generalizes the algorithm for interval graphs and that for graphs with bounded pathwidth. By a suitable application to the frequency assignment problem, we improved several solutions to relevant benchmark instances. 相似文献
|