全文获取类型
收费全文 | 728篇 |
免费 | 8篇 |
国内免费 | 1篇 |
专业分类
化学 | 460篇 |
晶体学 | 6篇 |
力学 | 32篇 |
数学 | 62篇 |
物理学 | 177篇 |
出版年
2023年 | 3篇 |
2022年 | 9篇 |
2021年 | 21篇 |
2020年 | 20篇 |
2019年 | 17篇 |
2018年 | 8篇 |
2017年 | 20篇 |
2016年 | 15篇 |
2015年 | 10篇 |
2014年 | 27篇 |
2013年 | 45篇 |
2012年 | 52篇 |
2011年 | 65篇 |
2010年 | 23篇 |
2009年 | 28篇 |
2008年 | 35篇 |
2007年 | 47篇 |
2006年 | 23篇 |
2005年 | 32篇 |
2004年 | 18篇 |
2003年 | 18篇 |
2002年 | 18篇 |
2001年 | 4篇 |
1999年 | 9篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 3篇 |
1995年 | 14篇 |
1994年 | 4篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 5篇 |
1990年 | 8篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 11篇 |
1982年 | 11篇 |
1981年 | 4篇 |
1980年 | 6篇 |
1979年 | 4篇 |
1978年 | 9篇 |
1977年 | 7篇 |
1976年 | 5篇 |
1974年 | 5篇 |
1971年 | 3篇 |
1970年 | 3篇 |
排序方式: 共有737条查询结果,搜索用时 25 毫秒
61.
62.
Aditya Kaushik 《Journal of Difference Equations and Applications》2016,22(9):1307-1324
The convection dominated diffusion problems are studied. Higher order accurate numerical methods are presented for problems in one and two dimensions. The underlying technique utilizes a superposition of given problem into two independent problems. The first one is the reduced problem that refers to the outer or smooth solution. Stretching transformation is used to obtain the second problem for inner layer solution. The method considered for outer or degenerate problems are based on higher order Runge–Kutta methods and upwind finite differences. However, inner problem is solved analytically or asymptotically. The schemes presented are proved to be consistent and stable. Possible extensions to delay differential equations and to nonlinear problems are outlined. Numerical results for several test examples are illustrated and a comparative analysis is presented. It is observed that the method presented is highly accurate and easy to implement. Moreover, the numerical results obtained are not only comparable with the exact solution but also in agreement with the theoretical estimates. 相似文献
63.
Reliability is a major concern in the design of large disk arrays. In this paper, we examine the effect of encountering more failures than that for which the RAID array was initially designed. Erasure codes are incorporated to enable system recovery from a specified number of disk erasures, and strive beyond that threshold to recover the system as frequently, and as thoroughly, as is possible. Erasure codes for tolerating two disk failures are examined. For these double erasure codes, we establish a correspondence between system operation and acyclicity of its graph model. For the most compact double erasure code, the full 2-code, this underlies an efficient algorithm for the computation of system operation probability (all disks operating or recoverable).When the system has failed, some disks are nonetheless recoverable. We extend the graph model to determine the probability that d disks have failed, a of which are recoverable by solving one linear equation, b of which are further recoverable by solving systems of linear equations, and d−a−b of which cannot be recovered. These statistics are efficiently calculated for the full 2-code by developing a three variable ordinary generating function whose coefficients give the specified values. Finally, examples are given to illustrate the probability that an individual disk can be recovered, even when the system is in a failed state. 相似文献
64.
We study the asymptotic properties of both the horizontal and vertical shift functions based on independent ranked set samples
drawn from continuous distributions. Several tests derived from these shift processes are developed. We show that by using
balanced ranked set samples with bigger set sizes, one can decrease the width of the confidence band and hence increase the
power of these tests. These theoretical findings are validated through small-scale simulation studies. An application of the
proposed techniques to a cancer mortality data set is also provided.
Part of the research was conducted while Kaushik Ghosh was visiting Statistical Research and Applications Branch of the National
Cancer Institute on an Intergovernmental Personnel Assignment. 相似文献
65.
Kaushik Chakraborty Sumanta Sarkar Subhamoy Maitra Bodhisatwa Mazumdar Debdeep Mukhopadhyay Emmanuel Prouff 《Designs, Codes and Cryptography》2017,82(1-2):95-115
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming weight model. In this regard, we revisit the definition of Transparency Order (\(\mathsf {TO}\)) from the work of Prouff (FSE 2005) and find that the definition has certain limitations. Although this work has been quite well referred in the literature, surprisingly, these limitations remained unexplored for almost a decade. We analyse the definition from scratch, modify it and finally provide a definition with better insight that can theoretically capture DPA in Hamming weight model for hardware implementation with precharge logic. At the end, we confront the notion of (revised) transparency order with attack simulations in order to study to what extent the low transparency order of an s-box impacts the efficiency of a side channel attack against its processing. To the best of our knowledge, this is the first time that such a critical analysis is conducted (even considering the original notion of Prouff). It practically confirms that the transparency order is indeed related to the resistance of the s-box against side-channel attacks, but it also shows that it is not sufficient alone to directly achieve a satisfying level of security. Regarding this point, our conclusion is that the (revised) transparency order is a valuable criterion to consider when designing a cryptographic algorithm, and even if it does not preclude to also use classical countermeasures like masking or shuffling, it enables to improve their effectiveness. 相似文献
66.
67.
The paper deals with the analysis of a non-stationary parabolic partial differential equation with a time delay. The highest order derivative term is affected by the small parameter. This is precisely the case when the magnitude of the convective term becomes much larger compare to that of diffusion term. The solution of problem exhibits steep gradients in the narrow intervals of space and short interval of times. In these cases a dissipative loss turned out to be more complex. Even for the one spatial dimension and one temporal variable, not all difference scheme can capture these steep variation. Although the analysis is restricted to the model in one space dimension, the technique and comparison principles developed should prove useful in assessing the merits of numerical solution of other nonlinear model equations too. 相似文献
68.
Technique and instrumentation to detect reliably, multiplicity of neutrons emitted in sharp bursts (≤100 μs) has been developed
where a burst of as low as 15 neutrons and continuous emission of ⋍10−1 neutron/s may be detected. Using this technique, attempts were made to detect neutron emission from various experiments in
which anomalous nuclear effects (or what is commonly referred to as cold fusion) may be expected to occur. No neutrons, above
our detection threshold, were detected in the recent series of experiments. 相似文献
69.
Mark J. Ablowitz Gino Biondini Sarbarish Chakravarty Rudy L. Horne 《Optics Communications》1998,150(1-6):305-318
Collision-induced timing shifts in a wavelength-division multiplexed soliton system are computed when damping, amplification, filtering and positive dispersion management following the loss profile are included. A statistical analysis is presented which takes into account the resulting effect of the large number of collisions occurring in the fiber. Analytic expressions are derived for the root mean square timing jitter and the maximum length of error-free transmission with an arbitrary number of channels. An extensive analysis of system performance corresponding to situations with and without filters and/or dispersion management is carried out. 相似文献
70.
Dhar S Senapati D Das PK Chattopadhyay P Nethaji M Chakravarty AR 《Journal of the American Chemical Society》2003,125(40):12118-12124
A new class of ternary copper(II) complexes of formulation [Cu(L(n)B](ClO(4)) (1-4), where HL(n) is a NSO-donor Schiff base (HL(1), HL(2)) and B is a NN-donor heterocyclic base viz. 1,10-phenanthroline (phen) and 2,9-dimethyl-1,10-phenanthroline (dmp), are prepared, structurally characterized, and their DNA binding and photocleavage activities studied in the presence of red light. Ternary complex [Cu(L(3))(phen)](ClO(4)) (5) containing an ONO-donor Schiff base and a binary complex [Cu(L(2))(2)] (6) are also prepared and structurally characterized for mechanistic investigations of the DNA cleavage reactions. While 1-4 have a square pyramidal (4 + 1) CuN(3)OS coordination geometry with the Schiff base bonded at the equatorial sites, 5 has a square pyramidal (4 + 1) geometry with CuN(3)O(2) coordination with the alcoholic oxygen at the axial site, and 6 has a square planar trans-CuN(2)O(2) geometry. Binding of the complexes 1-4 to calf thymus DNA shows the relative order: phen > dmp. Mechanistic investigations using distamycin reveal minor groove binding for the complexes. The phen complexes containing the Schiff base with a thiomethyl or thiophenyl moiety show red light induced photocleavage. The dmp complexes are essentially photonuclease inactive. Complexes 5 and 6 are cleavage inactive under similar photolytic conditions. A 10 microM solution of 1 displays a 72% cleavage of SC DNA (0.5 microg) on an exposure of 30 min using a 603 nm Nd:YAG pulsed laser (60 mJ/P) in Tris-HCl buffer (pH 7.2). Significant cleavage of 1 is also observed at 694 nm using a Ruby laser. Complex 1 is cleavage inactive under argon or nitrogen atmosphere. It shows a more enhanced cleavage in pure oxygen than in air. Enhancement of cleavage in D(2)O and inhibition with sodium azide addition indicate the possibility of the formation of singlet oxygen as a reactive intermediate leading to DNA cleavage. The d-d band excitation with red light shows significant enhancement of cleavage yield. The results indicate that the phen ligand is necessary for DNA binding of the complex. Both the sulfur-to-copper charge transfer band and copper d-d band excitations helped the DNA cleavage. While the absorption of a red photon induces a metal d-d transition, excitation at shorter visible wavelengths leads to the sulfur-to-copper charge transfer band excitation at the initial step of photocleavage. The excitation energy is subsequently transferred to ground state oxygen molecules to produce singlet oxygen that cleaves the DNA. 相似文献