首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1475篇
  免费   75篇
  国内免费   6篇
化学   1149篇
晶体学   2篇
力学   20篇
数学   192篇
物理学   193篇
  2023年   8篇
  2022年   15篇
  2021年   26篇
  2020年   33篇
  2019年   46篇
  2018年   21篇
  2017年   20篇
  2016年   35篇
  2015年   49篇
  2014年   61篇
  2013年   79篇
  2012年   141篇
  2011年   171篇
  2010年   67篇
  2009年   39篇
  2008年   112篇
  2007年   104篇
  2006年   106篇
  2005年   93篇
  2004年   64篇
  2003年   61篇
  2002年   34篇
  2001年   13篇
  2000年   10篇
  1999年   9篇
  1998年   10篇
  1997年   15篇
  1996年   5篇
  1995年   3篇
  1994年   8篇
  1993年   4篇
  1990年   3篇
  1989年   6篇
  1988年   4篇
  1986年   2篇
  1985年   5篇
  1984年   2篇
  1983年   4篇
  1982年   2篇
  1981年   8篇
  1980年   3篇
  1979年   3篇
  1978年   6篇
  1977年   6篇
  1976年   2篇
  1975年   3篇
  1974年   8篇
  1973年   8篇
  1972年   4篇
  1968年   3篇
排序方式: 共有1556条查询结果,搜索用时 15 毫秒
101.
102.
We propose a penalized likelihood method to fit the linear discriminant analysis model when the predictor is matrix valued. We simultaneously estimate the means and the precision matrix, which we assume has a Kronecker product decomposition. Our penalties encourage pairs of response category mean matrix estimators to have equal entries and also encourage zeros in the precision matrix estimator. To compute our estimators, we use a blockwise coordinate descent algorithm. To update the optimization variables corresponding to response category mean matrices, we use an alternating minimization algorithm that takes advantage of the Kronecker structure of the precision matrix. We show that our method can outperform relevant competitors in classification, even when our modeling assumptions are violated. We analyze three real datasets to demonstrate our method’s applicability. Supplementary materials, including an R package implementing our method, are available online.  相似文献   
103.
In this paper, we classify all optimal linear[n, n/2] codes up to length 12. We show that thereis a unique optimal [10, 5, 5] code up to equivalence.  相似文献   
104.
In this paper it is shown that the weight enumerator of a bordered double circulant self-dual code can be obtained from those of a pure double circulant self-dual code and its shadow through a relationship between bordered and pure double circulant codes. As applications, a restriction on the weight enumerators of some extremal double circulant codes is determined and a uniqueness proof of extremal double circulant self-dual codes of length 46 is given. New extremal singly-even [44,22,8] double circulant codes are constructed. These codes have weight enumerators for which extremal codes were not previously known to exist.  相似文献   
105.
The problem of two‐dimensional tracer advection on the sphere is extremely important in modeling of geophysical fluids and has been tackled using a variety of approaches. A class of popular approaches for tracer advection include ‘incremental remap’ or cell‐integrated semi‐Lagrangian‐type schemes. These schemes achieve high‐order accuracy without the need for multistage integration in time, are capable of large time steps, and tend to be more efficient than other high‐order transport schemes when applied to a large number of tracers over a single velocity field. In this paper, the simplified flux‐form implementation of the Conservative Semi‐LAgrangian Multi‐tracer scheme (CSLAM) is reformulated using quadratic curves to approximate the upstream flux volumes and Gaussian quadrature for integrating the edge flux. The high‐order treatment of edge fluxes is motivated because of poor accuracy of the CSLAM scheme in the presence of strong nonlinear shear, such as one might observe in the midlatitudes near an atmospheric jet. Without the quadratic treatment of upstream edges, we observe at most second‐order accuracy under convergence of grid resolution, which is returned to third‐order accuracy under the improved treatment. A shallow‐water barotropic instability also reveals clear evidence of grid imprinting without the quadratic correction. Consequently, these tests reveal a problem that might arise in tracer transport near nonlinearly sheared regions of the real atmosphere, particularly near cubed‐sphere panel edges. Although CSLAM is used as the foundation for this analysis, the conclusions of this paper are applicable to the general class of incremental remap schemes. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
106.
This study was conducted in the spring of 2002 at Arlington High School in a Probability and Statistics course for junior and senior level students. Two sections of the class were compared with respect to the use/non-use of EXCEL in the course. The experimental group (the one using EXCEL) outperformed the control group on five of the six teacher-created unit tests and on both of the criterion referenced assessments used by the district; however, the differences were not statistically significant at the 0.05 level. Furthermore, the experimental group expressed very positive feelings towards the use of the software in a survey administered at the conclusion of the course.  相似文献   
107.
Summary. In this paper we again consider the rate of convergence of the conjugate gradient method. We start with a general analysis of the conjugate gradient method for uniformly bounded solutions vectors and matrices whose eigenvalues are uniformly bounded and positive. We show that in such cases a fixed finite number of iterations of the method gives some fixed amount of improvement as the the size of the matrix tends to infinity. Then we specialize to the finite element (or finite difference) scheme for the problem . We show that for some classes of function we see this same effect. For other functions we show that the gain made by performing a fixed number of iterations of the method tends to zero as the size of the matrix tends to infinity. Received July 9, 1998 / Published online March 16, 2000  相似文献   
108.
Let be a surjective operator between two uniform algebras with . We show that if satisfies the peripheral multiplicativity condition for all , where is the peripheral spectrum of , then is an isometric algebra isomorphism from onto . One of the consequences of this result is that any surjective, unital, and multiplicative operator that preserves the peripheral ranges of algebra elements is an isometric algebra isomorphism. We describe also the structure of general, not necessarily unital, surjective and peripherally multiplicative operators between uniform algebras.

  相似文献   

109.
Type Ia supernovae are bright stellar explosions distinguished by standardizable light curves that allow for their use as distance indicators for cosmological studies. Despite the highly successful use of these events in this capacity, many fundamental questions remain. Contemporary research investigates how properties of the progenitor system that follow from the host galaxy such as composition and age influence the brightness of an event with the goal of better understanding and assessing the intrinsic scatter in the brightness. We provide an overview of these supernovae and proposed progenitor systems, all of which involve one or more compact stars known as white dwarfs. We describe contemporary research investigating how the composition and structure of the progenitor white dwarf systematically influences the explosion outcome assuming the progenitor is a single white dwarf that has gained mass from a companion. We present results illustrating some of these systematic effects from our research.  相似文献   
110.
We present a model of leptogenesis that preserves lepton number. The model maintains the important feature of more traditional leptogenesis scenarios: The decaying particles that provide the CP violation necessary for baryogenesis also provide the explanation for the smallness of the neutrino Yukawa couplings. This model clearly demonstrates that, contrary to conventional wisdom, neutrinos need not be Majorana in nature in order to help explain the baryon asymmetry of the universe.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号