首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   121篇
  免费   1篇
  国内免费   5篇
化学   8篇
力学   19篇
数学   51篇
物理学   49篇
  2022年   2篇
  2021年   1篇
  2020年   4篇
  2019年   2篇
  2018年   3篇
  2017年   2篇
  2016年   4篇
  2015年   1篇
  2014年   3篇
  2013年   14篇
  2012年   8篇
  2011年   9篇
  2010年   1篇
  2009年   9篇
  2008年   12篇
  2007年   13篇
  2006年   8篇
  2005年   11篇
  2004年   6篇
  2003年   4篇
  2002年   2篇
  2000年   1篇
  1998年   1篇
  1996年   1篇
  1993年   1篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1984年   1篇
排序方式: 共有127条查询结果,搜索用时 15 毫秒
91.
A series of bifurcations from period-1 bursting to period-1 spiking in a complex (or simple) process were observed with increasing extra-cellular potassium concentration during biological experiments on different neural pacemakers. This complex process is composed of three parts: period-adding sequences of burstings, chaotic bursting to chaotic spiking, and an inverse period-doubling bifurcation of spiking patterns. Six cases of bifurcations with complex processes distinguished by period-adding sequences with stochastic or chaotic burstings that can reach different bursting patterns, and three cases of bifurcations with simple processes, without the transition from chaotic bursting to chaotic spiking, were identified. It reveals the structures closely matching those simulated in a two-dimensional parameter space of the Hindmarsh–Rose model, by increasing one parameter \(I\) and fixing another parameter \(r\) at different values. The experimental bifurcations also resembled those simulated in a physiologically based model, the Chay model. The experimental observations not only reveal the nonlinear dynamics of the firing patterns of neural pacemakers but also provide experimental evidence of the existence of bifurcations from bursting to spiking simulated in the theoretical models.  相似文献   
92.
Enyu Zhuang  Guanrong Chen 《Physica A》2011,390(13):2582-2592
In this paper, we introduce a model to describe knowledge accumulation through knowledge diffusion and knowledge upgrade in a multi-agent network. Here, knowledge diffusion refers to the distribution of existing knowledge in the network, while knowledge upgrade means the discovery of new knowledge. It is found that the population of the network and the number of each agent’s neighbors affect the speed of knowledge accumulation. Four different policies for updating the neighboring agents are thus proposed, and their influence on the speed of knowledge accumulation and the topology evolution of the network are also studied.  相似文献   
93.
Dendrimers and regular hyperbranched polymers are two classic families of macromolecules, which can be modeled by Cayley trees and Vicsek fractals, respectively. In this paper, we study the trapping problem in Cayley trees and Vicsek fractals with different underlying geometries, focusing on a particular case with a perfect trap located at the central node. For both networks, we derive the exact analytic formulas in terms of the network size for the average trapping time (ATT)-the average of node-to-trap mean first-passage time over the whole networks. The obtained closed-form solutions show that for both Cayley trees and Vicsek fractals, the ATT display quite different scalings with various system sizes, which implies that the underlying structure plays a key role on the efficiency of trapping in polymer networks. Moreover, the dissimilar scalings of ATT may allow to differentiate readily between dendrimers and hyperbranched polymers.  相似文献   
94.
This paper reports a study of random deflection routing protocol and its impact on delay-jitter over packet networks. In case of congestion, routers with a random deflection routing protocol can forward incoming packets to links laying off shortest paths; namely, packets can be “deflected” away from their original paths. However, random deflection routing may send packets to several different paths, thereby introducing packet re-ordering. This could affect the quality of receptions, it could also impair the overall performance in transporting data traffic. Nevertheless, the present study reveals that deflection routing could actually reduce delay-jitter when the traffic loading on the network is not heavy.  相似文献   
95.
In this paper, a generalized epidemic model on complex heterogeneous networks is proposed. To give a theoretical explanation for the simulation results established on networks, mathematical analysis of the epidemic dynamics is presented via mean-field approximation. Stabilities of the disease-free equilibrium and the endemic equilibrium are studied. The results explain why the heterogeneous connectivity patterns impact the epidemic threshold and reveal how the host parameters and the underlying network structures determine disease propagation.  相似文献   
96.
This paper studies relationships between coupled-expanding maps and one-sided symbolic dynamical systems. The concept of coupled-expanding map is extended to a more general one: coupled-expansion for a transitive matrix. It is found that the subshift for a transitive matrix is strictly coupled-expanding for the matrix in certain disjoint compact subsets; the topological conjugacy of a continuous map in its compact invariant set of a metric space to a subshift for a transitive matrix has a close relationship with that the map is strictly coupled-expanding for the matrix in some disjoint compact subsets. A certain relationship between strictly coupled-expanding maps for a transitive matrix in disjoint bounded and closed subsets of a complete metric space and their topological conjugacy to the subshift for the matrix is also obtained. Dynamical behaviors of subshifts for irreducible matrices are then studied and several equivalent statements to chaos are obtained; especially, chaos in the sense of Li–Yorke is equivalent to chaos in the sense of Devaney for the subshift, and is also equivalent to that the domain of the subshift is infinite. Based on these results, several new criteria of chaos for maps are finally established via strict coupled-expansions for irreducible transitive matrices in compact subsets of metric spaces and in bounded and closed subsets of complete metric spaces, respectively, where their conditions are weaker than those existing in the literature.  相似文献   
97.
A stream cipher based on a spatiotemporal chaotic system is proposed. A one-way coupled map lattice consisting of logistic maps is served as the spatiotemporal chaotic system. Multiple keystreams are generated from the coupled map lattice by using simple algebraic computations, and then are used to encrypt plaintext via bitwise XOR. These make the cipher rather simple and efficient. Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory. The cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently.  相似文献   
98.
Computation of focus (or focal) values for nonlinear dynamical systems is not only important in theoretical study, but also useful in applications. In this paper, we compare three typical methods for computing focus values, and give a comparison among these methods. Then, we apply these methods to study two practical problems and Hilbert's 16th problem. We show that these different methods have the same computational complexity. Finally, we discuss the “minimal singular point value” problem.  相似文献   
99.
  总被引:12,自引:0,他引:12  
This paper reports a new four-dimensional continuous autonomous chaotic system, in which each equation in the system contains a 3-term cross product. Basic properties of the system are analyzed by means of Lyapunov exponents and bifurcation diagrams.  相似文献   
100.
This paper considers the computation of the simplest parameterized normal forms (SPNF) of Hopf and generalized Hopf bifurcations. Although the notion of the simplest normal form has been studied for more than two decades, most of the efforts have been spent on the systems that do not involve perturbation parameters due to the restriction of the computational complexity. Very recently, two singularities – single zero and Hopf bifurcation – have been investigated, and the SPNFs for these two cases have been obtained. This paper extends a recently developed method for Hopf bifurcation to compute the SPNF of generalized Hopf bifurcations. The attention is focused on a codimension-2 generalized Hopf bifurcation. It is shown that the SPNF cannot be obtained by using only a near-identity transformation. Additional transformations such as time and parameter rescaling are further introduced. Moreover, an efficient recursive formula is presented for computing the SPNF. Examples are given to demonstrate the applicability of the new method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号