首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   124篇
  免费   3篇
  国内免费   2篇
化学   52篇
晶体学   2篇
力学   5篇
数学   27篇
物理学   43篇
  2022年   3篇
  2021年   16篇
  2020年   3篇
  2019年   3篇
  2018年   3篇
  2017年   5篇
  2016年   16篇
  2015年   7篇
  2014年   3篇
  2013年   10篇
  2012年   11篇
  2011年   8篇
  2010年   5篇
  2009年   5篇
  2008年   1篇
  2007年   1篇
  2006年   3篇
  2005年   4篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  1995年   4篇
  1990年   2篇
  1988年   2篇
  1987年   1篇
  1986年   3篇
  1985年   4篇
  1984年   3篇
排序方式: 共有129条查询结果,搜索用时 234 毫秒
121.
In this work, we briefly discuss a novel class of modified gravity like f(T, TG) gravity. In this background, we assume the new agegraphic version of pilgrim dark energy and reconstruct f(T, TG) models for two specific values of s. We also discuss the equation of state parameter, squared speed of sound and wDE-w'DE plane for these reconstructed f(T, TG) models. The equation of state parameter provides phantom-like behavior of the universe. The wDE-w'DE plane also corresponds to CDM limit, thawing and freezing regions for both models.  相似文献   
122.
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in images. To get better results, instead of single substitution box, some researchers are minimizing the autocorrelation via utilizing multiple substitution boxes. However, we found that multiple substitution boxes cannot solve the problem of autocorrelation independently. Therefore, we added chaotic confusion and diffusion to the existing substitution scheme in order to remove the correlation completely. Initially, we break the autocorrelation of data by permuting the pixels via TD-ERCS chaotic map. Bitwise XOR is carried out for diffusion using logistic map followed by the existing substitution scheme. Experimental analysis shows that the proposed scheme has greater resistance to brute force attack and statistical attack. Further analyses such as statistical analysis, peak signal-to-noise ratio, contrast analysis, key space analysis, entropy analysis, correlation analysis, key sensitivity analysis, and encryption quality analysis proved the high robustness of the proposed scheme.  相似文献   
123.
We investigate the dynamics of a charged particle being kicked off from its circular orbit around a regular black hole by an incoming massive particle in the presence of magnetic field. The resulting escape velocity, escape energy and the effective potential are analyzed. It is shown that the presence of even a very weak magnetic field helps the charged particles in escaping the gravitational field of the black hole. Moreover the effective force acting on the particle visibly reduces with distance. Thus particle near the black hole will experience higher effective force as compared to when it is far away.  相似文献   
124.
Combinatorial auctions are an important class of market mechanisms in which participants are allowed to bid on bundles of multiple heterogeneous items. In this paper, we discuss several complex issues that are encountered in the design of combinatorial auctions. These issues are related to the formulation of the winner determination problem, the expression of combined bids, the design of progressive combinatorial auctions that require less information revelation, and the need for decision support tools to help participants make profitable bidding decisions. For each issue, we survey the existing literature and propose avenues for further research.Received: April 2003, Revised: July 2003, AMS classification: 91B26, 90BXX, 90C27All correspondence to:Jawad Abrache  相似文献   
125.
We characterize Banach lattices on which the class of order weakly compact operators coincides with that of b-weakly compact operators.  相似文献   
126.
Journal of Thermal Analysis and Calorimetry - This paper studies an unsteady magnetohydrodynamic (MHD) Maxwell fluid flow on a rotating as well as a vertically moving disk in the presence of...  相似文献   
127.
We establish necessary and sufficient conditions under which b-weakly compact operators between Banach lattices have b-weakly compact adjoints or operators with b-weakly compact adjoints are themselves b-weakly compact. Also, we give some consequences.   相似文献   
128.
129.
The Schrödinger–Hirota equation governs the propagation of optical solitons in a dispersive optical fiber. In this paper, this equation will be solved by the ansatz method for bright and dark 1-soliton solution. The power law nonlinearity will be assumed. By using the tanh method, some additional solutions will be derived. Finally, the numerical simulations will be given.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号