首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   82949篇
  免费   587篇
  国内免费   396篇
化学   28014篇
晶体学   810篇
力学   6804篇
数学   32554篇
物理学   15750篇
  2023年   57篇
  2022年   57篇
  2021年   96篇
  2020年   119篇
  2019年   119篇
  2018年   10483篇
  2017年   10302篇
  2016年   6267篇
  2015年   1032篇
  2014年   478篇
  2013年   620篇
  2012年   4138篇
  2011年   10833篇
  2010年   5846篇
  2009年   6227篇
  2008年   6878篇
  2007年   8982篇
  2006年   484篇
  2005年   1569篇
  2004年   1753篇
  2003年   2135篇
  2002年   1199篇
  2001年   346篇
  2000年   377篇
  1999年   239篇
  1998年   251篇
  1997年   234篇
  1996年   273篇
  1995年   190篇
  1994年   126篇
  1993年   154篇
  1992年   100篇
  1991年   95篇
  1990年   75篇
  1989年   86篇
  1988年   78篇
  1987年   79篇
  1986年   77篇
  1985年   66篇
  1984年   59篇
  1983年   47篇
  1982年   57篇
  1981年   52篇
  1980年   55篇
  1979年   55篇
  1978年   50篇
  1973年   45篇
  1914年   45篇
  1909年   41篇
  1908年   40篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Let L be an elliptic operator, we give arguments about the duality estimate between Morrey spaces and its pre-dual spaces characterized by the heat kernel associated to L that is given in [6],[8].  相似文献   
992.
The interior proximal extragradient method for solving equilibrium problems   总被引:1,自引:0,他引:1  
In this article we present a new and efficient method for solving equilibrium problems on polyhedra. The method is based on an interior-quadratic proximal term which replaces the usual quadratic proximal term. This leads to an interior proximal type algorithm. Each iteration consists in a prediction step followed by a correction step as in the extragradient method. In a first algorithm each of these steps is obtained by solving an unconstrained minimization problem, while in a second algorithm the correction step is replaced by an Armijo-backtracking linesearch followed by an hyperplane projection step. We prove that our algorithms are convergent under mild assumptions: pseudomonotonicity for the two algorithms and a Lipschitz property for the first one. Finally we present some numerical experiments to illustrate the behavior of the proposed algorithms.  相似文献   
993.
In this paper, we study the evolution of hypersurface moving by the mean curvature minus an external force field. It is shown that the flow will blow up in a finite time if the mean curvature of the initial surface is larger than some constant depending on the boundness of derivatives of the external force field. For a linear force, we prove that the convexity of the hypersurface is preserved during the evolution and the flow has a unique smooth solution in any finite time and expands to infinity as the time tends to infinity if the initial curvature is smaller than the slope of the force.  相似文献   
994.
In the past decades, various neural network models have been developed for modeling the behavior of human brain or performing problem-solving through simulating the behavior of human brain. The recurrent neural networks are the type of neural networks to model or simulate associative memory behavior of human being. A recurrent neural network (RNN) can be generally formalized as a dynamic system associated with two fundamental operators: one is the nonlinear activation operator deduced from the input-output properties of the involved neurons, and the other is the synaptic connections (a matrix) among the neurons. Through carefully examining properties of various activation functions used, we introduce a novel type of monotone operators, the uniformly pseudo-projectionanti-monotone (UPPAM) operators, to unify the various RNN models appeared in the literature. We develop a unified encoding and stability theory for the UPPAM network model when the time is discrete. The established model and theory not only unify but also jointly generalize the most known results of RNNs. The approach has lunched a visible step towards establishment of a unified mathematical theory of recurrent neural networks.  相似文献   
995.
A new modified remote user authentication scheme using smart cards   总被引:1,自引:0,他引:1  
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.  相似文献   
996.
In this paper,the stochastic flow of mappings generated by a Feller convolution semigroup on a compact metric space is studied.This kind of flow is the generalization of superprocesses of stochastic flows and stochastic diffeomorphism induced by the strong solutions of stochastic differential equations.  相似文献   
997.
Myocardial infarction results from the rupture of an atherosclerotic plaque, which occurs in response to both mechanical stress and inflammatory processes. In order experimentally observe flow into atherosclerotic coronary artery morphologies, a novel technique for molding realistic compliant phantom featuring injection-molded inclusions and multiple layers has been developed. This transparent phantom allows for particle image velocimetry (PIV) flow analysis and can supply experimental data to validate computational fluid dynamics algorithms and hypothesis.  相似文献   
998.
A kicked quantum nondemolition measurement is introduced, where a qubit is weakly measured by pumping current. Measurement statistics are derived for weak measurements combined with single-qubit unitary operations. These results are applied to violate a generalization of the Leggett-Garg inequality. The violation is related to the failure of the noninvasive detector assumption, and may be interpreted as either intrinsic detector backaction, or the qubit entangling the microscopic detector excitations. The results are discussed in terms of a quantum point contact kicked by a pulse generator, measuring a double quantum dot.  相似文献   
999.

Background

The morphological development of neurons is a very complex process involving both genetic and environmental components. Mathematical modelling and numerical simulation are valuable tools in helping us unravel particular aspects of how individual neurons grow their characteristic morphologies and eventually form appropriate networks with each other.

Methods

A variety of mathematical models that consider (1) neurite initiation (2) neurite elongation (3) axon pathfinding, and (4) neurite branching and dendritic shape formation are reviewed. The different mathematical techniques employed are also described.

Results

Some comparison of modelling results with experimental data is made. A critique of different modelling techniques is given, leading to a proposal for a unified modelling environment for models of neuronal development.

Conclusion

A unified mathematical and numerical simulation framework should lead to an expansion of work on models of neuronal development, as has occurred with compartmental models of neuronal electrical activity.
  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号