全文获取类型
收费全文 | 674篇 |
免费 | 15篇 |
国内免费 | 81篇 |
专业分类
化学 | 500篇 |
晶体学 | 3篇 |
力学 | 12篇 |
综合类 | 3篇 |
数学 | 157篇 |
物理学 | 95篇 |
出版年
2023年 | 15篇 |
2022年 | 13篇 |
2021年 | 11篇 |
2020年 | 12篇 |
2019年 | 14篇 |
2018年 | 10篇 |
2017年 | 17篇 |
2016年 | 14篇 |
2015年 | 13篇 |
2014年 | 35篇 |
2013年 | 50篇 |
2012年 | 42篇 |
2011年 | 48篇 |
2010年 | 30篇 |
2009年 | 59篇 |
2008年 | 50篇 |
2007年 | 59篇 |
2006年 | 35篇 |
2005年 | 25篇 |
2004年 | 34篇 |
2003年 | 17篇 |
2002年 | 26篇 |
2001年 | 18篇 |
2000年 | 13篇 |
1999年 | 13篇 |
1998年 | 12篇 |
1997年 | 9篇 |
1996年 | 14篇 |
1995年 | 9篇 |
1994年 | 9篇 |
1993年 | 7篇 |
1992年 | 6篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有770条查询结果,搜索用时 12 毫秒
81.
In this paper, a simultaneous canonical form of a pair of rectangular complex matrices is developed. Using this new tool we give a necessary and sufficient condition to assure that the reverse order law is valid for the weighted Moore–Penrose inverse. Additionally, we characterize matrices ordered by the weighted star partial order and adjacent matrices as applications. 相似文献
82.
《Mathematische Nachrichten》2017,290(14-15):2185-2197
The rate of change of the sharp constant in the Sobolev–Poincaré or Friedrichs inequality is estimated for a Euclidean domain that moves outward. The key ingredients are a Hadamard variation formula and an inequality that reverses the usual Hölder inequality. 相似文献
84.
Iddo Eliazar 《Queueing Systems》2007,55(1):71-82
We explore M/G/∞ systems ‘fed’ by Poissonian inflows with infinite arrival rates. Three processes – corresponding to the system's state, workload, and queue-size – are studied and analyzed. Closed form formulae characterizing the system's stationary structure and correlation structure are derived. And, the issues of queue finiteness, workload summability, and Long Range Dependence are investigated.
We then turn to devise a ‘reverse engineering’ scheme for the design of the system's correlation structure. Namely: how to construct an M/G/∞ system with a pre-desired ‘target’ workload/queue auto-covariance function. The ‘reverse engineering’ scheme is applied
to various examples, including ones with infinite queues and non-summable workloads.
AMS Subject Classifications Primary: 60K25; Secondary: 60G55, 60G10 相似文献
85.
We study two deterministic scheduling problems that combine batching and deterioration features. In both problems, there is a certain demand for identical good quality items to be produced in batches. In the first problem, each batch is assigned an individual machine that requires a cost and a time to be activated. All the machines are identical, work in parallel, and always produce good quality items. All the items are available at time zero and they deteriorate while waiting for production. Deterioration results in a linear increase of time and cost of production. In the second problem, there is a single machine that produces good quality as well as defective items in batches. Each batch is preceded by a setup time and requires a setup cost. Defective items have to be reworked on the same machine. They deteriorate while waiting for rework. At a time to be decided, the machine switches from production to rework defective items of the current batch. After rework, every defective item has the required good quality. In both problems, the objective is to find batch partitioning such that a linear combination of the production cost and production completion time is minimized. The two problems are observed at computer service providers and also reverse logistics. In computer service providers, machines and items correspond to communication service channels and information transfer tasks, respectively. We reduce both problems to minimizing a function of one variable representing the number of batches. In an optimal solution of either problem, there are at most two different batch sizes. Linear time algorithms are proposed for both problems. 相似文献
86.
本文首先将文[1]中的BLD映射推广为弱(L1,L2)-BLD映射,并证明了如下正则性结果:存在两个可积指数 P1=P1(n,L1,L2)<n<q1=q1(n,L1,L2),使得对任意弱(L1,L2)-BLD映射f∈(Ω,Rn),都有f∈(Ω,Rn),即f为(L1,L2)-BLD映射. 相似文献
87.
反求工程在工业设计中的应用 总被引:1,自引:0,他引:1
介绍了反求工程全新的逆向思维设计方法在制造业中的应用,表明了反求工程技术在工业设计中存在着巨大的应用潜力,尤其是工业设计中三维造型设计技术的广泛应用,为反求工程技术的应用奠定了良好的基础。 相似文献
88.
For 0≤k≤n, let be the entries in Euler’s difference table and let . Dumont and Randrianarivony showed equals the number of permutations on [n] whose fixed points are contained in {1,2,…,k}. Rakotondrajao found a combinatorial interpretation of the number in terms of k-fixed-points-permutations of [n]. We show that for any n≥1, the sequence is essentially 2-log-concave and reverse ultra log-concave. 相似文献
89.
The control of flow in a tundish is important for improving the quality of the steel. Dams, Wiers and Pouring chamber are some of the devices used for controlling the flow in the tundish. The investigation about the role of electromagnetic forces as a replacement for these devices is an objective for the present work. Thus, 3-D MHD simulation was performed to study the effect of electromagnetic forces on flow behaviour in the tundish. The MHD model developed for carrying out the simulation was validated with the analytical solution of the Hartman problem. The results obtained shows improvement in the desired characteristics for inclusion flotataion with magnetic flow modifier of optimum strength of magnetic field. 相似文献
90.
Complex network theory is a useful way to study many real systems. In this paper, an anti-attack model based on complex network theory is introduced. The mechanism of this model is based on a dynamic compensation process and a reverse percolation process in P2P networks. The main purpose of the paper is: (i) a dynamic compensation process can turn an attacked P2P network into a power-law (PL) network with exponential cutoff; (ii) a local healing process can restore the maximum degree of peers in an attacked P2P network to a normal level; (iii) a restoring process based on reverse percolation theory connects the fragmentary peers of an attacked P2P network together into a giant connected component. In this way, the model based on complex network theory can be effectively utilized for anti-attack and protection purposes in P2P networks. 相似文献