首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1389篇
  免费   191篇
  国内免费   69篇
化学   165篇
晶体学   5篇
力学   219篇
综合类   34篇
数学   526篇
物理学   700篇
  2024年   12篇
  2023年   14篇
  2022年   34篇
  2021年   34篇
  2020年   39篇
  2019年   49篇
  2018年   35篇
  2017年   25篇
  2016年   37篇
  2015年   29篇
  2014年   75篇
  2013年   92篇
  2012年   73篇
  2011年   88篇
  2010年   74篇
  2009年   75篇
  2008年   92篇
  2007年   85篇
  2006年   68篇
  2005年   79篇
  2004年   82篇
  2003年   52篇
  2002年   69篇
  2001年   51篇
  2000年   27篇
  1999年   30篇
  1998年   39篇
  1997年   41篇
  1996年   24篇
  1995年   14篇
  1994年   18篇
  1993年   17篇
  1992年   17篇
  1991年   5篇
  1990年   10篇
  1989年   5篇
  1988年   3篇
  1987年   8篇
  1986年   4篇
  1985年   6篇
  1984年   4篇
  1983年   1篇
  1982年   5篇
  1981年   1篇
  1980年   2篇
  1978年   4篇
  1974年   1篇
排序方式: 共有1649条查询结果,搜索用时 15 毫秒
31.
As computing resources continue to improve, global solutions for larger size quadrically constrained optimization problems become more achievable. In this paper, we focus on larger size problems and get accurate bounds for optimal values of such problems with the successive use of SDP relaxations on a parallel computing system called Ninf (Network-based Information Library for high performance computing).  相似文献   
32.
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several approaches to enable such systems and will compare them.AMS classification: 94A60, 94A62, 68P25  相似文献   
33.
New methods for computing eigenvectors of symmetric block tridiagonal matrices based on twisted block factorizations are explored. The relation of the block where two twisted factorizations meet to an eigenvector of the block tridiagonal matrix is reviewed. Based on this, several new algorithmic strategies for computing the eigenvector efficiently are motivated and designed. The underlying idea is to determine a good starting vector for an inverse iteration process from the twisted block factorizations such that a good eigenvector approximation can be computed with a single step of inverse iteration.  相似文献   
34.
In this paper, the (2 + 1)-dimensional Korteweg-de Vries system is symbolically investigated. By the bilinear method, the N-soliton solution is presented. Then, based on the Bäcklund transformation in bilinear form, a new Bäcklund transformation is obtained and new representation of the N-soliton solution is derived. A class of novel multi-soliton solutions are obtained by the new Bäcklund transformation and the availability of symbolic computation is demonstrated.  相似文献   
35.
Recent protein observations motivate the dark-soliton study to explain the energy transfer in the proteins. In this paper we will investigate a fourth-order dispersive nonlinear Schrödinger equation, which governs the Davydov solitons in the alpha helical protein with higher-order effects. Painlevé analysis is performed to prove the equation is integrable. Through the introduction of an auxiliary function, bilinear forms and dark N-soliton solutions are constructed with the Hirota method and symbolic computation. Asymptotic analysis on the two-soliton solutions indicates that the soliton collisions are elastic. Decrease of the coefficient of higher-order effects can increase the soliton velocities. Graphical analysis on the two-soliton solutions indicates that the head-on collision between the two solitons, overtaking collision between the two solitons and collision between a moving soliton and a stationary one are all elastic. Collisions among the three solitons are all pairwise elastic.  相似文献   
36.
This paper discusses algorithms for computing verified convex hull and distance enclosure for objects represented by axis-aligned or unaligned octrees. To find a convex enclosure of an octree, the concept of extreme vertices of boxes on its boundary has been used. The convex hull of all extreme vertices yields an enclosure of the object. Thus, distance algorithms for convex polyhedra to obtain lower bounds for the distance between two octrees can be applied. Since using convex hulls makes it possible to avoid the unwanted wrapping effect that results from repeated decompositions, it also opens a way to dynamic distance algorithms for moving objects.  相似文献   
37.
The relationship between mental computation and number sense is complex: mental computation can facilitate number sense when students are encouraged to be flexible, but flexibility and number sense is neither sufficient nor necessary for accuracy in mental computation. It is possible for familiarity with a strategy to compensate for a lack of number sense and inefficient processes. This study reports on six case studies exploring Year 3 students’ procedures for and understanding of mental addition and subtraction, and understanding of number sense and other cognitive, metacognitive, and affective factors associated with mental computation. The case studies indicate that the mental computation process is composed of four stages in which cognitive, metacognitive and affective factors operate differently for flexible and inflexible computers. The authors propose a model in which the differences between computer types are seen in terms of the application of different knowledges in number facts, numeration, effect of operation on number, and beliefs and metacognition on strategy choice and strategy implementation.  相似文献   
38.
Korteweg-de Vries (KdV)-type equations can describe some physical phenomena in fluids, nonlinear optics, quantum mechanics, plasmas, etc. In this paper, with the aid of symbolic computation, the integrable sixth-order KdV equation is investigated. Darboux transformation (DT) with an arbitrary parameter is presented. Explicit solutions are derived with the DT. Relevant properties are graphically illustrated, which might be helpful to understand some physical processes in fluids, plasmas, optics and quantum mechanics.  相似文献   
39.
    
We perform first-principles calculations to investigate whether or not nitrogen is the best dopant in system of Co−X4 embedded graphene (X=N, S, B, and P) electrocatalysts towards hydrogen evolution reaction(HER). Our theoretical results reveal that N, S, B, and P-doped graphene can enhance the catalytic activity toward HER compared with the pristine graphene, and S doped graphene exhibits more favorable performance than N doped graphene, consistent with the experimental results. For the Co−X4 embedded graphene (X=N, S, B, and P), we predict that S may be a promising dopant in graphene supported single atom Co. The rather low hydrogen adsorption free energy (−0.07 eV) and activation energy barrier (0.78 eV) for the rate-determining step, the downshift of the d band center, the enhanced charge density of dz2 orbital as well as the reduced work function are responsible for the unexpected activity of Co-S4 embedded graphene for HER. Overall, Co-S4 embedded graphene catalyst could be a good candidate for hydrogen evolution reaction.  相似文献   
40.
    
Deep neural networks may achieve excellent performance in many research fields. However, many deep neural network models are over-parameterized. The computation of weight matrices often consumes a lot of time, which requires plenty of computing resources. In order to solve these problems, a novel block-based division method and a special coarse-grained block pruning strategy are proposed in this paper to simplify and compress the fully connected structure, and the pruned weight matrices with a blocky structure are then stored in the format of Block Sparse Row (BSR) to accelerate the calculation of the weight matrices. First, the weight matrices are divided into square sub-blocks based on spatial aggregation. Second, a coarse-grained block pruning procedure is utilized to scale down the model parameters. Finally, the BSR storage format, which is much more friendly to block sparse matrix storage and computation, is employed to store these pruned dense weight blocks to speed up the calculation. In the following experiments on MNIST and Fashion-MNIST datasets, the trend of accuracies with different pruning granularities and different sparsity is explored in order to analyze our method. The experimental results show that our coarse-grained block pruning method can compress the network and can reduce the computational cost without greatly degrading the classification accuracy. The experiment on the CIFAR-10 dataset shows that our block pruning strategy can combine well with the convolutional networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号