全文获取类型
收费全文 | 1389篇 |
免费 | 191篇 |
国内免费 | 69篇 |
专业分类
化学 | 165篇 |
晶体学 | 5篇 |
力学 | 219篇 |
综合类 | 34篇 |
数学 | 526篇 |
物理学 | 700篇 |
出版年
2024年 | 12篇 |
2023年 | 14篇 |
2022年 | 34篇 |
2021年 | 34篇 |
2020年 | 39篇 |
2019年 | 49篇 |
2018年 | 35篇 |
2017年 | 25篇 |
2016年 | 37篇 |
2015年 | 29篇 |
2014年 | 75篇 |
2013年 | 92篇 |
2012年 | 73篇 |
2011年 | 88篇 |
2010年 | 74篇 |
2009年 | 75篇 |
2008年 | 92篇 |
2007年 | 85篇 |
2006年 | 68篇 |
2005年 | 79篇 |
2004年 | 82篇 |
2003年 | 52篇 |
2002年 | 69篇 |
2001年 | 51篇 |
2000年 | 27篇 |
1999年 | 30篇 |
1998年 | 39篇 |
1997年 | 41篇 |
1996年 | 24篇 |
1995年 | 14篇 |
1994年 | 18篇 |
1993年 | 17篇 |
1992年 | 17篇 |
1991年 | 5篇 |
1990年 | 10篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 8篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 1篇 |
1982年 | 5篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1978年 | 4篇 |
1974年 | 1篇 |
排序方式: 共有1649条查询结果,搜索用时 15 毫秒
31.
Akiko Takeda Katsuki Fujisawa Yusuke Fukaya Masakazu Kojima 《Journal of Global Optimization》2002,24(2):237-260
As computing resources continue to improve, global solutions for larger size quadrically constrained optimization problems become more achievable. In this paper, we focus on larger size problems and get accurate bounds for optimal values of such problems with the successive use of SDP relaxations on a parallel computing system called Ninf (Network-based Information Library for high performance computing). 相似文献
32.
Keith?M.?MartinEmail author Rei?Safavi-Naini Huaxiong?Wang Peter?R.?Wild 《Designs, Codes and Cryptography》2005,36(3):263-287
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several approaches to enable such systems and will compare them.AMS classification: 94A60, 94A62, 68P25 相似文献
33.
Gerhard König Michael Moldaschl Wilfried N. Gansterer 《Journal of Computational and Applied Mathematics》2012
New methods for computing eigenvectors of symmetric block tridiagonal matrices based on twisted block factorizations are explored. The relation of the block where two twisted factorizations meet to an eigenvector of the block tridiagonal matrix is reviewed. Based on this, several new algorithmic strategies for computing the eigenvector efficiently are motivated and designed. The underlying idea is to determine a good starting vector for an inverse iteration process from the twisted block factorizations such that a good eigenvector approximation can be computed with a single step of inverse iteration. 相似文献
34.
In this paper, the (2 + 1)-dimensional Korteweg-de Vries system is symbolically investigated. By the bilinear method, the N-soliton solution is presented. Then, based on the Bäcklund transformation in bilinear form, a new Bäcklund transformation is obtained and new representation of the N-soliton solution is derived. A class of novel multi-soliton solutions are obtained by the new Bäcklund transformation and the availability of symbolic computation is demonstrated. 相似文献
35.
《Communications in Nonlinear Science & Numerical Simulation》2014,19(3):520-529
Recent protein observations motivate the dark-soliton study to explain the energy transfer in the proteins. In this paper we will investigate a fourth-order dispersive nonlinear Schrödinger equation, which governs the Davydov solitons in the alpha helical protein with higher-order effects. Painlevé analysis is performed to prove the equation is integrable. Through the introduction of an auxiliary function, bilinear forms and dark N-soliton solutions are constructed with the Hirota method and symbolic computation. Asymptotic analysis on the two-soliton solutions indicates that the soliton collisions are elastic. Decrease of the coefficient of higher-order effects can increase the soliton velocities. Graphical analysis on the two-soliton solutions indicates that the head-on collision between the two solitons, overtaking collision between the two solitons and collision between a moving soliton and a stationary one are all elastic. Collisions among the three solitons are all pairwise elastic. 相似文献
36.
This paper discusses algorithms for computing verified convex hull and distance enclosure for objects represented by axis-aligned or unaligned octrees. To find a convex enclosure of an octree, the concept of extreme vertices of boxes on its boundary has been used. The convex hull of all extreme vertices yields an enclosure of the object. Thus, distance algorithms for convex polyhedra to obtain lower bounds for the distance between two octrees can be applied. Since using convex hulls makes it possible to avoid the unwanted wrapping effect that results from repeated decompositions, it also opens a way to dynamic distance algorithms for moving objects. 相似文献
37.
The relationship between mental computation and number sense is complex: mental computation can facilitate number sense when students are encouraged to be flexible, but flexibility and number sense is neither sufficient nor necessary for accuracy in mental computation. It is possible for familiarity with a strategy to compensate for a lack of number sense and inefficient processes. This study reports on six case studies exploring Year 3 students’ procedures for and understanding of mental addition and subtraction, and understanding of number sense and other cognitive, metacognitive, and affective factors associated with mental computation. The case studies indicate that the mental computation process is composed of four stages in which cognitive, metacognitive and affective factors operate differently for flexible and inflexible computers. The authors propose a model in which the differences between computer types are seen in terms of the application of different knowledges in number facts, numeration, effect of operation on number, and beliefs and metacognition on strategy choice and strategy implementation. 相似文献
38.
Korteweg-de Vries (KdV)-type equations can describe some physical phenomena in fluids, nonlinear optics, quantum mechanics, plasmas, etc. In this paper, with the aid of symbolic computation, the integrable sixth-order KdV equation is investigated. Darboux transformation (DT) with an arbitrary parameter is presented. Explicit solutions are derived with the DT. Relevant properties are graphically illustrated, which might be helpful to understand some physical processes in fluids, plasmas, optics and quantum mechanics. 相似文献
39.
Dr. Chunjin Ren Lu Wen Dr. Saneliswa Magagula Qianyu Jiang Prof. Wei Lin Prof. Yongfan Zhang Prof. Zhongfang Chen Prof. Kaining Ding 《ChemCatChem》2020,12(2):536-543
We perform first-principles calculations to investigate whether or not nitrogen is the best dopant in system of Co−X4 embedded graphene (X=N, S, B, and P) electrocatalysts towards hydrogen evolution reaction(HER). Our theoretical results reveal that N, S, B, and P-doped graphene can enhance the catalytic activity toward HER compared with the pristine graphene, and S doped graphene exhibits more favorable performance than N doped graphene, consistent with the experimental results. For the Co−X4 embedded graphene (X=N, S, B, and P), we predict that S may be a promising dopant in graphene supported single atom Co. The rather low hydrogen adsorption free energy (−0.07 eV) and activation energy barrier (0.78 eV) for the rate-determining step, the downshift of the d band center, the enhanced charge density of dz2 orbital as well as the reduced work function are responsible for the unexpected activity of Co-S4 embedded graphene for HER. Overall, Co-S4 embedded graphene catalyst could be a good candidate for hydrogen evolution reaction. 相似文献
40.
Lan Huang Jia Zeng Shiqi Sun Wencong Wang Yan Wang Kangping Wang 《Entropy (Basel, Switzerland)》2021,23(8)
Deep neural networks may achieve excellent performance in many research fields. However, many deep neural network models are over-parameterized. The computation of weight matrices often consumes a lot of time, which requires plenty of computing resources. In order to solve these problems, a novel block-based division method and a special coarse-grained block pruning strategy are proposed in this paper to simplify and compress the fully connected structure, and the pruned weight matrices with a blocky structure are then stored in the format of Block Sparse Row (BSR) to accelerate the calculation of the weight matrices. First, the weight matrices are divided into square sub-blocks based on spatial aggregation. Second, a coarse-grained block pruning procedure is utilized to scale down the model parameters. Finally, the BSR storage format, which is much more friendly to block sparse matrix storage and computation, is employed to store these pruned dense weight blocks to speed up the calculation. In the following experiments on MNIST and Fashion-MNIST datasets, the trend of accuracies with different pruning granularities and different sparsity is explored in order to analyze our method. The experimental results show that our coarse-grained block pruning method can compress the network and can reduce the computational cost without greatly degrading the classification accuracy. The experiment on the CIFAR-10 dataset shows that our block pruning strategy can combine well with the convolutional networks. 相似文献