首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10784篇
  免费   1285篇
  国内免费   740篇
化学   645篇
晶体学   55篇
力学   4240篇
综合类   126篇
数学   5166篇
物理学   2577篇
  2024年   7篇
  2023年   108篇
  2022年   148篇
  2021年   187篇
  2020年   299篇
  2019年   246篇
  2018年   277篇
  2017年   332篇
  2016年   354篇
  2015年   264篇
  2014年   440篇
  2013年   823篇
  2012年   509篇
  2011年   606篇
  2010年   530篇
  2009年   599篇
  2008年   563篇
  2007年   633篇
  2006年   613篇
  2005年   595篇
  2004年   533篇
  2003年   525篇
  2002年   477篇
  2001年   426篇
  2000年   393篇
  1999年   395篇
  1998年   357篇
  1997年   293篇
  1996年   233篇
  1995年   186篇
  1994年   143篇
  1993年   104篇
  1992年   124篇
  1991年   100篇
  1990年   75篇
  1989年   54篇
  1988年   34篇
  1987年   35篇
  1986年   33篇
  1985年   39篇
  1984年   26篇
  1983年   26篇
  1982年   15篇
  1981年   12篇
  1980年   7篇
  1979年   5篇
  1977年   5篇
  1976年   5篇
  1959年   3篇
  1957年   3篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
31.
In the present paper we give necessary and sufficient conditions for the subgroup separability of the fundamental group of a finite graph of groups with finitely generated abelian vertex groups.

  相似文献   

32.
A preconditioning approach based on the artificial compressibility formulation is extended to solve the governing equations for unsteady turbulent reactive flows with heat release, at low Mach numbers, on an unstructured hybrid grid context. Premixed reactants are considered and a flamelet approach for combustion modelling is adopted using a continuous quenched mean reaction rate. An overlapped cell‐vertex finite volume method is adopted as a discretisation scheme. Artificial dissipation terms for hybrid grids are explicitly added to ensure a stable, discretised set of equations. A second‐order, explicit, hybrid Runge–Kutta scheme is applied for the time marching in pseudo‐time. A time derivative of the dependent variable is added to recover the time accuracy of the preconditioned set of equations. This derivative is discretised by an implicit, second‐order scheme. The resulting scheme is applied to the calculation of an infinite planar (one‐dimensional) turbulent premixed flame propagating freely in reactants whose turbulence is supposed to be frozen, homogeneous and isotropic. The accuracy of the results obtained with the proposed method proves to be excellent when compared to the data available in the literature. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
33.
We consider the Signorini problem with Coulomb friction in elasticity. Sufficient conditions of non‐uniqueness are obtained for the continuous model. These conditions are linked to the existence of real eigenvalues of an operator in a Hilbert space. We prove that, under appropriate conditions, real eigenvalues exist for a non‐local Coulomb friction model. Finite element approximation of the eigenvalue problem is considered and numerical experiments are performed. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
34.
For the Boussinesq approximation of the equations of coupled heat and fluid flow in a porous medium we show that the corresponding system of partial differential equations possesses a global attractor. We give lower and upper bounds of the Hausdorff dimension of the attractor depending on a physical parameter of the system, namely the Rayleigh number of the flow. Numerical experiments confirm the theoretical findings and raise new questions on the structure of the solutions of the system. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
35.
In this paper, a unified approach for analysing finite dimensional approximations to a class of partial differential equations boundary value problems (second‐kind Fredholm differential equations) is introduced. The approach is shown to be general despite of its extremely simple form. In particular, it is expected to be useful in the convergence analysis of finite element methods for solving PDE problems. Three specific examples are presented to illustrate the broad applicability of the approach. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
36.
美式期权定价中非局部问题的有限元方法   总被引:2,自引:1,他引:1  
在本文中 ,我们关心的是美式期权的有限元方法 .首先 ,根据 [4 ]我们对所讨论的问题引进一个新奇的实用的方法 ,它涉及到对原问题重新形成准确的数学公式 ,使得数值解的计算可以在非常小的区域上进行 ,从而该算法计算速度快精度高 .进而 ,我们利用超逼近分析技术得到了有限元解关于 L2 -模的最优估计 .  相似文献   
37.
38.
We study the solvability and Galerkin approximation of an exterior hyperelastic interface problem arising in plane elasticity. The weak formulation is obtained from an appropriate combination of a mixed finite element approach with a Dirichlet-to-Neumann method. The derivation of our results is based on some tools from nonlinear functional analysis and the Babuska-Brezzi theory for variational problems with constraints.  相似文献   
39.
The analysis of mechanical structures using the Finite Element Method in the framework of large elastoplastic strain, needs frequent remeshing of the deformed domain during computation. Indeed, the remeshing is due to the large geometrical distortion of finite elements and the adaptation to the physical behavior of the solution. This paper gives the necessary steps to remesh a mechanical structure during large elastoplastic deformations with damage. An important part of this process is constituted by geometrical and physical error estimates. The proposed method is integrated in a computational environment using the ABAQUS/Explicit solver and the BL2D-V2 adaptive mesher. To cite this article: H. Borouchaki et al., C. R. Mecanique 330 (2002) 709–716.  相似文献   
40.
Montgomery Multiplication in GF(2k)   总被引:8,自引:0,他引:8  
We show that the multiplication operation c=a · b · r-1 in the field GF(2k can be implemented significantly faster in software than the standard multiplication, where r is a special fixed element of the field. This operation is the finite field analogue of the Montgomery multiplication for modular multiplication of integers. We give the bit-level and word-level algorithms for computing the product, perform a thorough performance analysis, and compare the algorithm to the standard multiplication algorithm in GF(2k. The Montgomery multiplication can be used to obtain fast software implementations of the discrete exponentiation operation, and is particularly suitable for cryptographic applications where k is large.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号