首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1232篇
  免费   97篇
  国内免费   65篇
化学   30篇
力学   195篇
综合类   11篇
数学   756篇
物理学   402篇
  2024年   3篇
  2023年   8篇
  2022年   10篇
  2021年   23篇
  2020年   30篇
  2019年   26篇
  2018年   21篇
  2017年   35篇
  2016年   33篇
  2015年   34篇
  2014年   57篇
  2013年   108篇
  2012年   54篇
  2011年   70篇
  2010年   64篇
  2009年   91篇
  2008年   96篇
  2007年   87篇
  2006年   70篇
  2005年   51篇
  2004年   47篇
  2003年   58篇
  2002年   32篇
  2001年   42篇
  2000年   32篇
  1999年   34篇
  1998年   34篇
  1997年   24篇
  1996年   13篇
  1995年   11篇
  1994年   11篇
  1993年   11篇
  1992年   9篇
  1991年   4篇
  1990年   4篇
  1989年   2篇
  1988年   7篇
  1987年   7篇
  1986年   4篇
  1985年   4篇
  1984年   4篇
  1983年   3篇
  1981年   6篇
  1980年   2篇
  1979年   2篇
  1978年   5篇
  1975年   4篇
  1973年   2篇
  1971年   2篇
  1957年   1篇
排序方式: 共有1394条查询结果,搜索用时 31 毫秒
951.
New first- and high-order centred methods for conservation lawsare presented. Convenient TVD conditions for constructing centredTVD schemes are then formulated and some useful results areproved. Two families of centred TVD schemes are constructedand extended to nonlinear systems. Some numerical results arealso presented.  相似文献   
952.
We consider the asymptotics of certain symmetric k-tensors, the vector analogue of sample moments for i.i.d. random variables. The limiting distribution is operator stable as an element of the vector space of real symmetric k-tensors.  相似文献   
953.
Prabodh Shukla 《Pramana》2008,71(2):319-329
Bootstrap percolation transition may be first order or second order, or it may have a mixed character where a first-order drop in the order parameter is preceded by critical fluctuations. Recent studies have indicated that the mixed transition is characterized by power-law avalanches, while the continuous transition is characterized by truncated avalanches in a related sequential bootstrap process. We explain this behaviour on the basis of an analytical and numerical study of the avalanche distributions on a Bethe lattice.   相似文献   
954.
The goal of this paper is to construct efficient parallel solvers for 2D hyperbolic systems of conservation laws with source terms and nonconservative products. The method of lines is applied: at every intercell a projected Riemann problem along the normal direction is considered which is discretized by means of well-balanced Roe methods. The resulting 2D numerical scheme is explicit and first-order accurate. In [M.J. Castro, J.A. García, J.M. González, C. Pares, A parallel 2D Finite Volume scheme for solving systems of balance laws with nonconservative products: Application to shallow flows, Comput. Methods Appl. Mech. Engrg. 196 (2006) 2788–2815] a domain decomposition method was used to parallelize the resulting numerical scheme, which was implemented in a PC cluster by means of MPI techniques.  相似文献   
955.
This work adresses an unsteady heat flow problem involving friction and convective heat transfer behaviors on a part of the boundary. The problem is constituted by a variational motion inequality with energy dependent coefficients, and the energy equation in the framework of L 1-theory for the dissipative term. Using the duality theory of convex analysis, it also envolves the existence of Lagrange multipliers. Weak solutions of an approximate coupled system are proven by a fixed point argument for multivalued mappings and compactness methods. Then the existence result for the initial coupled system is proven by the passage to the limit. This work was partially supported by FCT research program POCTI (Portugal/FEDER-EU).  相似文献   
956.
The main feature of the penalty schemes described in current sentencing guidelines is that the fine is based on the accumulated gains from cartel activities or price-fixing activities for the firm. The regulations suggest modeling the penalty as an increasing function of the accumulated illegal gains from price fixing to the firm, so that the history of the violation is taken into account. We incorporate these features of the penalty scheme into an optimal control model of a profit-maximizing firm under antitrust enforcement. To determine the effect of taking into account the history of the violation, we compare the outcome of this model with a model where the penalty is fixed. The analysis of the latter model implies that complete deterrence can be achieved only at the cost of shutting down the firm. The proportional scheme improves upon the fixed penalty, since it can ensure complete deterrence in the long run, even when penalties are moderate. Phase-diagram analysis shows that, the higher the probability and severity of punishment, the sooner cartel formation is blocked. Further, a sensitivity analysis is provided to show which strategies are most successful in reducing the degree of price fixing. It turns out that, when the penalties are already high, the antitrust policy aiming at a further increase in the severity of punishment is less efficient than the policy that increases the probability of punishment. The authors thank Eric van Damme, Thomas Fent, and an anonymous referee for stimulating discussions and valuable comments.  相似文献   
957.
We study the property of certain complex networks of being both sparse and highly connected, which is known as “good expansion” (GE). A network has GE properties if every subset S of nodes (up to 50% of the nodes) has a neighborhood that is larger than some “expansion factor” φ multiplied by the number of nodes in S. Using a graph spectral method we introduce here a new parameter measuring the good expansion character of a network. By means of this parameter we are able to classify 51 real-world complex networks — technological, biological, informational, biological and social — as GENs or non-GENs. Combining GE properties and node degree distribution (DD) we classify these complex networks in four different groups, which have different resilience to intentional attacks against their nodes. The simultaneous existence of GE properties and uniform degree distribution contribute significantly to the robustness in complex networks. These features appear solely in 14% of the 51 real-world networks studied here. At the other extreme we find that ∼40% of all networks are very vulnerable to targeted attacks. They lack GE properties, display skewed DD — exponential or power-law — and their topologies are changed more dramatically by targeted attacks directed at bottlenecks than by the removal of network hubs.  相似文献   
958.
Various differential and integral relations are deduced that involve fractional derivatives of the Airy function Ai(x) and the Scorer function Gi(x). Several new Wronskian relations are obtained that lead to the calculation of a number of indefinite integrals containing fractional derivatives of the Airy functions. New fractional derivative conservation laws are derived for equations of the Korteweg-de Vries type.  相似文献   
959.
本文通过积分检验, 刻画了不同分布的$\varphi$-混合序列后置和的极限结果,并由此导出了它们的Chover型重对数律,推广和改进了已有的结果.  相似文献   
960.
In this paper, we propose a three-component Camassa-Holm (3CH) system with cubic nonlinearity and peaked solitons (peakons). The 3CH model is proven to be integrable in the sense of Lax pair, Hamiltonian structure, and conservation laws. We show that this system admits peakons and multi-peakon solutions. Additionally, reductions of the 3CH system are investigated so that a new integrable perturbed CH equation with cubic nonlinearity is generated to possess peakon solutions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号