全文获取类型
收费全文 | 4324篇 |
免费 | 251篇 |
国内免费 | 257篇 |
专业分类
化学 | 249篇 |
晶体学 | 1篇 |
力学 | 225篇 |
综合类 | 17篇 |
数学 | 3612篇 |
物理学 | 728篇 |
出版年
2024年 | 5篇 |
2023年 | 48篇 |
2022年 | 69篇 |
2021年 | 58篇 |
2020年 | 96篇 |
2019年 | 119篇 |
2018年 | 100篇 |
2017年 | 110篇 |
2016年 | 88篇 |
2015年 | 90篇 |
2014年 | 206篇 |
2013年 | 450篇 |
2012年 | 224篇 |
2011年 | 278篇 |
2010年 | 223篇 |
2009年 | 373篇 |
2008年 | 358篇 |
2007年 | 305篇 |
2006年 | 235篇 |
2005年 | 167篇 |
2004年 | 161篇 |
2003年 | 169篇 |
2002年 | 115篇 |
2001年 | 102篇 |
2000年 | 81篇 |
1999年 | 84篇 |
1998年 | 74篇 |
1997年 | 88篇 |
1996年 | 69篇 |
1995年 | 47篇 |
1994年 | 49篇 |
1993年 | 24篇 |
1992年 | 27篇 |
1991年 | 16篇 |
1990年 | 11篇 |
1989年 | 4篇 |
1988年 | 10篇 |
1987年 | 3篇 |
1986年 | 9篇 |
1985年 | 17篇 |
1984年 | 5篇 |
1983年 | 8篇 |
1982年 | 10篇 |
1981年 | 7篇 |
1980年 | 12篇 |
1979年 | 7篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1973年 | 3篇 |
排序方式: 共有4832条查询结果,搜索用时 15 毫秒
91.
构造了任意两态叠加多模泛函叠加态光场|ψ(2)f>q,利用多模辐射场广义非线性等幂次高次差压缩的一般理论,研究了态|ψ(2)f>q的广义磁场分量的非线性等幂次N次方差压缩特性.得到了一般理论结果,讨论了两种特殊两态叠加多模泛函叠加态光场的差压缩特性.结果表明:1)当qN为偶数时,第一类两态叠加多模泛函叠加态光场和虚相干两态叠加多模泛函叠加态光场都不出现广义磁场分量的非线性差压缩效应,也不处于N-j最小测不准态;2)当qN为奇数时,在一定条件下,任意两态叠加多模泛函叠加态光场中,广义磁场分量呈现出周期性变化的广义非线性N次方差压缩效应. 相似文献
92.
Flexible control of building blocks of photonic crystals enables achieving desirable band structures. Exploration of photonic band extrema has brought many fantastic features to design artificial optical materials, such as Brillouin‐zone‐corner extrema for valley photonic materials and zone‐center extremum for zero‐index metamaterials. However, two such kinds of extrema are always found independently in different photonic crystals. In this work, a kind of valley photonic crystals possessing both zone‐center and zone‐corner band extrema almost at the same frequency is proposed. Inspired by antennas theory, a three‐antenna array (TAA) source is devoted to individually manipulate each extremum. The correlation coefficient is given to determine the coupling efficiency between the TAA source and extrema eigenmodes. By using a source with a high correlation coefficient, these extrema bulk states are selectively excited consistent with their eigenfields. Furthermore, three control cases are shown that multiple extrema points are simultaneously excited, in order to confirm the validity of the correlation coefficient. Finally, a potential application of a beam‐steering device is proposed through selective excitation of ternary extrema. This work develops binary valley states into ternary mix states, rendering more degrees of freedom for on‐chip optical information transport, particularly for beam steering and mode division multiplexing. 相似文献
93.
We put forward an efficient algorithm for approximating the sums of independent and log-normally distributed random variables. Namely, by combining tools from probability theory and numerical analysis, we are able to compute the cumulative distribution functions of the just-mentioned sums to a high precision and in a relatively short computing time. We illustrate the effectiveness of the new method in the contexts of the individual and collective risk models, aggregate economic capital determination, and economic capital allocation. 相似文献
94.
95.
Abraham Sanenga Galefang Allycan Mapunda Tshepiso Merapelo Ludo Jacob Leatile Marata Bokamoso Basutli Joseph Monamati Chuma 《Entropy (Basel, Switzerland)》2020,22(11)
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. 相似文献
96.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters
admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been
generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction
of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent.
On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the
finite field F of q = 2
l
elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q
2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.
相似文献
97.
Jennifer S.K. Chan Anthony Y.C. Kuk Carrie H.K. Yam 《Journal of multivariate analysis》2005,94(2):300-312
Geyer (J. Roy. Statist. Soc. 56 (1994) 291) proposed Monte Carlo method to approximate the whole likelihood function. His method is limited to choosing a proper reference point. We attempt to improve the method by assigning some prior information to the parameters and using the Gibbs output to evaluate the marginal likelihood and its derivatives through a Monte Carlo approximation. Vague priors are assigned to the parameters as well as the random effects within the Bayesian framework to represent a non-informative setting. Then the maximum likelihood estimates are obtained through the Newton Raphson method. Thus, out method serves as a bridge between Bayesian and classical approaches. The method is illustrated by analyzing the famous salamander mating data by generalized linear mixed models. 相似文献
98.
René Michel 《Extremes》2007,10(3):83-107
The investigation of multivariate generalized Pareto distributions (GPDs) has begun only recently. For further progress with
these distributions simulation methods are an important part. We describe several methods of simulating GPDs, beginning with
an efficient method for the logistic GPD. The algorithm is based on the Shi transformation, which was already used for the
simulation of multivariate extreme value distributions (EVDs) of logistic type. In the sequel another algorithm is presented
simulating a broader class of GPDs. Due to its numerical complexity it is only practicably applicable in low dimensions. A
method is given to generate unconditional GPD random vectors from conditionally GPD distributed random vectors. A short application
of the simulation methods in the analysis of a real hydrological data set concludes the article. The simulation algorithms
are available on the author’s home page .
相似文献
99.
This paper considers the option pricing problem for contingent claims of the European type in a (B,S)-market in which the stock price and the asset in the riskless bank account both have hereditary structures. The Black-Scholes
equation for the classical option pricing problem is generalized to an infinite-dimensional equation to include the effects
of time delay in the evolution of the financial market as well as a very general payoff function. A computational algorithm
for the solution is also obtained via a double sequence of polynomials of a certain bounded linear functional on a Banach
space and the time variable. 相似文献
100.
Given a complex matrix , we consider the decomposition , where is upper triangular and and have orthonormal columns. Special instances of this decomposition include the singular value decomposition (SVD) and the Schur decomposition where is an upper triangular matrix with the eigenvalues of on the diagonal. We show that any diagonal for can be achieved that satisfies Weyl's multiplicative majorization conditions: where is the rank of , is the -th largest singular value of , and is the -th largest (in magnitude) diagonal element of . Given a vector which satisfies Weyl's conditions, we call the decomposition , where is upper triangular with prescribed diagonal , the generalized triangular decomposition (GTD). A direct (nonrecursive) algorithm is developed for computing the GTD. This algorithm starts with the SVD and applies a series of permutations and Givens rotations to obtain the GTD. The numerical stability of the GTD update step is established. The GTD can be used to optimize the power utilization of a communication channel, while taking into account quality of service requirements for subchannels. Another application of the GTD is to inverse eigenvalue problems where the goal is to construct matrices with prescribed eigenvalues and singular values.