首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4324篇
  免费   251篇
  国内免费   257篇
化学   249篇
晶体学   1篇
力学   225篇
综合类   17篇
数学   3612篇
物理学   728篇
  2024年   5篇
  2023年   48篇
  2022年   69篇
  2021年   58篇
  2020年   96篇
  2019年   119篇
  2018年   100篇
  2017年   110篇
  2016年   88篇
  2015年   90篇
  2014年   206篇
  2013年   450篇
  2012年   224篇
  2011年   278篇
  2010年   223篇
  2009年   373篇
  2008年   358篇
  2007年   305篇
  2006年   235篇
  2005年   167篇
  2004年   161篇
  2003年   169篇
  2002年   115篇
  2001年   102篇
  2000年   81篇
  1999年   84篇
  1998年   74篇
  1997年   88篇
  1996年   69篇
  1995年   47篇
  1994年   49篇
  1993年   24篇
  1992年   27篇
  1991年   16篇
  1990年   11篇
  1989年   4篇
  1988年   10篇
  1987年   3篇
  1986年   9篇
  1985年   17篇
  1984年   5篇
  1983年   8篇
  1982年   10篇
  1981年   7篇
  1980年   12篇
  1979年   7篇
  1978年   4篇
  1977年   5篇
  1976年   4篇
  1973年   3篇
排序方式: 共有4832条查询结果,搜索用时 15 毫秒
91.
构造了任意两态叠加多模泛函叠加态光场|ψ(2)f>q,利用多模辐射场广义非线性等幂次高次差压缩的一般理论,研究了态|ψ(2)f>q的广义磁场分量的非线性等幂次N次方差压缩特性.得到了一般理论结果,讨论了两种特殊两态叠加多模泛函叠加态光场的差压缩特性.结果表明:1)当qN为偶数时,第一类两态叠加多模泛函叠加态光场和虚相干两态叠加多模泛函叠加态光场都不出现广义磁场分量的非线性差压缩效应,也不处于N-j最小测不准态;2)当qN为奇数时,在一定条件下,任意两态叠加多模泛函叠加态光场中,广义磁场分量呈现出周期性变化的广义非线性N次方差压缩效应.  相似文献   
92.
Flexible control of building blocks of photonic crystals enables achieving desirable band structures. Exploration of photonic band extrema has brought many fantastic features to design artificial optical materials, such as Brillouin‐zone‐corner extrema for valley photonic materials and zone‐center extremum for zero‐index metamaterials. However, two such kinds of extrema are always found independently in different photonic crystals. In this work, a kind of valley photonic crystals possessing both zone‐center and zone‐corner band extrema almost at the same frequency is proposed. Inspired by antennas theory, a three‐antenna array (TAA) source is devoted to individually manipulate each extremum. The correlation coefficient is given to determine the coupling efficiency between the TAA source and extrema eigenmodes. By using a source with a high correlation coefficient, these extrema bulk states are selectively excited consistent with their eigenfields. Furthermore, three control cases are shown that multiple extrema points are simultaneously excited, in order to confirm the validity of the correlation coefficient. Finally, a potential application of a beam‐steering device is proposed through selective excitation of ternary extrema. This work develops binary valley states into ternary mix states, rendering more degrees of freedom for on‐chip optical information transport, particularly for beam steering and mode division multiplexing.  相似文献   
93.
We put forward an efficient algorithm for approximating the sums of independent and log-normally distributed random variables. Namely, by combining tools from probability theory and numerical analysis, we are able to compute the cumulative distribution functions of the just-mentioned sums to a high precision and in a relatively short computing time. We illustrate the effectiveness of the new method in the contexts of the individual and collective risk models, aggregate economic capital determination, and economic capital allocation.  相似文献   
94.
95.
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided.  相似文献   
96.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent. On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the finite field F of q = 2 l elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q 2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.   相似文献   
97.
Geyer (J. Roy. Statist. Soc. 56 (1994) 291) proposed Monte Carlo method to approximate the whole likelihood function. His method is limited to choosing a proper reference point. We attempt to improve the method by assigning some prior information to the parameters and using the Gibbs output to evaluate the marginal likelihood and its derivatives through a Monte Carlo approximation. Vague priors are assigned to the parameters as well as the random effects within the Bayesian framework to represent a non-informative setting. Then the maximum likelihood estimates are obtained through the Newton Raphson method. Thus, out method serves as a bridge between Bayesian and classical approaches. The method is illustrated by analyzing the famous salamander mating data by generalized linear mixed models.  相似文献   
98.
René Michel 《Extremes》2007,10(3):83-107
The investigation of multivariate generalized Pareto distributions (GPDs) has begun only recently. For further progress with these distributions simulation methods are an important part. We describe several methods of simulating GPDs, beginning with an efficient method for the logistic GPD. The algorithm is based on the Shi transformation, which was already used for the simulation of multivariate extreme value distributions (EVDs) of logistic type. In the sequel another algorithm is presented simulating a broader class of GPDs. Due to its numerical complexity it is only practicably applicable in low dimensions. A method is given to generate unconditional GPD random vectors from conditionally GPD distributed random vectors. A short application of the simulation methods in the analysis of a real hydrological data set concludes the article. The simulation algorithms are available on the author’s home page .   相似文献   
99.
This paper considers the option pricing problem for contingent claims of the European type in a (B,S)-market in which the stock price and the asset in the riskless bank account both have hereditary structures. The Black-Scholes equation for the classical option pricing problem is generalized to an infinite-dimensional equation to include the effects of time delay in the evolution of the financial market as well as a very general payoff function. A computational algorithm for the solution is also obtained via a double sequence of polynomials of a certain bounded linear functional on a Banach space and the time variable.  相似文献   
100.
Given a complex matrix , we consider the decomposition , where is upper triangular and and have orthonormal columns. Special instances of this decomposition include the singular value decomposition (SVD) and the Schur decomposition where is an upper triangular matrix with the eigenvalues of on the diagonal. We show that any diagonal for can be achieved that satisfies Weyl's multiplicative majorization conditions:

where is the rank of , is the -th largest singular value of , and is the -th largest (in magnitude) diagonal element of . Given a vector which satisfies Weyl's conditions, we call the decomposition , where is upper triangular with prescribed diagonal , the generalized triangular decomposition (GTD). A direct (nonrecursive) algorithm is developed for computing the GTD. This algorithm starts with the SVD and applies a series of permutations and Givens rotations to obtain the GTD. The numerical stability of the GTD update step is established. The GTD can be used to optimize the power utilization of a communication channel, while taking into account quality of service requirements for subchannels. Another application of the GTD is to inverse eigenvalue problems where the goal is to construct matrices with prescribed eigenvalues and singular values.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号