首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1322篇
  免费   109篇
  国内免费   45篇
化学   85篇
力学   37篇
综合类   18篇
数学   1052篇
物理学   284篇
  2024年   2篇
  2023年   15篇
  2022年   52篇
  2021年   72篇
  2020年   42篇
  2019年   29篇
  2018年   26篇
  2017年   25篇
  2016年   40篇
  2015年   36篇
  2014年   37篇
  2013年   70篇
  2012年   54篇
  2011年   74篇
  2010年   54篇
  2009年   100篇
  2008年   94篇
  2007年   91篇
  2006年   72篇
  2005年   51篇
  2004年   45篇
  2003年   45篇
  2002年   41篇
  2001年   38篇
  2000年   56篇
  1999年   32篇
  1998年   26篇
  1997年   32篇
  1996年   21篇
  1995年   11篇
  1994年   18篇
  1993年   13篇
  1992年   9篇
  1991年   7篇
  1990年   6篇
  1988年   5篇
  1987年   4篇
  1986年   9篇
  1985年   12篇
  1984年   7篇
  1982年   2篇
  1979年   1篇
排序方式: 共有1476条查询结果,搜索用时 12 毫秒
51.
We continue the study of the linear complexity of binary sequences, independently introduced by Sidel’nikov and Lempel, Cohn, and Eastman. These investigations were originated by Helleseth and Yang and extended by Kyureghyan and Pott. We determine the exact linear complexity of several families of these sequences using well-known results on cyclotomic numbers. Moreover, we prove a general lower bound on the linear complexity profile for all of these sequences.  相似文献   
52.
An image scrambling encryption scheme for pixel bits was presented by Ye [Ye GD. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 2010;31:347-54], which can be seen as one kind of typical binary image scrambling encryption considering from the bit-plain of size M × (8N). However, recently, some defects existing in the original image encryption scheme, i.e., Ye’s scheme, have been observed by Li and Lo [Li CQ, Lo KT. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 2011;91:949-54]. In the attack proposed by Li and Lo at least 3 + ⌈log2(MN)⌉ plain images of size M × N are used to reveal the permutation matrix W = [w(ik)] (i ∈ {1, 2, … , M}; k ∈ {1, 2, … , 8N}) which can be applied to recover the exact plain image. In the current paper, at first, one type of special plain image/cipher image is used to analyze the security weakness of the original image scrambling scheme under study. The final encryption vectors TM and TN or the decryption vectors TM′ and TN′ are revealed completely according to our attack. To demonstrate the performance of our attack, a quantified comparison is drawn between our attack and the attack proposed by Li and Lo. Compared with Li and Lo’s attack, our attack is more efficient in the general conditions. In particular, when the sizes of images satisfy the condition M = N or M ? 8N, the number of the used plain images/cipher images is at most 9, which is sharply less than 3 + ⌈log2(MN)⌉ when M and N are of large size. To overcome the weaknesses of the original scheme, in this paper, an improved image scrambling encryption scheme is proposed. In the improved scheme, the idea of the “self-correlation” method is used to resist the chosen-plaintext attack/known-plaintext attack. The corresponding simulations and analyses illustrate that the improved encryption method has good cryptographic properties, and can overcome the weakness of the original image encryption scheme. Finally, farther improvement is briefly presented for the future work.  相似文献   
53.
Kernel functions play an important role in defining new search directions for primal-dual interior-point algorithm for solving linear optimization problems. In this paper we present a new kernel function which yields an algorithm with the best known complexity bound for both large- and small-update methods.  相似文献   
54.
Building design process is a significantly complex procedure taking into account many different factors and variables, such as the site context, environment, material availability, cost, and function. One of the most complex forms in the built environment is tall building because of the scale, design considerations, and multidisciplinary nature. This article discusses development of ontological model for understanding, presenting, relating, and managing knowledge influencing architectural design of tall buildings. Ontology is a knowledge‐based model that represents certain domain by abstraction of concepts, and a network of relationships and properties describing these concepts. By creating an architectural ontology, the factors, relations, and characteristics in the design process can be clearly defined and presented. The model incorporates physical systems such as structure, building elements, and geometry, as well as environmental effects, social aspects and other complex attributes. © 2009 Wiley Periodicals, Inc. Complexity, 2009  相似文献   
55.
56.
57.
《Optimization》2012,61(3):405-412
In the paper exponential bounds for the instationary and stationary waiting time d.f.'s in GI/GI/1/∞, derived by several authors partly using martingale theory arguments, are improved with the help of monotonicity properties. Further it is shown that Ne?eptjrenko's bound for the rate of convergence of the mean waiting time in single server queues Is also valid for many server queues with ρ < 1.  相似文献   
58.
We wish to solve the heat equation utu-qu in Id×(0,T), where I is the unit interval and T is a maximum time value, subject to homogeneous Dirichlet boundary conditions and to initial conditions u(·,0)=f over Id. We show that this problem is intractable if f belongs to standard Sobolev spaces, even if we have complete information about q. However, if f and q belong to a reproducing kernel Hilbert space with finite-order weights, we can show that the problem is tractable, and can actually be strongly tractable.  相似文献   
59.
Some properties of the bilevel programming problem   总被引:8,自引:0,他引:8  
The purpose of this paper is to elaborate on the difficulties accompanying the development of efficient algorithms for solving the bilevel programming problem (BLPP). We begin with a pair of examples showing that, even under the best of circumstances, solutions may not exist. This is followed by a proof that the BLPP is NP-hard.This work was partially supported by a grant from the Advanced Research Program of the Texas Higher Education Coordinating Board.  相似文献   
60.
The observation that at leasts constraints are active when the Hessian of the Lagrangian hass negative eigenvalues at a local minimizer is used to obtain two results: (i) a class of nearly concave quadratic minimization problem can be solved in polynomial time; (ii) a class of indefinite quadratic test problems can be constructed with a specified number of positive and negative eigenvalues and with a known global minimizer.The authors thank the reviewers for their constructive comments. The first author was supported by the National Science Foundation Grant DMS-85-20926 and by the Air Force Office of Scientific Research Grant AFOSR-ISSA-86-0091.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号