全文获取类型
收费全文 | 1322篇 |
免费 | 109篇 |
国内免费 | 45篇 |
专业分类
化学 | 85篇 |
力学 | 37篇 |
综合类 | 18篇 |
数学 | 1052篇 |
物理学 | 284篇 |
出版年
2024年 | 2篇 |
2023年 | 15篇 |
2022年 | 52篇 |
2021年 | 72篇 |
2020年 | 42篇 |
2019年 | 29篇 |
2018年 | 26篇 |
2017年 | 25篇 |
2016年 | 40篇 |
2015年 | 36篇 |
2014年 | 37篇 |
2013年 | 70篇 |
2012年 | 54篇 |
2011年 | 74篇 |
2010年 | 54篇 |
2009年 | 100篇 |
2008年 | 94篇 |
2007年 | 91篇 |
2006年 | 72篇 |
2005年 | 51篇 |
2004年 | 45篇 |
2003年 | 45篇 |
2002年 | 41篇 |
2001年 | 38篇 |
2000年 | 56篇 |
1999年 | 32篇 |
1998年 | 26篇 |
1997年 | 32篇 |
1996年 | 21篇 |
1995年 | 11篇 |
1994年 | 18篇 |
1993年 | 13篇 |
1992年 | 9篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 9篇 |
1985年 | 12篇 |
1984年 | 7篇 |
1982年 | 2篇 |
1979年 | 1篇 |
排序方式: 共有1476条查询结果,搜索用时 12 毫秒
51.
We continue the study of the linear complexity of binary sequences, independently introduced by Sidel’nikov and Lempel, Cohn,
and Eastman. These investigations were originated by Helleseth and Yang and extended by Kyureghyan and Pott. We determine
the exact linear complexity of several families of these sequences using well-known results on cyclotomic numbers. Moreover,
we prove a general lower bound on the linear complexity profile for all of these sequences. 相似文献
52.
Liang Zhao Avishek AdhikariDi Xiao Kouichi Sakurai 《Communications in Nonlinear Science & Numerical Simulation》2012,17(8):3303-3327
An image scrambling encryption scheme for pixel bits was presented by Ye [Ye GD. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 2010;31:347-54], which can be seen as one kind of typical binary image scrambling encryption considering from the bit-plain of size M × (8N). However, recently, some defects existing in the original image encryption scheme, i.e., Ye’s scheme, have been observed by Li and Lo [Li CQ, Lo KT. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 2011;91:949-54]. In the attack proposed by Li and Lo at least 3 + ⌈log2(MN)⌉ plain images of size M × N are used to reveal the permutation matrix W = [w(i, k)] (i ∈ {1, 2, … , M}; k ∈ {1, 2, … , 8N}) which can be applied to recover the exact plain image. In the current paper, at first, one type of special plain image/cipher image is used to analyze the security weakness of the original image scrambling scheme under study. The final encryption vectors TM and TN or the decryption vectors TM′ and TN′ are revealed completely according to our attack. To demonstrate the performance of our attack, a quantified comparison is drawn between our attack and the attack proposed by Li and Lo. Compared with Li and Lo’s attack, our attack is more efficient in the general conditions. In particular, when the sizes of images satisfy the condition M = N or M ? 8N, the number of the used plain images/cipher images is at most 9, which is sharply less than 3 + ⌈log2(MN)⌉ when M and N are of large size. To overcome the weaknesses of the original scheme, in this paper, an improved image scrambling encryption scheme is proposed. In the improved scheme, the idea of the “self-correlation” method is used to resist the chosen-plaintext attack/known-plaintext attack. The corresponding simulations and analyses illustrate that the improved encryption method has good cryptographic properties, and can overcome the weakness of the original image encryption scheme. Finally, farther improvement is briefly presented for the future work. 相似文献
53.
Kernel functions play an important role in defining new search directions for primal-dual interior-point algorithm for solving linear optimization problems. In this paper we present a new kernel function which yields an algorithm with the best known complexity bound for both large- and small-update methods. 相似文献
54.
Ajla Aksamija 《Complexity》2009,15(2):45-53
Building design process is a significantly complex procedure taking into account many different factors and variables, such as the site context, environment, material availability, cost, and function. One of the most complex forms in the built environment is tall building because of the scale, design considerations, and multidisciplinary nature. This article discusses development of ontological model for understanding, presenting, relating, and managing knowledge influencing architectural design of tall buildings. Ontology is a knowledge‐based model that represents certain domain by abstraction of concepts, and a network of relationships and properties describing these concepts. By creating an architectural ontology, the factors, relations, and characteristics in the design process can be clearly defined and presented. The model incorporates physical systems such as structure, building elements, and geometry, as well as environmental effects, social aspects and other complex attributes. © 2009 Wiley Periodicals, Inc. Complexity, 2009 相似文献
55.
56.
57.
《Optimization》2012,61(3):405-412
In the paper exponential bounds for the instationary and stationary waiting time d.f.'s in GI/GI/1/∞, derived by several authors partly using martingale theory arguments, are improved with the help of monotonicity properties. Further it is shown that Ne?eptjrenko's bound for the rate of convergence of the mean waiting time in single server queues Is also valid for many server queues with ρ < 1. 相似文献
58.
We wish to solve the heat equation ut=Δu-qu in Id×(0,T), where I is the unit interval and T is a maximum time value, subject to homogeneous Dirichlet boundary conditions and to initial conditions u(·,0)=f over Id. We show that this problem is intractable if f belongs to standard Sobolev spaces, even if we have complete information about q. However, if f and q belong to a reproducing kernel Hilbert space with finite-order weights, we can show that the problem is tractable, and can actually be strongly tractable. 相似文献
59.
Some properties of the bilevel programming problem 总被引:8,自引:0,他引:8
J. F. Bard 《Journal of Optimization Theory and Applications》1991,68(2):371-378
The purpose of this paper is to elaborate on the difficulties accompanying the development of efficient algorithms for solving the bilevel programming problem (BLPP). We begin with a pair of examples showing that, even under the best of circumstances, solutions may not exist. This is followed by a proof that the BLPP is NP-hard.This work was partially supported by a grant from the Advanced Research Program of the Texas Higher Education Coordinating Board. 相似文献
60.
W. W. Hager P. M. Pardalos I. M. Roussos H. D. Sahinoglou 《Journal of Optimization Theory and Applications》1991,68(3):499-511
The observation that at leasts constraints are active when the Hessian of the Lagrangian hass negative eigenvalues at a local minimizer is used to obtain two results: (i) a class of nearly concave quadratic minimization problem can be solved in polynomial time; (ii) a class of indefinite quadratic test problems can be constructed with a specified number of positive and negative eigenvalues and with a known global minimizer.The authors thank the reviewers for their constructive comments. The first author was supported by the National Science Foundation Grant DMS-85-20926 and by the Air Force Office of Scientific Research Grant AFOSR-ISSA-86-0091. 相似文献