首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1570篇
  免费   190篇
  国内免费   73篇
化学   83篇
力学   271篇
综合类   17篇
数学   1143篇
物理学   319篇
  2024年   2篇
  2023年   23篇
  2022年   28篇
  2021年   42篇
  2020年   42篇
  2019年   50篇
  2018年   36篇
  2017年   51篇
  2016年   50篇
  2015年   45篇
  2014年   92篇
  2013年   120篇
  2012年   58篇
  2011年   114篇
  2010年   113篇
  2009年   100篇
  2008年   108篇
  2007年   93篇
  2006年   97篇
  2005年   75篇
  2004年   54篇
  2003年   73篇
  2002年   60篇
  2001年   46篇
  2000年   40篇
  1999年   35篇
  1998年   48篇
  1997年   32篇
  1996年   23篇
  1995年   13篇
  1994年   12篇
  1993年   7篇
  1992年   8篇
  1991年   9篇
  1990年   5篇
  1989年   2篇
  1988年   6篇
  1987年   1篇
  1986年   1篇
  1985年   7篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
排序方式: 共有1833条查询结果,搜索用时 15 毫秒
151.
Numerical solutions using the SIMPLE algorithms for laminar flow over a backward-facing step are presented. Five differencing schemes were used: hybrid; quadratic upwind (QUICK); second-order upwind (SOUD); central-differencing and a novel scheme named second-order upwind biased (SOUBD). The SOUBD scheme is shown to be part of a family of schemes which include the central-differencing, SOUD and QUICK schemes for uniform grids. The results of the backward-facing step problem are presented and are compared with other numerical solutions and experimental data to evaluate the accuracy of the differencing schemes. The accuracy of the differencing schemes was ascertained by using uniform grids of various grid densities. The QUICK, SOUBD and SOUD schemes gave very similar accurate results. The hybrid scheme suffered from excessive diffusion except for the finest grids and the central-differencing scheme only converged for the finest grids.  相似文献   
152.
Dupuis  Paul  Ramanan  Kavita 《Queueing Systems》1998,28(1-3):109-124
Generalized processor sharing has been proposed as a policy for distributing processing in a fair manner between different data classes in high-speed networks. In this paper we show how recent results on the Skorokhod Problem can be used to construct and analyze the mapping that takes the input processes into the buffer content. More precisely, we show how to represent the map in terms of a Skorokhod Problem, and from this infer that the mapping is well defined (existence and uniqueness) and well behaved (Lipschitz continuity). As an elementary application we present some large deviation estimates for a many data source model. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
153.
We consider the smooth compactification constructed in [12] for a space of varieties like twisted cubics. We show this compactification embeds naturally in a product of flag varieties.Partially supported by CNPq, Pronex (ALGA)  相似文献   
154.
In this paper, we investigate the performance of two implementable test scheduling schemes for a multi-access communication channel whose components are subject to failure or malfunction. We relate the reliability of the system design, as reflected by system failure rate parameters, and the frequency at which the system (or nodal subsystem) is tested for failure detection, to the underlying key message delay and throughput performance. We derive queue-size distribution results for a discreteGeom (X)/D/1 system, representing the operation of the multi-access channel, or of a network node operating as a communications or queueing processor, which is maintained by a periodic or near periodic test scheduling scheme. Explicit formulas are presented for the system behavior as exhibited by the generating functions of the system queue-size distributions. The mean message delay is then calculated. The mean delay (or mean system size/workload performance index) can then be optimized by selecting the proper scheme parameters, under specified system (and component) failure conditions, noting that performing a test at too high a rate leads to inefficient system bandwidth utilization, while if tests are not carried out often enough, excessive message (or task) retransmissions and delays ensue.  相似文献   
155.
The paper presents various formulations of characteristics-based schemes in the framework of the artificial-compressibility method for variable-density incompressible flows. In contrast to constant-density incompressible flows, where the characteristics-based variables reconstruction leads to a single formulation, in the case of variable density flows three different schemes can be obtained henceforth labeled as: transport, conservative and hybrid schemes. The conservative scheme results in pseudo-compressibility terms in the (multi-species) density reconstruction. It is shown that in the limit of constant density, the transport scheme becomes the (original) characteristics-based scheme for incompressible flows, but the conservative and hybrid schemes lead to a new characteristics-based variant for constant density flows. The characteristics-based schemes are combined with second and third-order interpolation for increasing the computational accuracy locally at the cell faces of the control volume. Numerical experiments for constant density flows reveal that all the characteristics-based schemes result in the same flow solution, but they exhibit different convergence behavior. The multigrid implementation and numerical studies for variable density flows are presented in Part II of this study.  相似文献   
156.
The characterization of ideal access structures and the search for bounds on the optimal information rate are two important problems in secret sharing. These problems are studied in this paper for access structures with intersection number equal to one, that is, structures such that there is at most one participant in the intersection of any two different minimal qualified subsets. The main result in this work is the complete characterization of the ideal access structures with intersection number equal to one. In addition, bounds on the optimal information rate are provided for the non-ideal case.  相似文献   
157.
158.
Cheating in Visual Cryptography   总被引:3,自引:0,他引:3  
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset cannot recover the secret. In 1995, Naor and Shamir proposed a variant of secret sharing, called visual cryptography, where the shares given to participants are xeroxed onto transparencies. If X is an authorized subset of P, then the participants in X can visually recover the secret image by stacking their transparencies together without performing any computation. In this paper, we address the issue of cheating by dishonest participants, called cheaters, in visual cryptography. The experimental results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants. We also propose two simple cheating prevention visual cryptographic schemes.  相似文献   
159.
The coexistence of radar-sensing and communication systems research has received a surge of interest in recent times to tackle the issue of spectrum inadequacy. Designing an optimized radar waveform for a coexistence scenario has been a challenging task for accomplishing the convergence of radar-sensing and communication functionalities, without degrading the performance at either end. This paper proposes a novel global optimization-based Spatial Branch and Bound (SBnB) approach to optimize the phase coefficients of a Non-Linear Frequency Modulated (NLFM) waveform in a CRCS framework. In addition, the Modified-Power Ratio Constraint-Cramér–Rao Lower Bound (M-PRC-CRLB), a local optimization-based approach is proposed to optimize the phase coefficients of an NLFM waveform. The spectral energy distribution and auto-correlation characteristics of an NLFM waveform are comprehensively investigated for various values of polynomial order (N) and at different threshold Signal-to-Noise-Ratio (SNR) values. To compare the proposed waveform design approaches (M-PRC-CRLB, SBnB) with the existing waveform design approaches namely, Minimum Estimation Error Variance (MEEV) and PRC- CRLB, a Peak-to-Side-Lobe-Ratio (PSLR), and Integrated-Side-Lobe-Ratio (ISLR) are evaluated at various polynomial orders and threshold SNR values. Furthermore, the performance of a CRCS is assessed using the radar estimation rate and communication data rate. The simulation results reveal that the proposed optimized radar waveform design approaches provide improved performance compared to the existing radar waveform design approaches in terms of radar estimation rate. Further, the proposed global optimization-based SBnB approach achieves a comparable performance of the communication data rate. In addition, the proposed approaches accomplish enhanced spectral utilization, controlled side-lobe energy levels, reduced range-domain ambiguities, and a higher information rate in a CRCS.  相似文献   
160.
In this paper, intelligent reflecting surface (IRS) technology is employed to enhance physical layer security (PLS) for spectrum sharing communication systems with orthogonal frequency division multiplexing (OFDM). Aiming to improve the secondary users’ secrecy rates, a design problem for jointly optimizing the transmission beamforming of secondary base station (SBS), the IRS’s reflecting coefficient and the channel allocation is formulated under the constraints of the requirements of minimum data rates of primary users and the interference between users. As the scenario is highly complex, it is quite challenging to address the non-convexity of the optimization problem. Thus, a deep reinforcement learning (DRL) based approach is taken into consideration. Specifically, we use dueling double deep Q networks (D3QN) and soft Actor–Critic (SAC) to solve the discrete and continuous action space optimization problems, respectively, taking full advantage of the maximum entropy RL algorithm to explore all possible optimal paths. Finally, simulation results show that our proposed approach has a great improvement in security transmission rate compared with the scheme without IRS and OFDM, and our proposed D3QN-SAC approach is more effective than other approaches in terms of maximum security transmission rate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号