全文获取类型
收费全文 | 1570篇 |
免费 | 190篇 |
国内免费 | 73篇 |
专业分类
化学 | 83篇 |
力学 | 271篇 |
综合类 | 17篇 |
数学 | 1143篇 |
物理学 | 319篇 |
出版年
2024年 | 2篇 |
2023年 | 23篇 |
2022年 | 28篇 |
2021年 | 42篇 |
2020年 | 42篇 |
2019年 | 50篇 |
2018年 | 36篇 |
2017年 | 51篇 |
2016年 | 50篇 |
2015年 | 45篇 |
2014年 | 92篇 |
2013年 | 120篇 |
2012年 | 58篇 |
2011年 | 114篇 |
2010年 | 113篇 |
2009年 | 100篇 |
2008年 | 108篇 |
2007年 | 93篇 |
2006年 | 97篇 |
2005年 | 75篇 |
2004年 | 54篇 |
2003年 | 73篇 |
2002年 | 60篇 |
2001年 | 46篇 |
2000年 | 40篇 |
1999年 | 35篇 |
1998年 | 48篇 |
1997年 | 32篇 |
1996年 | 23篇 |
1995年 | 13篇 |
1994年 | 12篇 |
1993年 | 7篇 |
1992年 | 8篇 |
1991年 | 9篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 6篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1833条查询结果,搜索用时 15 毫秒
151.
I. E. Barton 《国际流体数值方法杂志》1995,21(8):653-665
Numerical solutions using the SIMPLE algorithms for laminar flow over a backward-facing step are presented. Five differencing schemes were used: hybrid; quadratic upwind (QUICK); second-order upwind (SOUD); central-differencing and a novel scheme named second-order upwind biased (SOUBD). The SOUBD scheme is shown to be part of a family of schemes which include the central-differencing, SOUD and QUICK schemes for uniform grids. The results of the backward-facing step problem are presented and are compared with other numerical solutions and experimental data to evaluate the accuracy of the differencing schemes. The accuracy of the differencing schemes was ascertained by using uniform grids of various grid densities. The QUICK, SOUBD and SOUD schemes gave very similar accurate results. The hybrid scheme suffered from excessive diffusion except for the finest grids and the central-differencing scheme only converged for the finest grids. 相似文献
152.
Generalized processor sharing has been proposed as a policy for distributing processing in a fair manner between different
data classes in high-speed networks. In this paper we show how recent results on the Skorokhod Problem can be used to construct
and analyze the mapping that takes the input processes into the buffer content. More precisely, we show how to represent the
map in terms of a Skorokhod Problem, and from this infer that the mapping is well defined (existence and uniqueness) and well
behaved (Lipschitz continuity). As an elementary application we present some large deviation estimates for a many data source
model.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
153.
Israel Vainsencher 《Bulletin of the Brazilian Mathematical Society》2001,32(1):37-44
We consider the smooth compactification constructed in [12] for a space of varieties like twisted cubics. We show this compactification embeds naturally in a product of flag varieties.Partially supported by CNPq, Pronex (ALGA) 相似文献
154.
In this paper, we investigate the performance of two implementable test scheduling schemes for a multi-access communication channel whose components are subject to failure or malfunction. We relate the reliability of the system design, as reflected by system failure rate parameters, and the frequency at which the system (or nodal subsystem) is tested for failure detection, to the underlying key message delay and throughput performance. We derive queue-size distribution results for a discreteGeom
(X)/D/1 system, representing the operation of the multi-access channel, or of a network node operating as a communications or queueing processor, which is maintained by a periodic or near periodic test scheduling scheme. Explicit formulas are presented for the system behavior as exhibited by the generating functions of the system queue-size distributions. The mean message delay is then calculated. The mean delay (or mean system size/workload performance index) can then be optimized by selecting the proper scheme parameters, under specified system (and component) failure conditions, noting that performing a test at too high a rate leads to inefficient system bandwidth utilization, while if tests are not carried out often enough, excessive message (or task) retransmissions and delays ensue. 相似文献
155.
The paper presents various formulations of characteristics-based schemes in the framework of the artificial-compressibility method for variable-density incompressible flows. In contrast to constant-density incompressible flows, where the characteristics-based variables reconstruction leads to a single formulation, in the case of variable density flows three different schemes can be obtained henceforth labeled as: transport, conservative and hybrid schemes. The conservative scheme results in pseudo-compressibility terms in the (multi-species) density reconstruction. It is shown that in the limit of constant density, the transport scheme becomes the (original) characteristics-based scheme for incompressible flows, but the conservative and hybrid schemes lead to a new characteristics-based variant for constant density flows. The characteristics-based schemes are combined with second and third-order interpolation for increasing the computational accuracy locally at the cell faces of the control volume. Numerical experiments for constant density flows reveal that all the characteristics-based schemes result in the same flow solution, but they exhibit different convergence behavior. The multigrid implementation and numerical studies for variable density flows are presented in Part II of this study. 相似文献
156.
Jaume Martí-Farré 《Discrete Applied Mathematics》2006,154(3):552-563
The characterization of ideal access structures and the search for bounds on the optimal information rate are two important problems in secret sharing. These problems are studied in this paper for access structures with intersection number equal to one, that is, structures such that there is at most one participant in the intersection of any two different minimal qualified subsets. The main result in this work is the complete characterization of the ideal access structures with intersection number equal to one. In addition, bounds on the optimal information rate are provided for the non-ideal case. 相似文献
157.
158.
Cheating in Visual Cryptography 总被引:3,自引:0,他引:3
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset cannot recover the secret. In 1995, Naor and Shamir proposed a variant
of secret sharing, called visual cryptography, where the shares given to participants are xeroxed onto transparencies. If
X is an authorized subset of P, then the participants in X can visually recover the secret image by stacking their transparencies together without performing any computation. In this
paper, we address the issue of cheating by dishonest participants, called cheaters, in visual cryptography. The experimental
results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants.
We also propose two simple cheating prevention visual cryptographic schemes. 相似文献
159.
The coexistence of radar-sensing and communication systems research has received a surge of interest in recent times to tackle the issue of spectrum inadequacy. Designing an optimized radar waveform for a coexistence scenario has been a challenging task for accomplishing the convergence of radar-sensing and communication functionalities, without degrading the performance at either end. This paper proposes a novel global optimization-based Spatial Branch and Bound (SBnB) approach to optimize the phase coefficients of a Non-Linear Frequency Modulated (NLFM) waveform in a CRCS framework. In addition, the Modified-Power Ratio Constraint-Cramér–Rao Lower Bound (M-PRC-CRLB), a local optimization-based approach is proposed to optimize the phase coefficients of an NLFM waveform. The spectral energy distribution and auto-correlation characteristics of an NLFM waveform are comprehensively investigated for various values of polynomial order (N) and at different threshold Signal-to-Noise-Ratio (SNR) values. To compare the proposed waveform design approaches (M-PRC-CRLB, SBnB) with the existing waveform design approaches namely, Minimum Estimation Error Variance (MEEV) and PRC- CRLB, a Peak-to-Side-Lobe-Ratio (PSLR), and Integrated-Side-Lobe-Ratio (ISLR) are evaluated at various polynomial orders and threshold SNR values. Furthermore, the performance of a CRCS is assessed using the radar estimation rate and communication data rate. The simulation results reveal that the proposed optimized radar waveform design approaches provide improved performance compared to the existing radar waveform design approaches in terms of radar estimation rate. Further, the proposed global optimization-based SBnB approach achieves a comparable performance of the communication data rate. In addition, the proposed approaches accomplish enhanced spectral utilization, controlled side-lobe energy levels, reduced range-domain ambiguities, and a higher information rate in a CRCS. 相似文献
160.
In this paper, intelligent reflecting surface (IRS) technology is employed to enhance physical layer security (PLS) for spectrum sharing communication systems with orthogonal frequency division multiplexing (OFDM). Aiming to improve the secondary users’ secrecy rates, a design problem for jointly optimizing the transmission beamforming of secondary base station (SBS), the IRS’s reflecting coefficient and the channel allocation is formulated under the constraints of the requirements of minimum data rates of primary users and the interference between users. As the scenario is highly complex, it is quite challenging to address the non-convexity of the optimization problem. Thus, a deep reinforcement learning (DRL) based approach is taken into consideration. Specifically, we use dueling double deep Q networks (D3QN) and soft Actor–Critic (SAC) to solve the discrete and continuous action space optimization problems, respectively, taking full advantage of the maximum entropy RL algorithm to explore all possible optimal paths. Finally, simulation results show that our proposed approach has a great improvement in security transmission rate compared with the scheme without IRS and OFDM, and our proposed D3QN-SAC approach is more effective than other approaches in terms of maximum security transmission rate. 相似文献