首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1579篇
  免费   187篇
  国内免费   75篇
化学   86篇
力学   271篇
综合类   17篇
数学   1143篇
物理学   324篇
  2024年   2篇
  2023年   25篇
  2022年   32篇
  2021年   43篇
  2020年   42篇
  2019年   50篇
  2018年   37篇
  2017年   51篇
  2016年   50篇
  2015年   45篇
  2014年   92篇
  2013年   120篇
  2012年   58篇
  2011年   114篇
  2010年   113篇
  2009年   100篇
  2008年   108篇
  2007年   93篇
  2006年   97篇
  2005年   75篇
  2004年   54篇
  2003年   73篇
  2002年   60篇
  2001年   46篇
  2000年   40篇
  1999年   35篇
  1998年   48篇
  1997年   32篇
  1996年   23篇
  1995年   13篇
  1994年   12篇
  1993年   7篇
  1992年   8篇
  1991年   9篇
  1990年   5篇
  1989年   2篇
  1988年   6篇
  1987年   1篇
  1986年   1篇
  1985年   7篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
排序方式: 共有1841条查询结果,搜索用时 15 毫秒
31.
An improved class of Boussinesq systems of an arbitrary order using a wave surface elevation and velocity potential formulation is derived. Dissipative effects and wave generation due to a time‐dependent varying seabed are included. Thus, high‐order source functions are considered. For the reduction of the system order and maintenance of some dispersive characteristics of the higher‐order models, an extra O(μ2n+2) term (n ∈ ?) is included in the velocity potential expansion. We introduce a nonlocal continuous/discontinuous Galerkin FEM with inner penalty terms to calculate the numerical solutions of the improved fourth‐order models. The discretization of the spatial variables is made using continuous P2 Lagrange elements. A predictor‐corrector scheme with an initialization given by an explicit Runge–Kutta method is also used for the time‐variable integration. Moreover, a CFL‐type condition is deduced for the linear problem with a constant bathymetry. To demonstrate the applicability of the model, we considered several test cases. Improved stability is achieved. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
32.
33.
34.
35.
耿晓月  刘小华 《计算数学》2015,37(2):199-212
本文研究一类二维非线性的广义sine-Gordon(简称SG)方程的有限差分格式.首先构造三层时间的紧致交替方向隐式差分格式,并用能量分析法证明格式具有二阶时间精度和四阶空间精度.然后应用改进的Richardson外推算法将时间精度提高到四阶.最后,数值算例证实改进后的算法在空间和时间上均达到四阶精度.  相似文献   
36.
Nowadays, the purpose of human genomics is widely emerging in health-related problems and also to achieve time and cost-efficient healthcare. Due to advancement in genomics and its research, development in privacy concerns is needed regarding querying, accessing and, storage and computation of the genomic data. While the genomic data is widely accessible, the privacy issues may emerge due to the untrusted third party (adversaries/researchers), they may reveal the information or strategy plans regarding the genome data of an individual when it is requested for research purposes. To mitigate this problem many privacy-preserving techniques are used along with cryptographic methods are briefly discussed. Furthermore, efficiency and accuracy in a secure and private genomic data computation are needed to be researched in future.  相似文献   
37.
A spectrum sharing system with primary and secondary nodes, each equipped with an arbitrary number of antennas, is investigated. Particularly, the outage performance of an underlay cognitive system is analytically studied, in the case when the end-to-end (e2e) communication is established via an intermediate relay node. To better enhance the e2e communication, successive interference cancellation (SIC) is adopted, which compensates for both the transmission power constraint and the presence of interference from primary nodes. Both the relay and secondary receiver perform unordered SIC to successively decode the multiple streams, whereas the decode-and-forward relaying protocol is used for the e2e communication. New closed-form expressions for the e2e outage performance of each transmitted stream are derived in terms of finite sum series of the Tricomi confluent hypergeometric function. In addition, simplified yet tight approximations for the asymptotic outage performance are obtained. Useful engineering insights are manifested, such as the diversity order of the considered system and the impact of interference from the primary nodes in conjunction with the constrained transmission power of the secondary nodes.  相似文献   
38.
对"联邦滤波器信息分配系数的优选算法"一文的商榷   总被引:6,自引:0,他引:6  
介绍了联邦滤波算法和信息分配原理,指出《中国惯性技术学报》第11卷第6期“联邦滤波器信息分配系数的优选算法”一中存在一些问题,说明使用该优选算法进行信息分配,可能使主滤波器方差阵失去正定性;将联邦滤波用于GPS姿态测量,实验表明动态选择信息分配因子,相对于固定信息分配因子的算法并没有明显优势。  相似文献   
39.
Vector subdivision schemes and multiple wavelets   总被引:18,自引:0,他引:18  
We consider solutions of a system of refinement equations written in the form

where the vector of functions is in and is a finitely supported sequence of matrices called the refinement mask. Associated with the mask is a linear operator defined on by . This paper is concerned with the convergence of the subdivision scheme associated with , i.e., the convergence of the sequence in the -norm.

Our main result characterizes the convergence of a subdivision scheme associated with the mask in terms of the joint spectral radius of two finite matrices derived from the mask. Along the way, properties of the joint spectral radius and its relation to the subdivision scheme are discussed. In particular, the -convergence of the subdivision scheme is characterized in terms of the spectral radius of the transition operator restricted to a certain invariant subspace. We analyze convergence of the subdivision scheme explicitly for several interesting classes of vector refinement equations.

Finally, the theory of vector subdivision schemes is used to characterize orthonormality of multiple refinable functions. This leads us to construct a class of continuous orthogonal double wavelets with symmetry.

  相似文献   

40.
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefit. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号