全文获取类型
收费全文 | 1570篇 |
免费 | 190篇 |
国内免费 | 73篇 |
专业分类
化学 | 83篇 |
力学 | 271篇 |
综合类 | 17篇 |
数学 | 1143篇 |
物理学 | 319篇 |
出版年
2024年 | 2篇 |
2023年 | 23篇 |
2022年 | 28篇 |
2021年 | 42篇 |
2020年 | 42篇 |
2019年 | 50篇 |
2018年 | 36篇 |
2017年 | 51篇 |
2016年 | 50篇 |
2015年 | 45篇 |
2014年 | 92篇 |
2013年 | 120篇 |
2012年 | 58篇 |
2011年 | 114篇 |
2010年 | 113篇 |
2009年 | 100篇 |
2008年 | 108篇 |
2007年 | 93篇 |
2006年 | 97篇 |
2005年 | 75篇 |
2004年 | 54篇 |
2003年 | 73篇 |
2002年 | 60篇 |
2001年 | 46篇 |
2000年 | 40篇 |
1999年 | 35篇 |
1998年 | 48篇 |
1997年 | 32篇 |
1996年 | 23篇 |
1995年 | 13篇 |
1994年 | 12篇 |
1993年 | 7篇 |
1992年 | 8篇 |
1991年 | 9篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 6篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1833条查询结果,搜索用时 19 毫秒
71.
Elena Ciancimino Salvatore Cannella Manfredi Bruccoleri Jose M. Framinan 《European Journal of Operational Research》2012
The aim of this paper is to analyse the operational response of a Synchronised Supply Chain (SSC). To do so, first a new mathematical model of a SSC is presented. An exhaustive Latin Square design of experiments is adopted in order to perform a boundary variation analysis of the main three parameters of the periodic review smoothing (S, R) order-up-to policy: i.e., lead time, demand smoothing forecasting factor, and proportional controller of the replenishment rule. The model is then evaluated under a variety of performance measures based on internal process benefits and customer benefits. The main results of the analysis are: (I) SSC responds to violent changes in demand by resolving bullwhip effect and by creating stability in inventories under different parameter settings and (II) in a SSC, long production–distribution lead times could significantly affect customer service level. Both results have important consequences for the design and operation of supply chains. 相似文献
72.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 相似文献
73.
Quantum state sharing of an arbitrary qudit state by using nonmaximally generalized GHZ state 下载免费PDF全文
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme. 相似文献
74.
A new integrated scheme based on resource-reservation and adaptive network flow routing to alleviate contention in optical burst switching networks is proposed. The objective of the proposed scheme is to reduce the overall burst loss in the network and at the same time to avoid the packet out-of-sequence arrival problem. Simulations are carried out to assess the feasibility of the proposed scheme. Its performance is compared with that of contention resolution schemes based on conventional routing. Through extensive simulations, it is shown that the proposed scheme not only provides significantly better burst loss performance than the basic equal proportion and hop-length based traffic routing algorithms, but also is void of any packet re-orderings. 相似文献
75.
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels 总被引:6,自引:0,他引:6
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a
-VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l. 相似文献
76.
邓小刚 《中国科学A辑(英文版)》2002,45(3):356-370
Based on the method deriving dissipative compact linear schemes (DCS), novel high-order dissipative weighted compact nonlinear schemes (DWCNS) are developed. By Fourier analysis,the dissipative and dispersive features of DWCNS are discussed. In view of the modified wave number, the DWCNS are equivalent to the fifth-order upwind biased explicit schemes in smooth regions and the interpolations at cell-edges dominate the accuracy of DWCNS. Boundary and near boundary schemes are developed and the asymptotic stabilities of DWCNS on both uniform and stretching grids are analyzed. The multi-dimensional implementations for Euler and Navier-Stokes equations are discussed. Several numerical inviscid and viscous results are given which show the good performances of the DWCNS for discontinuities capturing, high accuracy for boundary layer resolutions, good convergent rates (the root-mean-square of residuals approaching machine zero for solutions with strong shocks) and especially the damping effect on the spudous oscillations which were found in the solutions obtained by TVD and ENO schemes. 相似文献
77.
Linear partial differential algebraic equations (PDAEs) of the form Au
t(t, x) + Bu
xx(t, x) + Cu(t, x) = f(t, x) are studied where at least one of the matrices A, B R
n×n
is singular. For these systems we introduce a uniform differential time index and a differential space index. We show that in contrast to problems with regular matrices A and B the initial conditions and/or boundary conditions for problems with singular matrices A and B have to fulfill certain consistency conditions. Furthermore, two numerical methods for solving PDAEs are considered. In two theorems it is shown that there is a strong dependence of the order of convergence on these indexes. We present examples for the calculation of the order of convergence and give results of numerical calculations for several aspects encountered in the numerical solution of PDAEs. 相似文献
78.
A simple technique is given in this paper for the construction and analysis of a class of finite element discretizations for convection-diffusion problems in any spatial dimension by properly averaging the PDE coefficients on element edges. The resulting finite element stiffness matrix is an -matrix under some mild assumption for the underlying (generally unstructured) finite element grids. As a consequence the proposed edge-averaged finite element scheme is particularly interesting for the discretization of convection dominated problems. This scheme admits a simple variational formulation, it is easy to analyze, and it is also suitable for problems with a relatively smooth flux variable. Some simple numerical examples are given to demonstrate its effectiveness for convection dominated problems.
79.
80.
Ha|YunZHOU 《数学学报(英文版)》2004,20(5):829-836
In this article, we will investigate the properties of iterative sequence for non-expansive mappings and present several strong and weak convergence results of successive approximations to fixed points of non-expansive mappings in uniformly convex Banach spaces. The results presented in this article generalize and improve various ones concerned with constructive techniques for the fixed points of non-expansive mappings. 相似文献