首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1570篇
  免费   190篇
  国内免费   73篇
化学   83篇
力学   271篇
综合类   17篇
数学   1143篇
物理学   319篇
  2024年   2篇
  2023年   23篇
  2022年   28篇
  2021年   42篇
  2020年   42篇
  2019年   50篇
  2018年   36篇
  2017年   51篇
  2016年   50篇
  2015年   45篇
  2014年   92篇
  2013年   120篇
  2012年   58篇
  2011年   114篇
  2010年   113篇
  2009年   100篇
  2008年   108篇
  2007年   93篇
  2006年   97篇
  2005年   75篇
  2004年   54篇
  2003年   73篇
  2002年   60篇
  2001年   46篇
  2000年   40篇
  1999年   35篇
  1998年   48篇
  1997年   32篇
  1996年   23篇
  1995年   13篇
  1994年   12篇
  1993年   7篇
  1992年   8篇
  1991年   9篇
  1990年   5篇
  1989年   2篇
  1988年   6篇
  1987年   1篇
  1986年   1篇
  1985年   7篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
排序方式: 共有1833条查询结果,搜索用时 19 毫秒
71.
The aim of this paper is to analyse the operational response of a Synchronised Supply Chain (SSC). To do so, first a new mathematical model of a SSC is presented. An exhaustive Latin Square design of experiments is adopted in order to perform a boundary variation analysis of the main three parameters of the periodic review smoothing (SR) order-up-to policy: i.e., lead time, demand smoothing forecasting factor, and proportional controller of the replenishment rule. The model is then evaluated under a variety of performance measures based on internal process benefits and customer benefits. The main results of the analysis are: (I) SSC responds to violent changes in demand by resolving bullwhip effect and by creating stability in inventories under different parameter settings and (II) in a SSC, long production–distribution lead times could significantly affect customer service level. Both results have important consequences for the design and operation of supply chains.  相似文献   
72.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology.  相似文献   
73.
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme.  相似文献   
74.
A new integrated scheme based on resource-reservation and adaptive network flow routing to alleviate contention in optical burst switching networks is proposed. The objective of the proposed scheme is to reduce the overall burst loss in the network and at the same time to avoid the packet out-of-sequence arrival problem. Simulations are carried out to assess the feasibility of the proposed scheme. Its performance is compared with that of contention resolution schemes based on conventional routing. Through extensive simulations, it is shown that the proposed scheme not only provides significantly better burst loss performance than the basic equal proportion and hop-length based traffic routing algorithms, but also is void of any packet re-orderings.  相似文献   
75.
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a -VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l.  相似文献   
76.
Based on the method deriving dissipative compact linear schemes (DCS), novel high-order dissipative weighted compact nonlinear schemes (DWCNS) are developed. By Fourier analysis,the dissipative and dispersive features of DWCNS are discussed. In view of the modified wave number, the DWCNS are equivalent to the fifth-order upwind biased explicit schemes in smooth regions and the interpolations at cell-edges dominate the accuracy of DWCNS. Boundary and near boundary schemes are developed and the asymptotic stabilities of DWCNS on both uniform and stretching grids are analyzed. The multi-dimensional implementations for Euler and Navier-Stokes equations are discussed. Several numerical inviscid and viscous results are given which show the good performances of the DWCNS for discontinuities capturing, high accuracy for boundary layer resolutions, good convergent rates (the root-mean-square of residuals approaching machine zero for solutions with strong shocks) and especially the damping effect on the spudous oscillations which were found in the solutions obtained by TVD and ENO schemes.  相似文献   
77.
Linear partial differential algebraic equations (PDAEs) of the form Au t(t, x) + Bu xx(t, x) + Cu(t, x) = f(t, x) are studied where at least one of the matrices A, B R n×n is singular. For these systems we introduce a uniform differential time index and a differential space index. We show that in contrast to problems with regular matrices A and B the initial conditions and/or boundary conditions for problems with singular matrices A and B have to fulfill certain consistency conditions. Furthermore, two numerical methods for solving PDAEs are considered. In two theorems it is shown that there is a strong dependence of the order of convergence on these indexes. We present examples for the calculation of the order of convergence and give results of numerical calculations for several aspects encountered in the numerical solution of PDAEs.  相似文献   
78.
A simple technique is given in this paper for the construction and analysis of a class of finite element discretizations for convection-diffusion problems in any spatial dimension by properly averaging the PDE coefficients on element edges. The resulting finite element stiffness matrix is an -matrix under some mild assumption for the underlying (generally unstructured) finite element grids. As a consequence the proposed edge-averaged finite element scheme is particularly interesting for the discretization of convection dominated problems. This scheme admits a simple variational formulation, it is easy to analyze, and it is also suitable for problems with a relatively smooth flux variable. Some simple numerical examples are given to demonstrate its effectiveness for convection dominated problems.

  相似文献   

79.
不同层显式格式及在微尺度热传导中的应用   总被引:1,自引:0,他引:1  
基于指数拟合和牛顿插值多项式构造了用于数值计算偏微分方程的不同层显式格式,应用不同层显式格式可获得不同精度的数值计算结果,并将该算法应用于微结构热传导方程和薄膜强瞬态热传导方程中.  相似文献   
80.
In this article, we will investigate the properties of iterative sequence for non-expansive mappings and present several strong and weak convergence results of successive approximations to fixed points of non-expansive mappings in uniformly convex Banach spaces. The results presented in this article generalize and improve various ones concerned with constructive techniques for the fixed points of non-expansive mappings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号