首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1503篇
  免费   194篇
  国内免费   60篇
化学   115篇
力学   76篇
综合类   47篇
数学   953篇
物理学   566篇
  2024年   6篇
  2023年   39篇
  2022年   74篇
  2021年   85篇
  2020年   86篇
  2019年   54篇
  2018年   47篇
  2017年   55篇
  2016年   63篇
  2015年   32篇
  2014年   77篇
  2013年   156篇
  2012年   48篇
  2011年   72篇
  2010年   46篇
  2009年   91篇
  2008年   104篇
  2007年   92篇
  2006年   87篇
  2005年   67篇
  2004年   71篇
  2003年   35篇
  2002年   40篇
  2001年   46篇
  2000年   28篇
  1999年   39篇
  1998年   26篇
  1997年   17篇
  1996年   14篇
  1995年   10篇
  1994年   11篇
  1993年   8篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1971年   2篇
  1969年   1篇
  1959年   2篇
排序方式: 共有1757条查询结果,搜索用时 15 毫秒
61.
土的工程力学性质的颗粒流模拟   总被引:30,自引:0,他引:30  
周健  池永 《固体力学学报》2004,25(4):377-382
基于颗粒流理论,引入不同的颗粒接触连接本构模型,分别建立了砂土和粘性土的颗粒流模型.通过颗粒流数值模型试验,对砂土和粘性土的室内平面应变试验及其剪切带形成和发展进行了数值模拟,分别对比了不同围压下颗粒流试样与室内试验的应力应变关系曲线,基本再现了砂土和粘性土试样应力.应变关系.通过砂土和粘性土PFC试样剪切带模拟表明,当围压较小时试样内部颗粒位移量小而且分布范围较广,当围压增大时,试样内部颗粒位移量也增大,而且发生较大位移颗粒的分布范围趋于集中,同时随着围压的增大试样内部形成明显的剪切带.无论砂土还是粘性土的PFC试样,随着围压的增加剪切带的形状趋于集中,而且剪切带宽度在减小.在围压很小时,试样内形成大的破坏区域,在围压较大时出现明显的线破坏区.这些规律基本与室内试验结果相似。  相似文献   
62.
结构竖向不规则布置是导致结构地震损伤破坏的主要原因之一.介绍了建筑结构沿竖向的强度、刚度和质量不规则布置的定义、不规则的主要内容及其在地震作用下损伤破坏的特点;总结回归了钢筋混凝土竖向不规则结构地震反应需求的研究现状以及国际上典型的结构设计规范中结构竖向不规则条款的限定.针对竖向不规则结构目前的研究现状,提出了今后值得进一步加强研究的方向.   相似文献   
63.
对托卡马克平衡反演数值计算代码EFIT进行了改进,使之适用于EAST装置的磁流体平衡研究.用改进后的平衡反演代码EFIT模拟了EAST装置稳态阶段的偏滤器平衡位形.提出极向场线圈电流作为线性方程组主约束条件,期望位形作为从约束条件,求解非对称电流条件下自由边界平衡问题的方法.结果表明,该方法能较为容易地得到非对称电流条件产生的平衡位形,在非对称电流条件下自由边界平衡计算是收敛的.  相似文献   
64.
韩鹏程  燕群  彭涛  宁方立 《应用声学》2022,41(4):602-609
为了克服现有气体泄漏检测方法的不足,提出一种基于卷积神经网络的气体泄漏超声信号识别方法。在设计卷积神经网络网络结构时,通过多次预训练确定网络层数、卷积核数目和尺寸、全连接层神经元数目。同时,选择Inception模块平衡网络宽度和深度,防止过拟合的同时提高网络对尺度的适应性。通过输气管道泄漏实验平台模拟工况中常见的阀门泄漏和垫片泄漏,利用短时傅里叶变换进行时频图表征,在此基础上,建立二分类模型和不同泄漏类型的三分类模型。结果表明,相比二分类模型,不同泄漏类型的三分类模型识别准确率有所降低,添加Inception模块可以有效提高三分类模型的性能。  相似文献   
65.
In present times, barcode decoders on mobile phones can extract the data content of QR codes. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. This new scheme designs the triple module groups based on the concept of the error correction capability. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. This designed scheme can provide secure and reliable applications for the QR system.  相似文献   
66.
杜娟  虞小波 《大学数学》2007,23(5):109-114
引入中心对称向量和中心反对称向量的概念,证明数域P上任意n维向量都可以唯一地表示成一个中心对称向量和一个中心反对称向量的和;给出数域P上Skew对称矩阵的概念,并讨论其性质.  相似文献   
67.
Speaker recognition is an important classification task, which can be solved using several approaches. Although building a speaker recognition model on a closed set of speakers under neutral speaking conditions is a well-researched task and there are solutions that provide excellent performance, the classification accuracy of developed models significantly decreases when applying them to emotional speech or in the presence of interference. Furthermore, deep models may require a large number of parameters, so constrained solutions are desirable in order to implement them on edge devices in the Internet of Things systems for real-time detection. The aim of this paper is to propose a simple and constrained convolutional neural network for speaker recognition tasks and to examine its robustness for recognition in emotional speech conditions. We examine three quantization methods for developing a constrained network: floating-point eight format, ternary scalar quantization, and binary scalar quantization. The results are demonstrated on the recently recorded SEAC dataset.  相似文献   
68.
Medical image fusion (MIF) has received painstaking attention due to its diverse medical applications in response to accurately diagnosing clinical images. Numerous MIF methods have been proposed to date, but the fused image suffers from poor contrast, non-uniform illumination, noise presence, and improper fusion strategies, resulting in an inadequate sparse representation of significant features. This paper proposes the morphological preprocessing method to address the non-uniform illumination and noise by the bottom-hat–top-hat strategy. Then, grey-principal component analysis (grey-PCA) is used to transform RGB images into gray images that can preserve detailed features. After that, the local shift-invariant shearlet transform (LSIST) method decomposes the images into the low-pass (LP) and high-pass (HP) sub-bands, efficiently restoring all significant characteristics in various scales and directions. The HP sub-bands are fed to two branches of the Siamese convolutional neural network (CNN) by process of feature detection, initial segmentation, and consistency verification to effectively capture smooth edges, and textures. While the LP sub-bands are fused by employing local energy fusion using the averaging and selection mode to restore the energy information. The proposed method is validated by subjective and objective quality assessments. The subjective evaluation is conducted by a user case study in which twelve field specialists verified the superiority of the proposed method based on precise details, image contrast, noise in the fused image, and no loss of information. The supremacy of the proposed method is further justified by obtaining 0.6836 to 0.8794, 0.5234 to 0.6710, and 3.8501 to 8.7937 gain for QFAB, CRR, and AG and noise reduction from 0.3397 to 0.1209 over other methods for objective parameters.  相似文献   
69.
We prove the existence of a cyclic (4p, 4, 1)-BIBD—and hence, equivalently, that of a cyclic (4, 1)-GDD of type 4 p —for any prime such that (p–1)/6 has a prime factor q not greater than 19. This was known only for q=2, i.e., for . In this case an explicit construction was given for . Here, such an explicit construction is also realized for .We also give a strong indication about the existence of a cyclic (4p 4, 1)-BIBD for any prime , p>7. The existence is guaranteed for p>(2q 3–3q 2+1)2+3q 2 where q is the least prime factor of (p–1)/6.Finally, we prove, giving explicit constructions, the existence of a cyclic (4, 1)-GDD of type 6 p for any prime p>5 and the existence of a cyclic (4, 1)-GDD of type 8 p for any prime . The result on GDD's with group size 6 was already known but our proof is new and very easy.All the above results may be translated in terms of optimal optical orthogonal codes of weight four with =1.  相似文献   
70.

As in the earlier paper with this title, we consider a question of Byrnes concerning the minimal length of a polynomial with all coefficients in which has a zero of a given order at . In that paper we showed that for all and showed that the extremal polynomials for were those conjectured by Byrnes, but for that rather than . A polynomial with was exhibited for , but it was not shown there that this extremal was unique. Here we show that the extremal is unique. In the previous paper, we showed that is one of the 7 values or . Here we prove that without determining all extremal polynomials. We also make some progress toward determining . As in the previous paper, we use a combination of number theoretic ideas and combinatorial computation. The main point is that if is a primitive th root of unity where is a prime, then the condition that all coefficients of be in , together with the requirement that be divisible by puts severe restrictions on the possible values for the cyclotomic integer .

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号