首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   450篇
  免费   34篇
  国内免费   48篇
化学   10篇
晶体学   2篇
力学   34篇
综合类   22篇
数学   425篇
物理学   39篇
  2024年   1篇
  2023年   7篇
  2022年   11篇
  2021年   13篇
  2020年   15篇
  2019年   20篇
  2018年   20篇
  2017年   16篇
  2016年   12篇
  2015年   18篇
  2014年   16篇
  2013年   39篇
  2012年   19篇
  2011年   22篇
  2010年   17篇
  2009年   32篇
  2008年   42篇
  2007年   26篇
  2006年   42篇
  2005年   19篇
  2004年   10篇
  2003年   16篇
  2002年   22篇
  2001年   13篇
  2000年   10篇
  1999年   11篇
  1998年   7篇
  1997年   6篇
  1996年   5篇
  1995年   8篇
  1994年   4篇
  1992年   1篇
  1991年   2篇
  1989年   5篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1959年   1篇
排序方式: 共有532条查询结果,搜索用时 15 毫秒
11.
Considering an infinite string of i.i.d. random letters drawn from a finite alphabet we define the cover timeW n as the number of random letters needed until each pattern of lenghtn appears at least once as a substring. Sharp weak and a.s. limit results onW n are known in the symmetric case, i.e., when the random letters are uniformly distributed over the alphabet. In this paper we determine the limit distribution ofW n in the nonsymmetric case asn. Generalizations in terms of point processes are also proved.Dedicated to Endre Csáki on his 60th birthday.  相似文献   
12.
本文研究用低爆速炸药复盖高爆速炸药在定滑移爆轰作用下飞板运动的计算方法,并对惯性复盖与炸药复盖的结果作出相互比较。  相似文献   
13.
14.
15.
Let G be a bridgeless cubic graph. Consider a list of k 1‐factors of G. Let be the set of edges contained in precisely i members of the k 1‐factors. Let be the smallest over all lists of k 1‐factors of G. Any list of three 1‐factors induces a core of a cubic graph. We use results on the structure of cores to prove sufficient conditions for Berge‐covers and for the existence of three 1‐factors with empty intersection. Furthermore, if , then is an upper bound for the girth of G. We also prove some new upper bounds for the length of shortest cycle covers of bridgeless cubic graphs. Cubic graphs with have a 4‐cycle cover of length and a 5‐cycle double cover. These graphs also satisfy two conjectures of Zhang 18 . We also give a negative answer to a problem stated in 18 .  相似文献   
16.
The paper presents experimental investigations of the concrete covers’ protective ability to counteract rebar corrosion in reinforced concrete cubes. The concrete sample was subjected to a chloride-induced environment to get corroded and combined with an un-corroded sample. The chloride-accelerated technique can induce a high degree of corrosion within a controlled time. Moreover, detailed and thorough experimental measurements and analyses of reinforcement loss due to corrosion and its influence on concrete microstructure, were studied through 3D X-ray micro-computed tomography. The rebar outside the concrete was heavily corroded due to the chloride-accelerated test, whereas, only local surface corrosion products appeared inside the concrete. It turned out that the concrete cover showed protective ability to counteract the reinforcing-steel corrosion mechanism despite the accelerated corrosion environment. Moreover, the bond strength between the reinforcement rebar and concrete was not visibly affected since the failure force in the pull-out test and failure mechanisms, observed by 3D X-ray micro-CT, were similar for corroded and un-corroded samples. The failure occurred due to radial cracks with a maximum width equal to approximately 0.25 mm.  相似文献   
17.
Suppose that the underlying field is of characteristic different from 2 and 3. We first prove that the so-called stem deformations of a free presentation of a finite-dimensional Lie superalgebra L exhaust all the maximal stem extensions of L; up to equivalence of extensions. Then we prove that multipliers and covers always exist for a Lie superalgebra and they are unique up to superalgebra isomorphisms. Finally, we describe the multipliers, covers, and maximal stem extensions of Heisenberg superalgebras and model filiform Lie superalgebras.  相似文献   
18.
In a category with injective hulls and a cogenerator, the embeddings into injective hulls can never form a natural transformation, unless all objects are injective. In particular, assigning to a field its algebraic closure, to a poset or Boolean algebra its Mac-Neille completion, and to an R-module its injective envelope is not functorial, if one wants the respective embeddings to form a natural transformation. Received January 21, 2000; accepted in final form August 10, 2001. RID="h1" RID="h2" RID="h3" ID="h1"The hospitality of York University is gratefully acknowledged by the first author. ID="h2"Third author partially supported by the Grant Agency of the Czech Republic under Grant no. 201/99/0310, and the hospitality of York University is also acknowledged. ID="h3"Partial financial assistance by the Natural Sciences and Engineering Councel of Canada is acknowledged by the fourth author.  相似文献   
19.
给出了由随机压缩算子生成的统计递归集的Hausdorf测度上、下界的估计.也就是说,在一些条件下,找出了K(ω)∩∞n=1∪i∈Nn(ω)f(ω)n,i(E)的α-维Hausdorf测度的上、下界,其中{fn,i,1≤i,n<∞}是一族随机压缩算子,{Nn(ω),n≥1}是一族可数的随机指标集.  相似文献   
20.
一种完备完全分配格上矩阵方程的求解方法   总被引:2,自引:0,他引:2  
模糊理论已经在决策、模式识别、故障诊断、过程控制等许多方面得到了广泛应用,在这些应用问题求解中往往要遇到求解模糊关系方程。本文从完备完全分配格的角度给出了一种求解模糊关系方程极小解的完备解法,并用计算机实现了提出的算法,为实际问题求解计算机化打下了基础。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号