首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1245篇
  免费   119篇
  国内免费   64篇
化学   462篇
晶体学   21篇
力学   156篇
综合类   13篇
数学   408篇
物理学   368篇
  2023年   12篇
  2022年   21篇
  2021年   30篇
  2020年   29篇
  2019年   31篇
  2018年   33篇
  2017年   38篇
  2016年   35篇
  2015年   33篇
  2014年   78篇
  2013年   99篇
  2012年   49篇
  2011年   54篇
  2010年   46篇
  2009年   55篇
  2008年   65篇
  2007年   81篇
  2006年   63篇
  2005年   50篇
  2004年   48篇
  2003年   65篇
  2002年   53篇
  2001年   40篇
  2000年   41篇
  1999年   42篇
  1998年   31篇
  1997年   39篇
  1996年   26篇
  1995年   13篇
  1994年   11篇
  1993年   10篇
  1992年   15篇
  1991年   9篇
  1990年   11篇
  1989年   6篇
  1988年   3篇
  1987年   4篇
  1986年   7篇
  1985年   2篇
  1984年   2篇
  1983年   5篇
  1982年   10篇
  1981年   5篇
  1980年   6篇
  1979年   8篇
  1978年   3篇
  1976年   3篇
  1972年   2篇
  1971年   1篇
  1959年   1篇
排序方式: 共有1428条查询结果,搜索用时 15 毫秒
81.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy.  相似文献   
82.
García-Vallejo  D.  Mayo  J.  Escalona  J. L.  Domínguez  J. 《Nonlinear dynamics》2004,35(4):313-329
This paper develops a new procedure for evaluating the elastic forces, the elastic energy and the jacobian of the elastic forces in the absolute nodal coordinate formulation. For this procedure, it is fundamental to use some invariant sparse matrices that are integrated in advance and have the property of transforming the evaluation of the elastic forces in a matrix multiplication process. The use of the invariant matrices avoids the integration over the volume of the element for every evaluation of the elastic forces. Great advantages can be achieved from these invariant matrices when evaluating the elastic energy and calculating the jacobian of the elastic forces as well. The exact expression of the jacobian of the differential system of equations of motion is obtained, and some advantages of using the absolute nodal coordinate formulation are pointed out. Numerical results show that there is important time saving as a result of the use of the invariant matrices.  相似文献   
83.
作为环保、节能、可智能控制的新型光源,发光二极管(LED)广泛应用于人们的现代生活、生产中,更有望替代传统的照明光源。以三基色LED为光源,制作了三路独立可调恒流电源,通过调节三基色光的不同配比实现加法混色,研究设计了加法混色的色度学实验,既可以直接观察混色后的实验现象,又能通过测量光谱数据得到色度参数。LED光源环保...  相似文献   
84.
We study the set where the so-called Bergman representative coordinates (or Bergman functions) form an immersion. We provide an estimate of the size of a maximal geodesic ball with respect to the Bergman metric contained in this set. By concrete examples we show that these estimates are the best possible.  相似文献   
85.
设M 是一个Ⅱ1 型因子, τ 是M 的正规的、忠实的迹态, U ∈ M 是一个Haar 酉元, p ∈ M是一个投影, τ (p) = (1/n) (n > 3, n ∈ Z), p 和U 自由. 我们用初等方法证明了若pUp = wh 是pUp 的极分解, 则w 也是一个Haar 酉元且w 和h 是自由的. 我们还给出了pUp 的矩的刻画.  相似文献   
86.
We consider derivation of the effective potential for a scalar field in curved space-time within the physical regularization scheme, using two sorts of covariant cut-off regularizations. The first one is based on the local momentum representation and Riemann normal coordinates and the second is operatorial regularization, based on the Fock-Schwinger-DeWitt proper-time representation. We show, on the example of a self-interacting scalar field, that these two methods produce equal results for divergences, but the first one gives more detailed information about the finite part. Furthermore, we calculate the contribution from a massive fermion loop and discuss renormalization group equations and their interpretation for the multi-mass theories.  相似文献   
87.
Let X(1)= {X(1)(s), s ∈ R+ } and X(2)= {X(2)(t), t ∈ R+ } be two independent nondegenerate diusion processes with values in Rd. The existence and fractal dimension of intersections of the sample paths of X(1)and X(2)are studied. More generally, let E1, E2 ■(0, ∞) and F  Rd be Borel sets. A necessary condition and a suffcient condition for P{X(1)(E1) ∩ X(2)(E2) ∩ F = φ} 0 are proved in terms of the Bessel-Riesz type capacity and Hausdor measure of E1 ×E2 ×F in the metric space(R+ ×R+ ×Rd, ρ), where ρ is an unsymmetric metric defined in R+ × R+ × Rd. Under reasonable conditions, results resembling those of Browian motion are obtained.  相似文献   
88.
In this paper, we propose a new three-level implicit nine point compact finite difference formulation of O(k2 + h4) based on non-polynomial tension spline approximation in r-direction and finite difference approximation in t-direction for the numerical solution of one dimensional wave equation in polar co-ordinates. We describe the mathematical formulation procedure in details and also discuss the stability of the method. Numerical results are provided to justify the usefulness of the proposed method.  相似文献   
89.
针对果蝇优化算法易陷入早熟收敛、收敛速度慢、寻优精度低的缺点,提出一种基于极坐标编码的果蝇优化算法.为提高果蝇优化算法的寻优精度,采用极坐标编码的形式,以增加单个母体寻优空间表示方法的多样性,并使种群中的个体,在围绕个体的整个超球体内随机搜索,使个体的搜索范围更加广泛.在迭代寻优过程中,根据适应度值和概率调整极角,逐渐降低观测结果的不确定性.通过9个基准测试函数,对基于极坐标编码的果蝇优化算法进行仿真实验,结果表明了算法在收敛性和稳定性方面,优于其它5个优化算法,测试结果验证了极坐标编码方法的有效性和可行性.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号