全文获取类型
收费全文 | 1245篇 |
免费 | 119篇 |
国内免费 | 64篇 |
专业分类
化学 | 462篇 |
晶体学 | 21篇 |
力学 | 156篇 |
综合类 | 13篇 |
数学 | 408篇 |
物理学 | 368篇 |
出版年
2023年 | 12篇 |
2022年 | 21篇 |
2021年 | 30篇 |
2020年 | 29篇 |
2019年 | 31篇 |
2018年 | 33篇 |
2017年 | 38篇 |
2016年 | 35篇 |
2015年 | 33篇 |
2014年 | 78篇 |
2013年 | 99篇 |
2012年 | 49篇 |
2011年 | 54篇 |
2010年 | 46篇 |
2009年 | 55篇 |
2008年 | 65篇 |
2007年 | 81篇 |
2006年 | 63篇 |
2005年 | 50篇 |
2004年 | 48篇 |
2003年 | 65篇 |
2002年 | 53篇 |
2001年 | 40篇 |
2000年 | 41篇 |
1999年 | 42篇 |
1998年 | 31篇 |
1997年 | 39篇 |
1996年 | 26篇 |
1995年 | 13篇 |
1994年 | 11篇 |
1993年 | 10篇 |
1992年 | 15篇 |
1991年 | 9篇 |
1990年 | 11篇 |
1989年 | 6篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 5篇 |
1982年 | 10篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 8篇 |
1978年 | 3篇 |
1976年 | 3篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有1428条查询结果,搜索用时 15 毫秒
81.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy. 相似文献
82.
Efficient Evaluation of the Elastic Forces and the Jacobian in the Absolute Nodal Coordinate Formulation 总被引:1,自引:0,他引:1
This paper develops a new procedure for evaluating the elastic forces, the elastic energy and the jacobian of the elastic
forces in the absolute nodal coordinate formulation. For this procedure, it is fundamental to use some invariant sparse matrices
that are integrated in advance and have the property of transforming the evaluation of the elastic forces in a matrix multiplication
process. The use of the invariant matrices avoids the integration over the volume of the element for every evaluation of the
elastic forces. Great advantages can be achieved from these invariant matrices when evaluating the elastic energy and calculating
the jacobian of the elastic forces as well. The exact expression of the jacobian of the differential system of equations of
motion is obtained, and some advantages of using the absolute nodal coordinate formulation are pointed out. Numerical results
show that there is important time saving as a result of the use of the invariant matrices. 相似文献
83.
84.
DINEW Zywomir 《中国科学 数学(英文版)》2011,(7)
We study the set where the so-called Bergman representative coordinates (or Bergman functions) form an immersion. We provide an estimate of the size of a maximal geodesic ball with respect to the Bergman metric contained in this set. By concrete examples we show that these estimates are the best possible. 相似文献
85.
86.
We consider derivation of the effective potential for a scalar field in curved space-time within the physical regularization scheme, using two sorts of covariant cut-off regularizations. The first one is based on the local momentum representation and Riemann normal coordinates and the second is operatorial regularization, based on the Fock-Schwinger-DeWitt proper-time representation. We show, on the example of a self-interacting scalar field, that these two methods produce equal results for divergences, but the first one gives more detailed information about the finite part. Furthermore, we calculate the contribution from a massive fermion loop and discuss renormalization group equations and their interpretation for the multi-mass theories. 相似文献
87.
陈振龙 《数学物理学报(B辑英文版)》2014,(1):141-161
Let X(1)= {X(1)(s), s ∈ R+ } and X(2)= {X(2)(t), t ∈ R+ } be two independent nondegenerate diusion processes with values in Rd. The existence and fractal dimension of intersections of the sample paths of X(1)and X(2)are studied. More generally, let E1, E2 ■(0, ∞) and F Rd be Borel sets. A necessary condition and a suffcient condition for P{X(1)(E1) ∩ X(2)(E2) ∩ F = φ} 0 are proved in terms of the Bessel-Riesz type capacity and Hausdor measure of E1 ×E2 ×F in the metric space(R+ ×R+ ×Rd, ρ), where ρ is an unsymmetric metric defined in R+ × R+ × Rd. Under reasonable conditions, results resembling those of Browian motion are obtained. 相似文献
88.
《Journal of the Egyptian Mathematical Society》2014,22(2):280-285
In this paper, we propose a new three-level implicit nine point compact finite difference formulation of O(k2 + h4) based on non-polynomial tension spline approximation in r-direction and finite difference approximation in t-direction for the numerical solution of one dimensional wave equation in polar co-ordinates. We describe the mathematical formulation procedure in details and also discuss the stability of the method. Numerical results are provided to justify the usefulness of the proposed method. 相似文献
89.
针对果蝇优化算法易陷入早熟收敛、收敛速度慢、寻优精度低的缺点,提出一种基于极坐标编码的果蝇优化算法.为提高果蝇优化算法的寻优精度,采用极坐标编码的形式,以增加单个母体寻优空间表示方法的多样性,并使种群中的个体,在围绕个体的整个超球体内随机搜索,使个体的搜索范围更加广泛.在迭代寻优过程中,根据适应度值和概率调整极角,逐渐降低观测结果的不确定性.通过9个基准测试函数,对基于极坐标编码的果蝇优化算法进行仿真实验,结果表明了算法在收敛性和稳定性方面,优于其它5个优化算法,测试结果验证了极坐标编码方法的有效性和可行性. 相似文献
90.