首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9053篇
  免费   848篇
  国内免费   526篇
化学   497篇
晶体学   7篇
力学   612篇
综合类   202篇
数学   7034篇
物理学   2075篇
  2024年   27篇
  2023年   104篇
  2022年   174篇
  2021年   171篇
  2020年   254篇
  2019年   253篇
  2018年   230篇
  2017年   283篇
  2016年   238篇
  2015年   194篇
  2014年   300篇
  2013年   719篇
  2012年   338篇
  2011年   406篇
  2010年   358篇
  2009年   532篇
  2008年   563篇
  2007年   510篇
  2006年   514篇
  2005年   391篇
  2004年   380篇
  2003年   402篇
  2002年   417篇
  2001年   347篇
  2000年   372篇
  1999年   293篇
  1998年   252篇
  1997年   198篇
  1996年   170篇
  1995年   87篇
  1994年   117篇
  1993年   84篇
  1992年   80篇
  1991年   86篇
  1990年   65篇
  1989年   65篇
  1988年   58篇
  1987年   43篇
  1986年   33篇
  1985年   54篇
  1984年   65篇
  1983年   29篇
  1982年   29篇
  1981年   35篇
  1980年   18篇
  1979年   18篇
  1978年   18篇
  1977年   13篇
  1976年   11篇
  1973年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
A combinatorial method of encryption with a similarity to the classical scheme of linear coding has been suggested by the author. The general idea is to treat vertices of a graph as messages and arcs of a certain length as encryption tools. We will study the quality of such an encryption in the case of graphs of high girth by comparing the probability to guess the message, (vertex) at random with the probability of breaking the key, i.e. guessing the encoding arc. In fact, the quality is good for graphs which are close to the Erdös bound, defined by the Even Cycle Theorem.In the case of parallelotopic graphs, there is a uniform way to match arcs with strings in a certain alphabet. Among parallelotopic graphs we distinguish linguistic graphs of affine type whose vertices (messages) and arcs (encoding tools) both could be naturally identified with vectors over the GF(q), and neighbors of the vertex defined by a system of linear equations. We will discuss families of linguistic and parallelotopic graphs of increasing girth as the source for assymmetric cryptographic functions and related open key algorithms.Several constructions of families of linguistic graphs of high girth with good quality, complexity and expansion coefficients will be considered. Some of those constructions have been obtained via group-theoretical and geometrical techniques.  相似文献   
122.
Given a rectangular array whose entries represent the pixels of a digitalized image, we consider the problem of reconstructing an image from the number of occurrences of each color in every column and in every row. The complexity of this problem is still open when there are just three colors in the image. We study some special cases where the number of occurrences of each color is limited to small values. Formulations in terms of edge coloring in graphs and as timetabling problems are used; complexity results are derived from the model.  相似文献   
123.
For a graph A and a positive integer n, let nA denote the union of n disjoint copies of A; similarly, the union of ?0 disjoint copies of A is referred to as ?0A. It is shown that there exist (connected) graphs A and G such that nA is a minor of G for all n??, but ?0A is not a minor of G. This supplements previous examples showing that analogous statements are true if, instead of minors, isomorphic embeddings or topological minors are considered. The construction of A and G is based on the fact that there exist (infinite) graphs G1, G2,… such that Gi is not a minor of Gj for all ij. In contrast to previous examples concerning isomorphic embeddings and topological minors, the graphs A and G presented here are not locally finite. The following conjecture is suggested: for each locally finite connected graph A and each graph G, if nA is a minor of G for all n ? ?, then ?0A is a minor of G, too. If true, this would be a far‐reaching generalization of a classical result of R. Halin on families of disjoint one‐way infinite paths in graphs. © 2002 Wiley Periodicals, Inc. J Graph Theory 39: 222–229, 2002; DOI 10.1002/jgt.10016  相似文献   
124.
任福尧 《数学进展》1997,26(5):385-394
本文主要介绍随机动力系统的主要成果和进一步研究的问题。  相似文献   
125.
We establish moderate and small deviations for the ranges of integer valued random walks. Our theorems apply to the limsup and the liminf laws of the iterated logarithm. We establish moderate and small deviations for the ranges of integer valued random walks. Our theorems apply to the limsup and the liminf laws of the iterated logarithm.  相似文献   
126.
In a recent paper [17] we proposed a stochastic algorithm which generates optimal probabilities for the decompression of an image represented by the fixed point of an IFS system (SAOP). We show here that such an algorithm is in fact a non trivial example of Generalized Random System with Complete Connections. We also exhibit a generalization which could represent the solution to the inverse problem for an image with grey levels, if a fixed set of contraction maps is available. Received: 1 July 2002  相似文献   
127.
赵克文  陈太道 《数学研究》2002,35(4):418-420
记Ore2=min{d(y) d(x)|x,y∈V(G),d(x,y)=2},本得到:若n阶图G的Ore2≥n 1,则G是[5;n]泛连通图。此是比Faudree等人的定理进一步的结果。  相似文献   
128.
一类随机环境中的随机游动   总被引:5,自引:2,他引:3  
柳向东  戴永隆 《数学研究》2002,35(3):298-302
在Solomn的模型的基础上对一类随机环境中随机游动进行了讨论,并得出了一个常返性准则和一些极限性质。  相似文献   
129.
奇点理论浅引   总被引:1,自引:0,他引:1  
余建明  邹建成 《数学进展》1998,27(4):301-308
本文是奇点理论的非正式的介绍。主要内容包括奇点分类与奇点拓扑的基本问题与结果。特别突出了简单奇点的券的性质及其与Lie代数的关系。本文的目的在于引起读者对一分支的兴趣。  相似文献   
130.
For independent identically distributed random vectors belonging to the generalized Domain of Attraction of the multivariate normal law, we define two partial sum processes analogous to that of Donsker's Theorem. We prove that each converges in distribution to a Brownian Motion in the space of continuous functions. One process uses nonrandom operator normalization, and the other is a studentization of the first, using normalization by the empirical covariance operator.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号