首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7725篇
  免费   335篇
  国内免费   224篇
化学   643篇
晶体学   10篇
力学   1808篇
综合类   12篇
数学   3164篇
物理学   1632篇
无线电   1015篇
  2024年   16篇
  2023年   108篇
  2022年   111篇
  2021年   109篇
  2020年   178篇
  2019年   120篇
  2018年   119篇
  2017年   153篇
  2016年   187篇
  2015年   202篇
  2014年   401篇
  2013年   737篇
  2012年   337篇
  2011年   552篇
  2010年   480篇
  2009年   540篇
  2008年   448篇
  2007年   431篇
  2006年   367篇
  2005年   280篇
  2004年   273篇
  2003年   243篇
  2002年   193篇
  2001年   159篇
  2000年   134篇
  1999年   142篇
  1998年   159篇
  1997年   118篇
  1996年   122篇
  1995年   81篇
  1994年   107篇
  1993年   91篇
  1992年   93篇
  1991年   77篇
  1990年   60篇
  1989年   48篇
  1988年   46篇
  1987年   50篇
  1986年   20篇
  1985年   48篇
  1984年   49篇
  1983年   25篇
  1982年   19篇
  1981年   17篇
  1980年   8篇
  1979年   7篇
  1978年   10篇
  1977年   3篇
  1976年   4篇
  1968年   1篇
排序方式: 共有8284条查询结果,搜索用时 359 毫秒
41.
We consider a class of Markov decision processes withfinite state and action spaces which, essentially, is determined by the following condition: The state space isirreducible under the action of any stationary policy. However, except by this restriction, the transition law iscompletely unknown to the controller. In this context, we find a set of policies under which thefrequency estimators of the transition law are strongly consistent and then, this result is applied to constructadaptive asymptotically discount-optimal policies.Dedicated to Professor Truman O. Lewis, on the occasion of his sixtieth birthdayThis research was supported in part by the Third World Academy of Sciences (TWAS) under Grant TWAS RG MP 898-152, and in part by the Consejo Nacional de Ciencia y Tecnología (CONACYT) under Grant A128CCOEO550 (MT-2).  相似文献   
42.
An exponentially fitted special second-order finite difference method is presented for solving singularly perturbed two-point boundary value problems with the boundary layer at one end (left or right) point. A fitting factor is introduced in a tri-diagonal finite difference scheme and is obtained from the theory of singular perturbations. Thomas Algorithm is used to solve the system and its stability is investigated. To demonstrate the applicability of the method, we have solved several linear and non-linear problems. From the results, it is observed that the present method approximates the exact solution very well.  相似文献   
43.
This paper considers the weighted extended b-splines as basis function for finite element method in electromagnetics and compares with the standard finite element method applied to the two-point boundary value problems with different boundary conditions. This new approach, which provides more accurate results than standard finite element method, is presented to compare other numerical techniques and applied to one-dimensional electromagnetic problems. Computed results are compared with other numerical results in literature.  相似文献   
44.
We prove that three automorphisms of the rooted binary tree defined by a certain 3-state automaton generate a free non-Abelian group of rank 3. Both authors are supported by the NSF grants DMS-0308985 and DMS-0456185. Yaroslav Vorobets is supported by a Clay Research Scholarship.  相似文献   
45.
几种约束广义逆矩阵的有限算法   总被引:2,自引:0,他引:2  
1引言与引理众所周知,关于非奇异方阵的正则逆的有限算法是由Faddeev大给在1949年之前提出的,这就是著名的Faddeev算法[1,P…334-336]。自从五十年代中期广义逆矩阵的研究复兴与发展以来,有不少学者提出了关于广义逆矩阵的有限算法。第一个给出关于广义逆矩  相似文献   
46.
Using the ray trace method,three-section semiconductor lasers are studied .An analytic expression of output power for the three-section semiconductor lasers is derived for the first time.Frome this expression,threshold condition is also obtained.  相似文献   
47.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
48.
Based on the matrix-analytic approach to fluid flows initiated by Ramaswami, we develop an efficient time dependent analysis for a general Markov modulated fluid flow model with a finite buffer and an arbitrary initial fluid level at time 0. We also apply this to an insurance risk model with a dividend barrier and a general Markovian arrival process of claims with possible dependencies in successive inter-claim intervals and in claim sizes. We demonstrate the implementability and accuracy of our algorithms through a set of numerical examples that could also serve as test cases for comparing other solution approaches.   相似文献   
49.
50.
This paper derives the convection–diffusion-reaction equation governing the reaction between the dissolved oxygen in sea-water and the steel walls of a pulsating crack. By the neglect of the diffusion term it is shown that an exact solution of the convection-reaction equation can be obtained. A numerical method for the solution of the complete convection–diffusion-reaction equation is derived by the use of finite differences. The numerical computation of the initial transient and the final periodic steady-state values is also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号