全文获取类型
收费全文 | 3251篇 |
免费 | 409篇 |
国内免费 | 335篇 |
专业分类
化学 | 168篇 |
晶体学 | 2篇 |
力学 | 150篇 |
综合类 | 87篇 |
数学 | 1936篇 |
物理学 | 723篇 |
无线电 | 929篇 |
出版年
2024年 | 11篇 |
2023年 | 38篇 |
2022年 | 83篇 |
2021年 | 96篇 |
2020年 | 88篇 |
2019年 | 102篇 |
2018年 | 86篇 |
2017年 | 121篇 |
2016年 | 124篇 |
2015年 | 124篇 |
2014年 | 181篇 |
2013年 | 294篇 |
2012年 | 173篇 |
2011年 | 183篇 |
2010年 | 186篇 |
2009年 | 185篇 |
2008年 | 235篇 |
2007年 | 233篇 |
2006年 | 196篇 |
2005年 | 173篇 |
2004年 | 136篇 |
2003年 | 145篇 |
2002年 | 127篇 |
2001年 | 103篇 |
2000年 | 118篇 |
1999年 | 106篇 |
1998年 | 59篇 |
1997年 | 59篇 |
1996年 | 57篇 |
1995年 | 36篇 |
1994年 | 23篇 |
1993年 | 13篇 |
1992年 | 10篇 |
1991年 | 16篇 |
1990年 | 13篇 |
1989年 | 10篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1986年 | 7篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 7篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1973年 | 1篇 |
1936年 | 2篇 |
排序方式: 共有3995条查询结果,搜索用时 15 毫秒
61.
62.
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret image sharing schemes, noise-like shadows introduce difficulties into shadow management and increase the risk of attacks. Meaningful secret image sharing is thus proposed to solve these problems. Previous meaningful SIS schemes have employed steganography to hide shares into cover images, and their covers are always binary images. These schemes usually include pixel expansion and low visual quality shadows. To improve the shadow quality, we design a meaningful secret image sharing scheme with saliency detection. Saliency detection is used to determine the salient regions of cover images. In our proposed scheme, we improve the quality of salient regions that are sensitive to the human vision system. In this way, we obtain meaningful shadows with better visual quality. Experiment results and comparisons demonstrate the effectiveness of our proposed scheme. 相似文献
63.
64.
Kung-Chien Wu 《Journal of Mathematical Analysis and Applications》2010,365(2):584-589
This paper is devoted to the proof of the convergence from the modulated cubic nonlinear defocusing Klein-Gordon equation with magnetic field to the wave map equation. More precisely, we discuss the nonrelativistic-semiclassical limit of the modulated cubic nonlinear Klein-Gordon equation with magnetic field where the Planck's constant ?=ε and the speed of light c are related by c=ε−α for some α?1. When α=1 the limit wave function satisfies the wave map with one extra term coming from the magnetic field. However, α>1, the effect of the magnetic filed disappears and the limit is the typical wave map equation only. 相似文献
65.
The magnetization under the spin-lattice relaxation and the nuclear magnetic resonance radiofrequency (RF) pulses is calculated for a signal RF pulse train and for a sequence of multiple RF pulse-trains. It is assumed that the transverse magnetization is zero when each RF pulse is applied. The result expressions can be grouped into two terms: a decay term, which is proportional to the initial magnetization M0, and a recovery term, which has no M0 dependence but strongly depends on the spin-lattice relaxation and the equilibrium magnetization Meq. In magnetic resonance pulse sequences using magnetization in transient state, the recovery term produces artifacts and can seriously degrade the function of the preparation sequence for slice selection, contrast weighting, phase encoding, etc. This work shows that the detrimental effect can be removed by signal averaging in an eliminative fashion. A novel fast data acquisition method for constructing the spin-lattice relaxation (T1) map is introduced. The method has two features: (i) By using eliminative averaging, the curve to fit the T1 value is a decay exponential function rather than a recovery one as in conventional techniques; therefore, the measurement of Meq is not required and the result is less susceptible to the accuracy of the inversion RF pulse. (ii) The decay exponential curve is sampled by using a sequence of multiple pulse-trains. An image is reconstructed from each train and represents a sample point of the curve. Hence a single imaging sequence can yield multiple sample points needed for fitting the T1 value in contrast to conventional techniques that require repeating the imaging sequence for various delay values but obtain only one sample point from each repetition. 相似文献
66.
We examine asymptotically periodic density evolution in one-dimensional maps perturbed by noise, associating the macroscopic state of these dynamical systems with a phase space density. For asymptotically periodic systems density evolution becomes periodic in time, as do some macroscopic properties calculated from them. The general formalism of asymptotic periodicity is examined and used to calculate time correlations along trajectories of these maps as well as their limiting conditional entropy. The time correlation is shown to naturally decouple into periodic and stochastic components. Finally, asymptotic periodicity is studied in a noise-perturbed piecewise linear map, focusing on how the variation of noise amplitude can cause a transition from asymptotic periodicity to asymptotic stability in the density evolution of this system. 相似文献
67.
An algorithm is presented for computing the topological entropy of a piecewise monotone map of the interval having three monotone pieces. The accuracy of the algorithm is discussed and some graphs of the topological entropy obtained using the algorithm are displayed. Some of the ideas behind the algorithm have application to piecewise monotone functions with more than three monotone pieces. 相似文献
68.
This paper studies the cascading failure on random networks and
scale-free networks by introducing the tolerance parameter of edge
based on the coupled map lattices methods. The whole work focuses on
investigating some indices including the number of failed edges,
dynamic edge tolerance capacity and the perturbation of edge. In
general, it assumes that the perturbation is attributed to the
normal distribution in adopted simulations. By investigating the
effectiveness of edge tolerance in scale-free and random networks,
it finds that the larger tolerance parameter λ can more
efficiently delay the cascading failure process for scale-free
networks than random networks. These results indicate that the
cascading failure process can be effectively controlled by
increasing the tolerance parameter λ. Moreover, the
simulations also show that, larger variance of perturbation can
easily trigger the cascading failures than the smaller one. This
study may be useful for evaluating efficiency of whole traffic
systems, and for alleviating cascading failure in such systems. 相似文献
69.
70.
Benson真有效意义下集值优化的广义最优性条件 总被引:12,自引:0,他引:12
本文引入了关于集值映射的α-阶Clarke切导数、α-阶邻接切导数及α-阶 伴随切导数的概念,借此建立了约束向量集值优化Benson真有效解导数型的Kuhn- Tucker条件. 相似文献