全文获取类型
收费全文 | 575篇 |
免费 | 9篇 |
国内免费 | 2篇 |
专业分类
化学 | 283篇 |
晶体学 | 2篇 |
力学 | 21篇 |
数学 | 138篇 |
物理学 | 142篇 |
出版年
2022年 | 6篇 |
2020年 | 8篇 |
2018年 | 6篇 |
2017年 | 4篇 |
2016年 | 10篇 |
2015年 | 6篇 |
2014年 | 10篇 |
2013年 | 31篇 |
2012年 | 34篇 |
2011年 | 19篇 |
2010年 | 17篇 |
2009年 | 7篇 |
2008年 | 16篇 |
2007年 | 18篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 19篇 |
2003年 | 13篇 |
2002年 | 14篇 |
2001年 | 8篇 |
2000年 | 14篇 |
1999年 | 10篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 9篇 |
1995年 | 6篇 |
1993年 | 16篇 |
1992年 | 9篇 |
1991年 | 5篇 |
1990年 | 10篇 |
1989年 | 8篇 |
1988年 | 13篇 |
1987年 | 12篇 |
1986年 | 7篇 |
1985年 | 14篇 |
1984年 | 20篇 |
1983年 | 6篇 |
1982年 | 13篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 7篇 |
1978年 | 7篇 |
1977年 | 5篇 |
1976年 | 6篇 |
1975年 | 5篇 |
1973年 | 6篇 |
1972年 | 8篇 |
1971年 | 4篇 |
1969年 | 4篇 |
1967年 | 4篇 |
排序方式: 共有586条查询结果,搜索用时 31 毫秒
1.
2.
This paper deals with the optimal control of a one-machine two-product manufacturing system with setup changes, operating in a continuous time dynamic environment. The system is deterministic. When production is switched from one product to the other, a known constant setup time and a setup cost are incurred. Each product has specified constant processing time and constant demand rate, as well as an infinite supply of raw material. The problem is formulated as a feedback control problem. The objective is to minimize the total backlog, inventory and setup costs incurred over a finite horizon. The optimal solution provides the optimal production rate and setup switching epochs as a function of the state of the system (backlog and inventory levels). For the steady state, the optimal cyclic schedule is determined. To solve the transient case, the system's state space is partitioned into mutually exclusive regions such that with each region, the optimal control policy is determined analytically. 相似文献
3.
C. P. Beistle H. G. Sherman Osborne Fraps und Neumann 《Fresenius' Journal of Analytical Chemistry》1904,43(3):185-188
Ohne Zusammenfassung 相似文献
4.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献
5.
The phenomenological amplitude for the reaction πN→ππN fixed by fittings to the experimental data in the energy region 0.300 ≤P
Lab≤ 500 MeV/c is used for modelling the Chew–Low extrapolation and Olsson–Turner threshold approach. It is shown that the uncritical
application of the former results in enermous theoretical errors, the extracted values being in fact random numbers. The results
of the Olsson–Turner method are characterized by significant systematic errors coming from unknown details of the isobar physics.
Received: 10 December 1997 相似文献
6.
For any authentication code for k source states and v messages having minimum possible deception probabilities (namely, % MathType!MTEF!2!1!+-% feaafiart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr% 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq-Jc9% vqaqpepm0xbba9pwe9Q8fs0-yqaqpepae9qq-f0-yqaqVeLsFr0-vr% 0-vr0db8meaabaqaciGacaGaaeqabaWaaeaaeaaakeaacaWGqbWaaS% baaSqaaiaadsgaaeqaaOWaaSbaaSqaaiaaicdaaeqaaOGaeyypa0Za% aSGbaeaacaWGRbaabaGaamODaaaaaaa!3F28!\[P_d _0 = {k \mathord{\left/ {\vphantom {k v}} \right. \kern-\nulldelimiterspace} v}\] and % MathType!MTEF!2!1!+-% feaafiart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr% 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq-Jc9% vqaqpepm0xbba9pwe9Q8fs0-yqaqpepae9qq-f0-yqaqVeLsFr0-vr% 0-vr0db8meaabaqaciGacaGaaeqabaWaaeaaeaaakeaacaWGqbWaaS% baaSqaaiaadsgaaeqaaOWaaSbaaSqaaiaaigdaaeqaaOGaeyypa0Ze% xLMBb50ujbqeguuDJXwAKbacfaGae8hkaGIaam4AaiabgkHiTiaaig% dacqWFPaqkcqWFVaWlcqWFOaakcqWF2bGDcqGHsislcaaIXaGae8xk% aKIae8xkaKcaaa!4CD1!\[P_d _1 = (k - 1)/(v - 1))\], we show that there must be at least v encoding rules. (This can be thought of as an authentication-code analogue of Fisher's Inequality.) We derive several properties that an extremal code must satisfy, and we characterize the extremal codes for equiprobable source states as arising from symmetric balanced incomplete block designs. We also present an infinite class of extremal codes, in which the source states are not equiprobable, derived from affine planes.Dedicated to Gus Simmons 相似文献
7.
8.
Summary In the present work we extent the results in [RS] on CHIP, i.e. Cardinal Hermite Interpolation by the span of translates of directional derivatives of a box spline. These directional derivatives are that ones which define the type of the Hermite Interpolation. We admit here several (linearly independent) directions with multiplicities instead of one direction as in [RS]. Under the same assumptions on the smoothness of the box spline and its defining matrixT we can prove as in [RS]: CHIP has a system of fundamental solutions which are inL
L
2 together with its directional derivatives mentioned above. Moreover, for data sequences inl
p
(
d
), 1p2, there is a spline function inL
p, 1/p+1/p=1, which solves CHIP.Research supported in part by NSERC Canada under Grant # A7687. This research was completed while this author was supported by a grant from the Deutscher Akademischer Austauschdienst 相似文献
9.
Thermal response of metals to ultrashort-pulse laser excitation 总被引:1,自引:0,他引:1
10.