首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2820篇
  免费   248篇
  国内免费   244篇
化学   135篇
晶体学   2篇
力学   329篇
综合类   46篇
数学   2301篇
物理学   499篇
  2024年   4篇
  2023年   32篇
  2022年   54篇
  2021年   72篇
  2020年   71篇
  2019年   76篇
  2018年   75篇
  2017年   94篇
  2016年   73篇
  2015年   68篇
  2014年   121篇
  2013年   344篇
  2012年   87篇
  2011年   159篇
  2010年   170篇
  2009年   157篇
  2008年   199篇
  2007年   156篇
  2006年   163篇
  2005年   143篇
  2004年   117篇
  2003年   139篇
  2002年   117篇
  2001年   93篇
  2000年   87篇
  1999年   87篇
  1998年   76篇
  1997年   61篇
  1996年   45篇
  1995年   34篇
  1994年   27篇
  1993年   24篇
  1992年   13篇
  1991年   19篇
  1990年   7篇
  1989年   5篇
  1988年   9篇
  1987年   4篇
  1986年   3篇
  1985年   8篇
  1984年   3篇
  1982年   2篇
  1981年   3篇
  1980年   4篇
  1979年   5篇
  1978年   1篇
  1977年   1篇
排序方式: 共有3312条查询结果,搜索用时 15 毫秒
1.
Inner derivations and norm equality   总被引:3,自引:0,他引:3  

We characterize when the norm of the sum of two bounded operators on a Hilbert space is equal to the sum of their norms.

  相似文献   

2.
This paper investigates the behavior of numerical schemes for nonlinear conservation laws with source terms. We concentrate on two significant examples: relaxation approximations and genuinely nonhomogeneous scalar laws. The main tool in our analysis is the extensive use of weak limits and nonconservative products which allow us to describe accurately the operations achieved in practice when using Riemann-based numerical schemes. Some illustrative and relevant computational results are provided.

  相似文献   

3.
一种小波域音频信息隐藏方法   总被引:1,自引:0,他引:1  
提出了一种基于量化的小波域音频隐藏算法,将保密语音隐藏到载体音频中.为提高隐藏重和保密语音传输的安全性,对保密语音进行了小波域压缩编码和m序列的扩频调制,生成待隐藏的比特序列;通过量化方法,将编码和调制后的保密语音隐藏到载体音频的小波系数中;保密语音的恢复过程不需要使用原始音频、仿真结果表明,隐藏有保密语音的载体音频听觉质量没有明显下降,提取的保密语音感知质量较好;该算法对重量化、加噪、低通滤波等攻击均有良好的鲁棒性.  相似文献   
4.
Large eddy simulations of two basic configurations (decay of isotropic turbulence, and the academic plane channel flow) with heat transfer have been performed comparing several convection numerical schemes, in order to discuss their ability to evaluate temperature fluctuations properly. Results are compared with the available incompressible heat transfer direct numerical simulation data. It is shown that the use of regularizing schemes (such as high order upwind type schemes) for the temperature transport equation in combination with centered schemes for momentum transport equation gives better results than the use of centred schemes for both equations. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
5.
A high‐order accurate, finite‐difference method for the numerical solution of incompressible flows is presented. This method is based on the artificial compressibility formulation of the incompressible Navier–Stokes equations. Fourth‐ or sixth‐order accurate discretizations of the metric terms and the convective fluxes are obtained using compact, centred schemes. The viscous terms are also discretized using fourth‐order accurate, centred finite differences. Implicit time marching is performed for both steady‐state and time‐accurate numerical solutions. High‐order, spectral‐type, low‐pass, compact filters are used to regularize the numerical solution and remove spurious modes arising from unresolved scales, non‐linearities, and inaccuracies in the application of boundary conditions. The accuracy and efficiency of the proposed method is demonstrated for test problems. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
6.
A method for computing low Mach number flows using high‐resolution interpolation and difference formulas, within the framework of the Marker and Cell (MAC) scheme, is presented. This increases the range of wavenumbers that are properly resolved on a given grid so that a sufficiently accurate solution can be obtained without extensive grid refinement. Results using this scheme are presented for three problems. The first is the two‐dimensional Taylor–Green flow which has a closed form solution. The second is the evolution of perturbations to constant‐density, plane channel flow for which linear stability solutions are known. The third is the oscillatory instability of a variable density plane jet. In this case, unless the sharp density gradients are resolved, the calculations would breakdown. Under‐resolved calculations gave solutions containing vortices which grew in place rather than being convected out. With the present scheme, regular oscillations of this instability were obtained and vortices were convected out regularly. Stable computations were possible over a wider range of sensitive parameters such as density ratio and co‐flow velocity ratio. Copyright © 2004 John Wiley Sons, Ltd.  相似文献   
7.
A new grid‐free upwind relaxation scheme for simulating inviscid compressible flows is presented in this paper. The non‐linear conservation equations are converted to linear convection equations with non‐linear source terms by using a relaxation system and its interpretation as a discrete Boltzmann equation. A splitting method is used to separate the convection and relaxation parts. Least squares upwinding is used for discretizing the convection equations, thus developing a grid‐free scheme which can operate on any arbitrary distribution of points. The scheme is grid free in the sense that it works on any arbitrary distribution of points and it does not require any topological information like elements, faces, edges, etc. This method is tested on some standard test cases. To explore the power of the grid‐free scheme, solution‐based adaptation of points is done and the results are presented, which demonstrate the efficiency of the new grid‐free scheme. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
8.
9.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
10.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (nt+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis [3] for all nt ≥ 2.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号