全文获取类型
收费全文 | 2820篇 |
免费 | 248篇 |
国内免费 | 244篇 |
专业分类
化学 | 135篇 |
晶体学 | 2篇 |
力学 | 329篇 |
综合类 | 46篇 |
数学 | 2301篇 |
物理学 | 499篇 |
出版年
2024年 | 4篇 |
2023年 | 32篇 |
2022年 | 54篇 |
2021年 | 72篇 |
2020年 | 71篇 |
2019年 | 76篇 |
2018年 | 75篇 |
2017年 | 94篇 |
2016年 | 73篇 |
2015年 | 68篇 |
2014年 | 121篇 |
2013年 | 344篇 |
2012年 | 87篇 |
2011年 | 159篇 |
2010年 | 170篇 |
2009年 | 157篇 |
2008年 | 199篇 |
2007年 | 156篇 |
2006年 | 163篇 |
2005年 | 143篇 |
2004年 | 117篇 |
2003年 | 139篇 |
2002年 | 117篇 |
2001年 | 93篇 |
2000年 | 87篇 |
1999年 | 87篇 |
1998年 | 76篇 |
1997年 | 61篇 |
1996年 | 45篇 |
1995年 | 34篇 |
1994年 | 27篇 |
1993年 | 24篇 |
1992年 | 13篇 |
1991年 | 19篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1988年 | 9篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 8篇 |
1984年 | 3篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有3312条查询结果,搜索用时 15 毫秒
1.
Inner derivations and norm equality 总被引:3,自引:0,他引:3
Mohamed Barraa Mohamed Boumazgour 《Proceedings of the American Mathematical Society》2002,130(2):471-476
We characterize when the norm of the sum of two bounded operators on a Hilbert space is equal to the sum of their norms.
2.
Laurent Gosse. 《Mathematics of Computation》2002,71(238):553-582
This paper investigates the behavior of numerical schemes for nonlinear conservation laws with source terms. We concentrate on two significant examples: relaxation approximations and genuinely nonhomogeneous scalar laws. The main tool in our analysis is the extensive use of weak limits and nonconservative products which allow us to describe accurately the operations achieved in practice when using Riemann-based numerical schemes. Some illustrative and relevant computational results are provided.
3.
一种小波域音频信息隐藏方法 总被引:1,自引:0,他引:1
提出了一种基于量化的小波域音频隐藏算法,将保密语音隐藏到载体音频中.为提高隐藏重和保密语音传输的安全性,对保密语音进行了小波域压缩编码和m序列的扩频调制,生成待隐藏的比特序列;通过量化方法,将编码和调制后的保密语音隐藏到载体音频的小波系数中;保密语音的恢复过程不需要使用原始音频、仿真结果表明,隐藏有保密语音的载体音频听觉质量没有明显下降,提取的保密语音感知质量较好;该算法对重量化、加噪、低通滤波等攻击均有良好的鲁棒性. 相似文献
4.
Large eddy simulations of two basic configurations (decay of isotropic turbulence, and the academic plane channel flow) with heat transfer have been performed comparing several convection numerical schemes, in order to discuss their ability to evaluate temperature fluctuations properly. Results are compared with the available incompressible heat transfer direct numerical simulation data. It is shown that the use of regularizing schemes (such as high order upwind type schemes) for the temperature transport equation in combination with centered schemes for momentum transport equation gives better results than the use of centred schemes for both equations. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
5.
John A. Ekaterinaris 《国际流体数值方法杂志》2004,45(11):1187-1207
A high‐order accurate, finite‐difference method for the numerical solution of incompressible flows is presented. This method is based on the artificial compressibility formulation of the incompressible Navier–Stokes equations. Fourth‐ or sixth‐order accurate discretizations of the metric terms and the convective fluxes are obtained using compact, centred schemes. The viscous terms are also discretized using fourth‐order accurate, centred finite differences. Implicit time marching is performed for both steady‐state and time‐accurate numerical solutions. High‐order, spectral‐type, low‐pass, compact filters are used to regularize the numerical solution and remove spurious modes arising from unresolved scales, non‐linearities, and inaccuracies in the application of boundary conditions. The accuracy and efficiency of the proposed method is demonstrated for test problems. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
6.
A method for computing low Mach number flows using high‐resolution interpolation and difference formulas, within the framework of the Marker and Cell (MAC) scheme, is presented. This increases the range of wavenumbers that are properly resolved on a given grid so that a sufficiently accurate solution can be obtained without extensive grid refinement. Results using this scheme are presented for three problems. The first is the two‐dimensional Taylor–Green flow which has a closed form solution. The second is the evolution of perturbations to constant‐density, plane channel flow for which linear stability solutions are known. The third is the oscillatory instability of a variable density plane jet. In this case, unless the sharp density gradients are resolved, the calculations would breakdown. Under‐resolved calculations gave solutions containing vortices which grew in place rather than being convected out. With the present scheme, regular oscillations of this instability were obtained and vortices were convected out regularly. Stable computations were possible over a wider range of sensitive parameters such as density ratio and co‐flow velocity ratio. Copyright © 2004 John Wiley Sons, Ltd. 相似文献
7.
A new grid‐free upwind relaxation scheme for simulating inviscid compressible flows is presented in this paper. The non‐linear conservation equations are converted to linear convection equations with non‐linear source terms by using a relaxation system and its interpretation as a discrete Boltzmann equation. A splitting method is used to separate the convection and relaxation parts. Least squares upwinding is used for discretizing the convection equations, thus developing a grid‐free scheme which can operate on any arbitrary distribution of points. The scheme is grid free in the sense that it works on any arbitrary distribution of points and it does not require any topological information like elements, faces, edges, etc. This method is tested on some standard test cases. To explore the power of the grid‐free scheme, solution‐based adaptation of points is done and the results are presented, which demonstrate the efficiency of the new grid‐free scheme. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
8.
9.
Ross Anderson Cunsheng Ding Tor Helleseth Torleiv Klove 《Designs, Codes and Cryptography》1998,15(2):111-124
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes. 相似文献
10.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly
as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields
basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (n−t+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative
difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis
[3] for all n≥ t ≥ 2. 相似文献