首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4213篇
  免费   293篇
  国内免费   362篇
化学   389篇
晶体学   11篇
力学   313篇
综合类   69篇
数学   3520篇
物理学   566篇
  2024年   9篇
  2023年   59篇
  2022年   71篇
  2021年   73篇
  2020年   132篇
  2019年   119篇
  2018年   102篇
  2017年   122篇
  2016年   152篇
  2015年   117篇
  2014年   197篇
  2013年   388篇
  2012年   158篇
  2011年   231篇
  2010年   185篇
  2009年   253篇
  2008年   275篇
  2007年   278篇
  2006年   249篇
  2005年   224篇
  2004年   168篇
  2003年   175篇
  2002年   166篇
  2001年   144篇
  2000年   146篇
  1999年   135篇
  1998年   101篇
  1997年   116篇
  1996年   78篇
  1995年   40篇
  1994年   31篇
  1993年   22篇
  1992年   15篇
  1991年   9篇
  1990年   19篇
  1989年   20篇
  1988年   6篇
  1987年   14篇
  1986年   9篇
  1985年   13篇
  1984年   8篇
  1983年   7篇
  1982年   4篇
  1981年   6篇
  1980年   4篇
  1978年   3篇
  1977年   4篇
  1975年   2篇
  1974年   2篇
  1936年   3篇
排序方式: 共有4868条查询结果,搜索用时 31 毫秒
1.
A formal computation proving a new operator identity from known ones is, in principle, restricted by domains and codomains of linear operators involved, since not any two operators can be added or composed. Algebraically, identities can be modelled by noncommutative polynomials and such a formal computation proves that the polynomial corresponding to the new identity lies in the ideal generated by the polynomials corresponding to the known identities. In order to prove an operator identity, however, just proving membership of the polynomial in the ideal is not enough, since the ring of noncommutative polynomials ignores domains and codomains. We show that it suffices to additionally verify compatibility of this polynomial and of the generators of the ideal with the labelled quiver that encodes which polynomials can be realized as linear operators. Then, for every consistent representation of such a quiver in a linear category, there exists a computation in the category that proves the corresponding instance of the identity. Moreover, by assigning the same label to several edges of the quiver, the algebraic framework developed allows to model different versions of an operator by the same indeterminate in the noncommutative polynomials.  相似文献   
2.
3.
4.
We consider the irreducibility of polynomial Ln(α)(x) where α is a negative integer. We observe that the constant term of Ln(α)(x) vanishes if and only if n|α|=?α. Therefore we assume that α=?n?s?1 where s is a non-negative integer. Let g(x)=(?1)nLn(?n?s?1)(x)=j=0najxjj! and more general polynomial, let G(x)=j=0najbjxjj! where bj with 0jn are integers such that |b0|=|bn|=1. Schur was the first to prove the irreducibility of g(x) for s=0. It has been proved that g(x) is irreducible for 0s60. In this paper, by a different method, we prove: Apart from finitely many explicitly given possibilities, either G(x) is irreducible or G(x) is linear factor times irreducible polynomial. This is a consequence of the estimate s>1.9k whenever G(x) has a factor of degree k2 and (n,k,s)(10,5,4). This sharpens earlier estimates of Shorey and Tijdeman and Nair and Shorey.  相似文献   
5.
Profiling engineered data with robust mining methods continues attracting attention in knowledge engineering systems. The purpose of this article is to propose a simple technique that deals with non-linear multi-factorial multi-characteristic screening suitable for knowledge discovery studies. The method is designed to proactively seek and quantify significant information content in engineered mini-datasets. This is achieved by deploying replicated fractional-factorial sampling schemes. Compiled multi-response data are converted to a single master-response effectuated by a series of distribution-free transformations and multi-compressed data fusions. The resulting amalgamated master response is deciphered by non-linear multi-factorial stealth stochastics intended for saturated schemes. The stealth properties of our method target processing datasets which might be overwhelmed by a lack of knowledge about the nature of reference distributions at play. Stealth features are triggered to overcome restrictions regarding the data normality conformance, the effect sparsity assumption and the inherent collapse of the ‘unexplainable error’ connotation in saturated arrays. The technique is showcased by profiling four ordinary controlling factors that influence webpage content performance by collecting data from a commercial browser monitoring service on a large scale web host. The examined effects are: (1) the number of Cascading Style Sheets files, (2) the number of JavaScript files, (3) the number of Image files, and (4) the Domain Name System Aliasing. The webpage performance level was screened against three popular characteristics: (1) the time to first visual, (2) the total loading time, and (3) the customer satisfaction. Our robust multi-response data mining technique is elucidated for a ten-replicate run study dictated by an L9(34) orthogonal array scheme where any uncontrolled noise embedded contribution has not been necessarily excluded.  相似文献   
6.
7.
8.
9.
Bilateral generating functions are those involving products of different types of polynomials. We show that operational methods offer a powerful tool to derive these families of generating functions. We study cases relevant to products of Hermite polynomials with Laguerre, Legendre and other polynomials. We also propose further extensions of the method which we develop here.  相似文献   
10.
〈I〉型三角剖分下非张量积连续小波基的构造   总被引:1,自引:0,他引:1  
多维非张量积小波是近年小波研究领域中的热点问题之一 ,它们与多维张量积小波相比具有更多的优势 .关于高维张量积、非张量积小波 ,目前已有一些很好的工作 (见文[2 ] [3 ] [4 ] ) ,但关于样条小波 ,还有许多问题有待于研究 .本文针对〈I〉型三角剖分下的二维线性元空间 ,讨论其具有紧支集和对称性的半正交样条小波基 .给定 x1 x2 平面上的〈I〉型三角剖分 (图 1 ( a)所示 ) ,记 j=( j1 ,j2 ) ,| j| =j1 + j2 ,πm= { 0≤ |j|≤ mCj1j2 xj11 xj22 ,Cj1,j2 是任意实数 }为次数不超过 m的代数多项式全体 .引入剖分尺度为 1的线性元空间 V0…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号