全文获取类型
收费全文 | 869篇 |
免费 | 170篇 |
国内免费 | 67篇 |
学科分类
数理化 | 1106篇 |
出版年
2024年 | 3篇 |
2023年 | 9篇 |
2022年 | 42篇 |
2021年 | 55篇 |
2020年 | 43篇 |
2019年 | 36篇 |
2018年 | 22篇 |
2017年 | 47篇 |
2016年 | 39篇 |
2015年 | 53篇 |
2014年 | 74篇 |
2013年 | 74篇 |
2012年 | 48篇 |
2011年 | 46篇 |
2010年 | 39篇 |
2009年 | 30篇 |
2008年 | 35篇 |
2007年 | 41篇 |
2006年 | 47篇 |
2005年 | 43篇 |
2004年 | 28篇 |
2003年 | 27篇 |
2002年 | 26篇 |
2001年 | 21篇 |
2000年 | 31篇 |
1999年 | 22篇 |
1998年 | 19篇 |
1997年 | 24篇 |
1996年 | 19篇 |
1995年 | 16篇 |
1994年 | 9篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 5篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1957年 | 2篇 |
排序方式: 共有1106条查询结果,搜索用时 0 毫秒
1.
本文对具有有限时滞的泛函微分方程建立了关于依照两种测度的实际稳定性的Razumikhin型判定定理,其中未采用通常的辅助函数,且可运用多个含有状态变量x的部分变元的Lyapunov函数,得出部分变远实际稳定性的判定定理,从而改进了已有的结果。 相似文献
2.
The implementation of a nonzero-order joint transform correlator using the double port Mach-Zehnder interferometric technique is proposed and demonstrated. This approach provides on-line processing for directly removing the zero-order components of a joint power spectrum in one step and performs the nonzero-order optical correlation. Experimental results are presented and discussed. 相似文献
3.
Youssef Randjiou 《Journal of Theoretical Probability》2006,19(3):701-720
Let μ+(t) and μ−(t) be the locations of the maximum and minimum, respectively, of a standard Brownian motion in the interval [0,t]. We establish a joint integral test for the lower functions of μ+(t) and μ−(t), in the sense of Paul Lévy. In particular, it yields the law of the iterated logarithm for max(μ+(t),μ−(t)) as a straightforward consequence. Our result is in agreement with well-known theorems of Chung and Erdős [(1952) Trans. Amer. Math. Soc. 72, 179–186.], and Csáki, F?ldes and Révész [(1987) Prob. Theory Relat. Fields
76, 477–497].
相似文献
4.
5.
A new method for rotation and brightness invariant pattern recognition was proposed by applying multiple circular harmonic expansions to the joint transform correlator. The amplitudes of the multiple orders of circular harmonic expansions made from a detecting image were synthetically modified to respond to the same auto-correlation peaks. These modified circular harmonic expansions were arranged in the input plane as reference patterns together with an arbitrary target pattern, and the correlation signals between them were calculated in the subtracted joint transform correlator. The fraction of the correlation-peak intensities between the target and the references were extracted as a new discrimination parameter. This new parameter performs pattern recognition under rotation and brightness invariance with good discriminability. Its high discriminability has been proved in computer simulations using the face image patterns of many individuals. 相似文献
6.
Prof. Dr. K. Ikegami Prof. Dr. T. Sugibayashi Mr. K. Matsuo 《Archive of Applied Mechanics (Ingenieur Archiv)》1994,65(1):44-53
Summary A method of joining two metal cylindrical shafts with adhesive coupling is proposed. Two cylindrical shafts with the same diameter are connected by bonding through a cylindrical coupling with epoxy resin. The strength of the shaft joint under tensile loading and torsional loading is investigated analytically and experimentally. The stress and strain distributions of the shaft joint is analyzed by the finite element method. The analyzed strain distributions in the joint are compared with experimental values. The joint strength is predicted by applying the strength laws of shafts, coupling, adhesive layer and adhesive interface between shaft and adhesive coupling. The effects of the coupling dimension on the joint strength are examined. It is shown that the adhesive shaft joint can transfer the load by which the cylindrical shafts are plastically deformed.This paper was refined by the author, K. Ikegami, during statying at Technische Universität München under the support of Deutscher Akademischer Austauschdients. The author is grateful to Professor Lippmann of Technische Universität München who is the host professor of the support. 相似文献
7.
8.
V. V. Kuznetsov Z. V. Bondarenko T. V. Pshenichkina N. V. Morozova V. N. Kudryavtsev 《Russian Journal of Electrochemistry》2007,43(3):349-354
Kinetics of processes of electrochemical production of a cobalt-molybdenum alloy out of an ammonia-citrate electrolyte is studied. The electrolyte’s composition is similar to that used for depositing a nickel-molybdenum alloy. It is established that the cobalt-molybdenum alloy undergoes deposition at smaller values of pH (5.0–6.0) than the nickel-molybdenum alloy (7.0–9.0). The current efficiency for the cobalt-molybdenum alloy is substantially dependent on the electrolyte pH, whereas the chemical composition of the obtained deposits is practically independent of the electrolyte pH in the pH interval 5.0–8.0 at current densities of 0.025 to 0.100 A cm?2. On the other hand, a change in the electrolyte pH produces a considerable effect on the morphology of the obtained deposits. At large values of pH (pH 8.0), one can obtain a powder-like deposit of the cobalt-molybdenum alloy with a small value of the current efficiency. The deposits that are obtained in the pH region 5.0–6.0 have some cracks, with the number of cracks increasing with the electrolyte pH. 相似文献
9.
Ivo Klik 《Journal of statistical physics》1991,62(1-2):389-397
The influence of the Bardeen-Herring back-jump correlations on the Fermi-Dirac statistics of the one-dimensional nonhomogeneous fermionic lattice gas is studied by the Monte Carlo simulation technique and semianalytically. The resulting distribution is obtained, exhibiting increased population of the lower levels in comparison to the Fermi-Dirac statistics. 相似文献
10.
Hisham Ali Jawad Ahmad Zakwan Jaroucheh Pavlos Papadopoulos Nikolaos Pitropakis Owen Lo Will Abramson William J. Buchanan 《Entropy (Basel, Switzerland)》2022,24(10)
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage. 相似文献