首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   869篇
  免费   170篇
  国内免费   67篇
数理化   1106篇
  2024年   3篇
  2023年   9篇
  2022年   42篇
  2021年   55篇
  2020年   43篇
  2019年   36篇
  2018年   22篇
  2017年   47篇
  2016年   39篇
  2015年   53篇
  2014年   74篇
  2013年   74篇
  2012年   48篇
  2011年   46篇
  2010年   39篇
  2009年   30篇
  2008年   35篇
  2007年   41篇
  2006年   47篇
  2005年   43篇
  2004年   28篇
  2003年   27篇
  2002年   26篇
  2001年   21篇
  2000年   31篇
  1999年   22篇
  1998年   19篇
  1997年   24篇
  1996年   19篇
  1995年   16篇
  1994年   9篇
  1993年   5篇
  1992年   4篇
  1991年   6篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1986年   1篇
  1985年   5篇
  1984年   1篇
  1982年   1篇
  1980年   1篇
  1974年   1篇
  1973年   1篇
  1957年   2篇
排序方式: 共有1106条查询结果,搜索用时 0 毫秒
1.
本文对具有有限时滞的泛函微分方程建立了关于依照两种测度的实际稳定性的Razumikhin型判定定理,其中未采用通常的辅助函数,且可运用多个含有状态变量x的部分变元的Lyapunov函数,得出部分变远实际稳定性的判定定理,从而改进了已有的结果。  相似文献   
2.
The implementation of a nonzero-order joint transform correlator using the double port Mach-Zehnder interferometric technique is proposed and demonstrated. This approach provides on-line processing for directly removing the zero-order components of a joint power spectrum in one step and performs the nonzero-order optical correlation. Experimental results are presented and discussed.  相似文献   
3.
Let μ+(t) and μ(t) be the locations of the maximum and minimum, respectively, of a standard Brownian motion in the interval [0,t]. We establish a joint integral test for the lower functions of μ+(t) and μ(t), in the sense of Paul Lévy. In particular, it yields the law of the iterated logarithm for max(μ+(t),μ(t)) as a straightforward consequence. Our result is in agreement with well-known theorems of Chung and Erdős [(1952) Trans. Amer. Math. Soc. 72, 179–186.], and Csáki, F?ldes and Révész [(1987) Prob. Theory Relat. Fields 76, 477–497].   相似文献   
4.
针对合同的动态性,提出利用基于演化博弈建立定价模型。考虑到决策群体中个体的认识误差,对所建立的定价模型进行修正,建立带偏离的定价模型并分析了偏离对均衡解的影响。最后将以上模型应用实例进行比较分析。  相似文献   
5.
A new method for rotation and brightness invariant pattern recognition was proposed by applying multiple circular harmonic expansions to the joint transform correlator. The amplitudes of the multiple orders of circular harmonic expansions made from a detecting image were synthetically modified to respond to the same auto-correlation peaks. These modified circular harmonic expansions were arranged in the input plane as reference patterns together with an arbitrary target pattern, and the correlation signals between them were calculated in the subtracted joint transform correlator. The fraction of the correlation-peak intensities between the target and the references were extracted as a new discrimination parameter. This new parameter performs pattern recognition under rotation and brightness invariance with good discriminability. Its high discriminability has been proved in computer simulations using the face image patterns of many individuals.  相似文献   
6.
Summary A method of joining two metal cylindrical shafts with adhesive coupling is proposed. Two cylindrical shafts with the same diameter are connected by bonding through a cylindrical coupling with epoxy resin. The strength of the shaft joint under tensile loading and torsional loading is investigated analytically and experimentally. The stress and strain distributions of the shaft joint is analyzed by the finite element method. The analyzed strain distributions in the joint are compared with experimental values. The joint strength is predicted by applying the strength laws of shafts, coupling, adhesive layer and adhesive interface between shaft and adhesive coupling. The effects of the coupling dimension on the joint strength are examined. It is shown that the adhesive shaft joint can transfer the load by which the cylindrical shafts are plastically deformed.This paper was refined by the author, K. Ikegami, during statying at Technische Universität München under the support of Deutscher Akademischer Austauschdients. The author is grateful to Professor Lippmann of Technische Universität München who is the host professor of the support.  相似文献   
7.
本提出一个偏微分方程方法,用这一方法研究同输入M/M/∞排队群中的联合队长分布。在任意初始条件下,给出了瞬时联合队长分布的多元母函数,也讨论了稳态队长的联合分布及各排队系统之间的相关性。  相似文献   
8.
Kinetics of processes of electrochemical production of a cobalt-molybdenum alloy out of an ammonia-citrate electrolyte is studied. The electrolyte’s composition is similar to that used for depositing a nickel-molybdenum alloy. It is established that the cobalt-molybdenum alloy undergoes deposition at smaller values of pH (5.0–6.0) than the nickel-molybdenum alloy (7.0–9.0). The current efficiency for the cobalt-molybdenum alloy is substantially dependent on the electrolyte pH, whereas the chemical composition of the obtained deposits is practically independent of the electrolyte pH in the pH interval 5.0–8.0 at current densities of 0.025 to 0.100 A cm?2. On the other hand, a change in the electrolyte pH produces a considerable effect on the morphology of the obtained deposits. At large values of pH (pH 8.0), one can obtain a powder-like deposit of the cobalt-molybdenum alloy with a small value of the current efficiency. The deposits that are obtained in the pH region 5.0–6.0 have some cracks, with the number of cracks increasing with the electrolyte pH.  相似文献   
9.
The influence of the Bardeen-Herring back-jump correlations on the Fermi-Dirac statistics of the one-dimensional nonhomogeneous fermionic lattice gas is studied by the Monte Carlo simulation technique and semianalytically. The resulting distribution is obtained, exhibiting increased population of the lower levels in comparison to the Fermi-Dirac statistics.  相似文献   
10.
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号