首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   164175篇
  免费   859篇
  国内免费   312篇
化学   63578篇
晶体学   2552篇
力学   10401篇
综合类   8篇
数学   29983篇
物理学   58824篇
  2022年   433篇
  2021年   470篇
  2020年   446篇
  2019年   426篇
  2018年   10072篇
  2017年   10954篇
  2016年   5244篇
  2015年   1582篇
  2014年   1119篇
  2013年   2624篇
  2012年   6896篇
  2011年   16274篇
  2010年   9841篇
  2009年   9995篇
  2008年   14071篇
  2007年   17736篇
  2006年   2667篇
  2005年   9631篇
  2004年   5747篇
  2003年   5413篇
  2002年   3163篇
  2001年   3181篇
  2000年   2479篇
  1999年   1599篇
  1998年   1129篇
  1997年   1077篇
  1996年   1071篇
  1995年   889篇
  1994年   796篇
  1993年   705篇
  1992年   1024篇
  1991年   1001篇
  1990年   910篇
  1989年   821篇
  1988年   823篇
  1987年   882篇
  1986年   729篇
  1985年   970篇
  1984年   931篇
  1983年   661篇
  1982年   655篇
  1981年   625篇
  1980年   588篇
  1979年   733篇
  1978年   766篇
  1977年   691篇
  1976年   644篇
  1975年   536篇
  1974年   574篇
  1973年   545篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
An exact charged solution with axial symmetry is obtained in the teleparallel equivalent of general relativity. The associated metric has the structure function G(ξ)=1-ξ2-2mAξ3-q2A2ξ4. The fourth order nature of the structure function can make calculations cumbersome. Using a coordinate transformation we get a tetrad whose metric has the structure function in a factorizable form (1-ξ2)(1+r+Aξ)(1+r-Aξ) with r± as the horizons of Reissner–Nordström space-time. This new form has the advantage that its roots are now trivial to write down. Then, we study the singularities of this space-time. Using another coordinate transformation, we obtain a tetrad field. Its associated metric yields the Reissner–Nordström black hole. In calculating the energy content of this tetrad field using the gravitational energy-momentum, we find that the resulting form depends on the radial coordinate! Using the regularized expression of the gravitational energy-momentum in the teleparallel equivalent of general relativity we get a consistent value for the energy.  相似文献   
992.
According to Fortunato and Barthélemy, modularity-based community detection algorithms have a resolution threshold such that small communities in a large network are invisible. Here we generalize their work and show that the q-state Potts community detection method introduced by Reichardt and Bornholdt also has a resolution threshold. The model contains a parameter by which this threshold can be tuned, but no a priori principle is known to select the proper value. Single global optimization criteria do not seem capable for detecting all communities if their size distribution is broad.  相似文献   
993.
The strong suppression of high-pT hadrons observed in heavy ion collisions at RHIC indicates the interaction of high energy partons with a dense colored medium prior to hadronization. We review the main results from the high-pT hadron analysis at RHIC and what they tell us about the medium. We then concentrate on the new possibilities that the wider kinematic range at the LHC will offer and how they will help us to better characterize the medium produced in these collisions.  相似文献   
994.
A linear problem of parametric oscillations of a low-viscous two-layer fluid in a closed vessel partially filled with a porous medium is studied. An asymptotic solution is constructed on the basis of combined application of boundary functions and averaging methods. Approximate formulas for boundaries of instability domains in the case of subharmonic and harmonic resonances are derived.  相似文献   
995.
In apparel industry, manufacturers developed standard allowed minutes (SAMs) databases on various manufacturing operations in order to facilitate better scheduling, while effective production schedules ensure smoothness of downstream operations. As apparel manufacturing environment is fuzzy and dynamic, rigid production schedules based on SAMs become futile in the presence of any uncertainty. In this paper, a fuzzification scheme is proposed to fuzzify the static standard time so as to incorporate some uncertainties, in terms of both job-specific and human related factors, into the fabric-cutting scheduling problem. A genetic optimisation procedure is also proposed to search for fault-tolerant schedules using genetic algorithms, such that makespan and scheduling uncertainties are minimised. Two sets of real production data were collected to validate the proposed method. Experimental results indicate that the genetically optimised fault-tolerant schedules not only improve the operation performance but also minimise the scheduling risks.  相似文献   
996.
A new variant of realization of quantum memory based on the use of a photon echo in an optically dense three-level gaseous medium is proposed. The use of a long-lived highly excited optical level as a storage of quantum information is the characteristic feature of the scheme proposed. This scheme of quantum memory is distinguished by reduced optical noises owing to the possibility of realizing temporal, spectral, and spatial selection of weak quantum radiation relative to the accompanying laser pulsed fields.  相似文献   
997.
Bismuth iron garnet films prepared through electron-beam and laser-induced evaporation on (001)-oriented substrates of scandium gallium gadolinium garnet are investigated using ferromagnetic resonance. It is assumed that the additional minima observed in the angular dependence of the resonance field can be associated with the magnetic moment of bismuth ions.  相似文献   
998.
999.
Numerical solution of the Slonczewski equations were used to study the motion of an individual domain wall in a two-layer uniaxial film in which the damping parameter and the gyromagnetic ratio depend on the specific layer.  相似文献   
1000.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号