首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31209篇
  免费   6744篇
  国内免费   2858篇
化学   8361篇
晶体学   124篇
力学   2752篇
综合类   645篇
数学   10534篇
物理学   18395篇
  2024年   71篇
  2023年   389篇
  2022年   624篇
  2021年   1030篇
  2020年   987篇
  2019年   879篇
  2018年   863篇
  2017年   1118篇
  2016年   1367篇
  2015年   1157篇
  2014年   1809篇
  2013年   2341篇
  2012年   1854篇
  2011年   2114篇
  2010年   1810篇
  2009年   1962篇
  2008年   2314篇
  2007年   2355篇
  2006年   2048篇
  2005年   1811篇
  2004年   1684篇
  2003年   1436篇
  2002年   1365篇
  2001年   1071篇
  2000年   1018篇
  1999年   852篇
  1998年   791篇
  1997年   623篇
  1996年   495篇
  1995年   487篇
  1994年   310篇
  1993年   282篇
  1992年   221篇
  1991年   240篇
  1990年   173篇
  1989年   129篇
  1988年   135篇
  1987年   89篇
  1986年   82篇
  1985年   84篇
  1984年   64篇
  1983年   38篇
  1982年   39篇
  1981年   45篇
  1980年   30篇
  1979年   29篇
  1978年   23篇
  1977年   14篇
  1976年   13篇
  1974年   9篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
91.
We analyze the functioning of Gibbs-type entropy functionals in the time domain, with emphasis on Shannon and Kullback-Leibler entropies of time-dependent continuous probability distributions. The Shannon entropy validity is extended to probability distributions inferred from L 2(R n ) quantum wave packets. In contrast to the von Neumann entropy which simply vanishes on pure states, the differential entropy quantifies the degree of probability (de)localization and its time development. The associated dynamics of the Fisher information functional quantifies nontrivial power transfer processes in the mean, both in dissipative and quantum mechanical cases. PACS NUMBERS: 05.45.+b, 02.50.-r, 03.65.Ta, 03.67.-a  相似文献   
92.
A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information I(α, ε) between Alice and Eve is caJculated by employing Shannon information theory. Finally the security analysis is presented.  相似文献   
93.
This paper is a continuation of the authors'previous paper[1].In this paper the authorsprove,assuming additional conditions on the initial data,some results about the existence anduniqueness of the entropy weak solutions of the Cauchy problem for the singular hyperbolicsystem a_t+(au)_x_2au/x=0,u_t+1/2(a~2+u~2)_x=0,x>0,t≥0.  相似文献   
94.
Software failures have become the major factor that brings the system down or causes a degradation in the quality of service. For many applications, estimating the software failure rate from a user's perspective helps the development team evaluate the reliability of the software and determine the release time properly. Traditionally, software reliability growth models are applied to system test data with the hope of estimating the software failure rate in the field. Given the aggressive nature by which the software is exercised during system test, as well as unavoidable differences between the test environment and the field environment, the resulting estimate of the failure rate will not typically reflect the user‐perceived failure rate in the field. The goal of this work is to quantify the mismatch between the system test environment and the field environment. A calibration factor is proposed to map the failure rate estimated from the system test data to the failure rate that will be observed in the field. Non‐homogeneous Poisson process models are utilized to estimate the software failure rate in both the system test phase and the field. For projects that have only system test data, use of the calibration factor provides an estimate of the field failure rate that would otherwise be unavailable. For projects that have both system test data and previous field data, the calibration factor can be explicitly evaluated and used to estimate the field failure rate of future releases as their system test data becomes available. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
95.
李多  杨婷  刘大禾 《大学物理》2006,25(5):42-47
从一个新的角度分析、讨论了光学的发展过程.并对光学今后的发展做了展望.  相似文献   
96.
刘传龙  郑亦庄 《物理学报》2006,55(12):6222-6228
提出利用双模纠缠相干态作为量子信道,实现纠缠相干态量子隐形传态的方案. 分别在非正交的相干态表象和另一个由相干态构成的正交态表象对双模纠缠相干态的隐形传态进行具体分析. 发现在相干态表象,虽然只要线性光学元件就可以完成隐形传态,但成功的概率小于1/2,而在正交态表象,只要能分辨4个由相干态构成的Bell态,成功的概率就是1. 关键词: 隐形传态 纠缠相干态 纠缠相干态量子信道  相似文献   
97.
Based on A.K. Pati‘s original idea [Phys. Rev. A 61 (2000) 022308] on single-qubit-state-assisted clone, very recently Zhan has proposed two assisted quantum cloning protocols of a special class of unknown two-qubit entangled states [Phys. Lett. A 336 (2005) 317]. In this paper we further generalize Zhan‘s protocols such that an arbitrary unknown two-qubit entangled state can be treated.  相似文献   
98.
Huilian Jiang  Daomu Zhao   《Optik》2006,117(5):215-219
By means of expanding a hard-edged aperture into a finite sum of complex Gaussian functions, the approximate analytical formula of one kind of higher-order Gaussian beams called the Hermite–Gaussian beams (HGBs) passing through circular apertured and misaligned optical system is obtained in this paper. The result provides more convenience for studying its propagation than the usual way by using diffraction integral directly. Some numerical simulations are also given for illustrating the propagation properties of the HGBs through the circular apertured optical systems.  相似文献   
99.
一阶形式系统K~*及其完备性   总被引:2,自引:0,他引:2  
模糊命题演算的形式系统L*已经在模糊逻辑与模糊推理的结合研究中得到了成功的应用.本文考虑与系统L*相应的一阶逻辑理论,建立了一阶形式系统K*,并证明了这个系统的完备性.  相似文献   
100.
介绍了采用MATLAB V5.2提供的模糊逻辑工具箱来设计研究电孤纺电极调节系统中的模糊--PD控制器,讨论了在SIMULINK环境下模糊-PD控制器的参数自调速原理、结构、建立模糊控制规则库和模糊推论方法,并给出仿真结果与结论。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号