首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9081篇
  免费   155篇
  国内免费   37篇
化学   5575篇
晶体学   122篇
力学   283篇
数学   1029篇
物理学   2264篇
  2021年   49篇
  2020年   79篇
  2019年   85篇
  2017年   50篇
  2016年   98篇
  2015年   97篇
  2014年   132篇
  2013年   408篇
  2012年   323篇
  2011年   385篇
  2010年   204篇
  2009年   222篇
  2008年   385篇
  2007年   399篇
  2006年   404篇
  2005年   366篇
  2004年   325篇
  2003年   292篇
  2002年   283篇
  2001年   195篇
  2000年   211篇
  1999年   108篇
  1998年   98篇
  1997年   99篇
  1996年   134篇
  1995年   114篇
  1994年   168篇
  1993年   181篇
  1992年   170篇
  1991年   122篇
  1990年   118篇
  1989年   131篇
  1988年   99篇
  1987年   121篇
  1986年   110篇
  1985年   189篇
  1984年   153篇
  1983年   101篇
  1982年   127篇
  1981年   121篇
  1980年   137篇
  1979年   132篇
  1978年   131篇
  1977年   115篇
  1976年   131篇
  1975年   115篇
  1974年   132篇
  1973年   127篇
  1972年   55篇
  1971年   64篇
排序方式: 共有9273条查询结果,搜索用时 312 毫秒
11.
12.
Parameters of Gaussian multivariate models are often estimated using the maximum likelihood approach. In spite of its merits, this methodology is not practical when the sample size is very large, as, for example, in the case of massive georeferenced data sets. In this paper, we study the asymptotic properties of the estimators that minimize three alternatives to the likelihood function, designed to increase the computational efficiency. This is achieved by applying the information sandwich technique to expansions of the pseudo-likelihood functions as quadratic forms of independent normal random variables. Theoretical calculations are given for a first-order autoregressive time series and then extended to a two-dimensional autoregressive process on a lattice. We compare the efficiency of the three estimators to that of the maximum likelihood estimator as well as among themselves, using numerical calculations of the theoretical results and simulations.  相似文献   
13.
14.
In parts I, II, and III combined of this paper, we define a notion of viscosity solution for these equations and existence is proved by a Perron-like method. Here, in part I, we prove useful identities, and a maximum-like principle for smooth sub(super) solutions of the standard wave equation. We define a new potential theoretic (P) notion of solution, subsolution and supersolution, and a related potential type (P) Cauchy problem for semilinear second order hyperbolic equations.  相似文献   
15.
The electron-stimulated desorption (ESD) of D and H ions from condensed D2O and H2O films is investigated. Three low-energy peaks are observed in the ESD anion yield, which are identified as arising from excitation of 2B1, 2A1 and 2B2 dissociative electron attachment (DEA) resonances. Additional structure is observed between 18 and 32 eV, which may be due to ion pair formation or to DEA resonances involving the 2a1 orbital. The ion yield resulting from excitation of the 2B1 resonance increases as the film is heated. We attribute the increase in the ion yield to thermally induced hydrogen bond breaking near the surface, which enhances the lifetimes of the excited states that lead to desorption.  相似文献   
16.
17.
This paper examines the effect of infinitesimal functional variations in a rigid rotor He-HF potential surface on several different types of observables: inelastic cross sections, rate constants, and rotational energy level populations. The dynamics and kinetic observables studied were found to be sensitive to a large number of Legendre components of the potential with the region of highest sensitivity dependent upon the energy or temperature as well as the states related by the individual observable. Sensitivity to the entire surface tends to show a large degree of structure due to competition among sensitivities to the individual potential components. Significant information loss has been observed in the transition from microscopic to macroscopic observables.  相似文献   
18.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.  相似文献   
19.
Due to the hot, arid nature of its bordering lands, seawater in the Arabian Gulf can have significant evaporation rates leading to hypersaline conditions. If additional desalination plants were to operate along its coast, then the extraction of desalinated water and returned brine waste stream into the Gulf would increase the salinity. This paper uses a tidally and cross-sectionally averaged mathematical model that reveals multiplicative dependence of the salinity on factors associated with river flow, evaporation rates and each of the desalination plants. Present-day desalinated water production rates are in the linear regime, but hypersalinity has exponential sensitivity to the position and volumetric rate of desalinated water extraction.  相似文献   
20.
When depicted on maps as homogenous territorial wholes, ancient states are visually summarized as static entities in a way that conceals the highly fluid dynamics of polity formation, maintenance, and growth. Models derived from studies of animal behavior show that “territory” does not consist of an undifferentiated use of the landscape. Instead, the concept of territory can be parsed into a series of resource‐rich nodes linked by corridors of access, surrounded by unutilized regions and boundaries marked at points of competition. Ancient human groups also can be analyzed as having perceived and occupied landscapes through strategies of flexible networks in which nodes and corridors were surrounded by unutilized spaces around which boundaries were selectively identified and defended. This strategy is identifiable in human social groups at different levels of complexity ranging from hunter‐gatherers through ancient chiefdoms and states. © 2007 Wiley Periodicals, Inc. Complexity 12: 28–35, 2007  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号