首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33370篇
  免费   2248篇
  国内免费   1956篇
化学   16218篇
晶体学   131篇
力学   485篇
综合类   754篇
数学   11905篇
物理学   8081篇
  2023年   296篇
  2022年   472篇
  2021年   1277篇
  2020年   812篇
  2019年   945篇
  2018年   702篇
  2017年   712篇
  2016年   800篇
  2015年   850篇
  2014年   1131篇
  2013年   2239篇
  2012年   1340篇
  2011年   1631篇
  2010年   1589篇
  2009年   2109篇
  2008年   2166篇
  2007年   2195篇
  2006年   1744篇
  2005年   1068篇
  2004年   1010篇
  2003年   1065篇
  2002年   1034篇
  2001年   995篇
  2000年   689篇
  1999年   550篇
  1998年   551篇
  1997年   387篇
  1996年   451篇
  1995年   412篇
  1994年   418篇
  1993年   451篇
  1992年   445篇
  1991年   288篇
  1990年   244篇
  1989年   204篇
  1988年   236篇
  1987年   193篇
  1986年   205篇
  1985年   322篇
  1984年   237篇
  1983年   141篇
  1982年   296篇
  1981年   466篇
  1980年   426篇
  1979年   463篇
  1978年   368篇
  1977年   279篇
  1976年   241篇
  1974年   76篇
  1973年   149篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
A conjecture widely attributed to Neumann is that all finite non-desarguesian projective planes contain a Fano subplane. In this note, we show that any finite projective plane of even order which admits an orthogonal polarity contains many Fano subplanes. The number of planes of order less than n previously known to contain a Fano subplane was O(logn), whereas the number of planes of order less than n that our theorem applies to is not bounded above by any polynomial in n.  相似文献   
62.
Given a group Γ of order at most six, we characterize the graphs that have Γ-antivoltages and also determine the list of minor-minimal graphs that have no Γ-antivoltage. Our characterizations yield polynomial-time recognition algorithms for such graphs.  相似文献   
63.
Given a graph G we are interested in studying the symmetric matrices associated to G with a fixed number of negative eigenvalues. For this class of matrices we focus on the maximum possible nullity. For trees this parameter has already been studied and plenty of applications are known. In this work we derive a formula for the maximum nullity and completely describe its behavior as a function of the number of negative eigenvalues. In addition, we also carefully describe the matrices associated with trees that attain this maximum nullity. The analysis is then extended to the more general class of unicyclic graphs. Further our work is applied to re-describing all possible partial inertias associated with trees, and is employed to study an instance of the inverse eigenvalue problem for certain trees.  相似文献   
64.
《Discrete Mathematics》2019,342(3):623-627
Wang and Lih (2002) conjectured that every planar graph without adjacent triangles is 4-choosable. In this paper, we prove that every planar graph without any 4-cycle adjacent to two triangles is DP-4-colorable, which improves the results of Lam et al. (1999), Cheng et al. (2016) and Kim and Yu [ arXiv:1709.09809v1].  相似文献   
65.
Oxidative dehydrogenation (ODH) of n-octane was carried out over a vanadium–magnesium oxide catalyst in a continuous flow fixed bed reactor. The catalyst was characterized by ICP–OES, powder XRD and SEM. The catalytic tests were carried out at different gas hourly space velocities (GHSVs), viz. 4000, 6000, 8000, and 10,000 h?1. The best selectivity for octenes was obtained at the GHSV of 8000 h?1, while that for C8 aromatics was attained at the GHSV of 6000 h?1 at high temperatures (500 and 550 °C). The catalytic testing at the GHSV of 10,000 h?1 showed the lowest activity, while that at the GHSV of 4000 h?1 consistently showed the lowest ODH selectivity. Generally, the best ODH performance was obtained by the catalytic testing at the GHSVs of 6000 and 8000 h?1. No phasic changes were observed after the catalytic testing.  相似文献   
66.
67.
We consider the problem of sending a message from a sender s to a receiver r through an unreliable network by specifying in a protocol what each vertex is supposed to do if it receives the message from one of its neighbors. A protocol for routing a message in such a graph is finite if it never floods r with an infinite number of copies of the message. The expected reliability of a given protocol is the probability that a message sent from s reaches r when the edges of the network fail independently with probability 1?p.We discuss, for given networks, the properties of finite protocols with maximum expected reliability in the case when p is close to 0 or 1, and we describe networks for which no one protocol is optimal for all values of p. In general, finding an optimal protocol for a given network and fixed probability is challenging and many open problems remain.  相似文献   
68.
The radius of spatial analyticity for solutions of the KdV equation is studied. It is shown that the analyticity radius does not decay faster than t?1/4 as time t goes to infinity. This improves the works of Selberg and da Silva (2017) [30] and Tesfahun (2017) [34]. Our strategy mainly relies on a higher order almost conservation law in Gevrey spaces, which is inspired by the I-method.  相似文献   
69.
Schiff-base–bearing new bis(thiosemicarbazone) derivatives were prepared from terephthalaldehyde and various thiosemicarbazides. FT–IR, 1H NMR, 13C NMR, and UV–Vis spectroscopic methods and elemental analysis were used to elucidate the identification of the synthesized molecules. The in vitro antioxidant activity of the synthesized compounds was analysed with the 1,1-diphenyl-2-picryl hydrazyl free-radical–trapping process. The synthesized compounds exhibited lower antioxidant activity than the standard ascorbic acid. IC50 values of the synthesized molecules measured from 3.81 ± 0.01 to 29.05 ± 0.11 μM. Among the synthesized compounds, compound 3 had the best antioxidant activity. Moreover, this study explained the structure–activity relationship of the synthesized molecules with different substituents in radical trapping reactions.  相似文献   
70.
We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号