首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1351篇
  免费   166篇
  国内免费   69篇
化学   276篇
晶体学   2篇
力学   34篇
综合类   16篇
数学   956篇
物理学   302篇
  2023年   18篇
  2022年   30篇
  2021年   44篇
  2020年   41篇
  2019年   39篇
  2018年   37篇
  2017年   43篇
  2016年   54篇
  2015年   31篇
  2014年   78篇
  2013年   80篇
  2012年   48篇
  2011年   79篇
  2010年   78篇
  2009年   78篇
  2008年   91篇
  2007年   104篇
  2006年   80篇
  2005年   76篇
  2004年   48篇
  2003年   52篇
  2002年   52篇
  2001年   38篇
  2000年   36篇
  1999年   32篇
  1998年   34篇
  1997年   27篇
  1996年   11篇
  1995年   14篇
  1994年   16篇
  1993年   9篇
  1992年   6篇
  1991年   9篇
  1990年   5篇
  1989年   6篇
  1988年   5篇
  1987年   5篇
  1986年   6篇
  1985年   3篇
  1984年   6篇
  1983年   5篇
  1982年   8篇
  1981年   4篇
  1980年   6篇
  1979年   2篇
  1978年   4篇
  1977年   2篇
  1974年   2篇
  1970年   1篇
  1957年   1篇
排序方式: 共有1586条查询结果,搜索用时 31 毫秒
71.
数值修约是分析化学教学的重要内容。目前,主流分析化学教材均采用 “四舍六入五留双”数值修约规则。详细剖析了该规则中尾数与进舍条件的关系,指出“四舍六入五留双”修约规则中应采用“尾数的首位”而不是“尾数”设置进舍条件,否则存在逻辑错误。对比分析表明,“四舍六入五留双”以数字4、5和6为比较值设置的修约规则等价于GBT8170—2008国家标准中以数字5为比较值设置的进舍规则,但GBT8170—2008国家标准的进舍规则的逻辑、表述等优于“四舍六入五留双”规则。因此,建议分析化学教材采用GBT8170—2008国家标准规定的数值修约相关内容。  相似文献   
72.
本文探讨了早期视网膜分支静脉阻塞患者倍频固体激光治疗对临床疗效及黄斑中心视网膜厚度(CMT)值变化的影响。将因视网膜分支静脉阻塞行激光治疗的30例患者纳入激光组,同期行常规治疗的30例患者纳入对照组,对比两组临床疗效、视力、CMT值变化、眼底荧光血管造影(FFA)检查渗透率及并发症。结果显示,治疗后激光组患者临床治疗总有效率、各个时间点视力变化、CMT值及FFA检查渗透发生率均优于对照组(P<0.05),两组患者均随访6个月,并发症比较差异无统计学意义(P>0.05)。说明早期视网膜分支静脉阻塞患者使用倍频固体激光治疗临床效果显著,可有效提高其视力水平,降低CMT值。  相似文献   
73.
Nowadays, the purpose of human genomics is widely emerging in health-related problems and also to achieve time and cost-efficient healthcare. Due to advancement in genomics and its research, development in privacy concerns is needed regarding querying, accessing and, storage and computation of the genomic data. While the genomic data is widely accessible, the privacy issues may emerge due to the untrusted third party (adversaries/researchers), they may reveal the information or strategy plans regarding the genome data of an individual when it is requested for research purposes. To mitigate this problem many privacy-preserving techniques are used along with cryptographic methods are briefly discussed. Furthermore, efficiency and accuracy in a secure and private genomic data computation are needed to be researched in future.  相似文献   
74.
A spectrum sharing system with primary and secondary nodes, each equipped with an arbitrary number of antennas, is investigated. Particularly, the outage performance of an underlay cognitive system is analytically studied, in the case when the end-to-end (e2e) communication is established via an intermediate relay node. To better enhance the e2e communication, successive interference cancellation (SIC) is adopted, which compensates for both the transmission power constraint and the presence of interference from primary nodes. Both the relay and secondary receiver perform unordered SIC to successively decode the multiple streams, whereas the decode-and-forward relaying protocol is used for the e2e communication. New closed-form expressions for the e2e outage performance of each transmitted stream are derived in terms of finite sum series of the Tricomi confluent hypergeometric function. In addition, simplified yet tight approximations for the asymptotic outage performance are obtained. Useful engineering insights are manifested, such as the diversity order of the considered system and the impact of interference from the primary nodes in conjunction with the constrained transmission power of the secondary nodes.  相似文献   
75.
A combinatorial approach was applied to devise a set of reference Si–C–O–H species that is used to derive group-additivity values (GAVs) for this class of molecules. The reference species include 62 stable single-bonded, 19 cyclic, and nine double-bonded Si–C–O–H species. The thermochemistry of these reference species, that is, the standard enthalpy of formation, entropy, and heat capacities covering the temperature range from 298 to 2000 K was obtained from quantum chemical calculations using several composite methods, including G4, G4MP2, and CBSQB3, and the isodesmic reaction approach. To calculate the GAVs from the ab initio based thermochemistry of the compounds in the training set, a multivariable linear regression analysis is performed. The sensitivity of GAVs to the different composite methods is discussed, and thermodynamics properties calculated via group additivity are compared with available ab initio calculated values from the literature.  相似文献   
76.
The aim of this paper is to analyse the operational response of a Synchronised Supply Chain (SSC). To do so, first a new mathematical model of a SSC is presented. An exhaustive Latin Square design of experiments is adopted in order to perform a boundary variation analysis of the main three parameters of the periodic review smoothing (SR) order-up-to policy: i.e., lead time, demand smoothing forecasting factor, and proportional controller of the replenishment rule. The model is then evaluated under a variety of performance measures based on internal process benefits and customer benefits. The main results of the analysis are: (I) SSC responds to violent changes in demand by resolving bullwhip effect and by creating stability in inventories under different parameter settings and (II) in a SSC, long production–distribution lead times could significantly affect customer service level. Both results have important consequences for the design and operation of supply chains.  相似文献   
77.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology.  相似文献   
78.
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme.  相似文献   
79.
Considering the perturbation, the results of theoretical calculation of five Rydberg series energy levels 6s2ns^2S1/2 (n = 7 - 20), 6s^2nd^2D3/2 (n = 6 - 20), 6s^2nd^2D5/2 (n = 6 - 20), 6s^2np^2P1/2^0 (n = 7- 20), and 6s^2np^2P3/2^0 (n = 7-20) for Tl I are presented using the weakest bound electron potential model (WBEPM) theory. Furthermore, the radiative lifetimes of this five series are also calculated. The calculated values of energy levels and lifetimes are in good agreement with the experimental results.  相似文献   
80.
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a -VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号