首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2485篇
  免费   291篇
  国内免费   318篇
化学   159篇
晶体学   1篇
力学   156篇
综合类   83篇
数学   1965篇
物理学   730篇
  2023年   19篇
  2022年   36篇
  2021年   50篇
  2020年   56篇
  2019年   66篇
  2018年   72篇
  2017年   79篇
  2016年   74篇
  2015年   61篇
  2014年   107篇
  2013年   240篇
  2012年   115篇
  2011年   132篇
  2010年   143篇
  2009年   152篇
  2008年   199篇
  2007年   194篇
  2006年   164篇
  2005年   144篇
  2004年   117篇
  2003年   120篇
  2002年   125篇
  2001年   93篇
  2000年   109篇
  1999年   91篇
  1998年   54篇
  1997年   58篇
  1996年   54篇
  1995年   36篇
  1994年   23篇
  1993年   13篇
  1992年   6篇
  1991年   16篇
  1990年   14篇
  1989年   10篇
  1988年   2篇
  1987年   5篇
  1986年   7篇
  1985年   5篇
  1984年   4篇
  1983年   2篇
  1982年   6篇
  1981年   5篇
  1980年   5篇
  1979年   2篇
  1977年   2篇
  1976年   1篇
  1974年   1篇
  1973年   1篇
  1936年   2篇
排序方式: 共有3094条查询结果,搜索用时 15 毫秒
1.
结合结构化学学科的自身特点以及学生对该学科的认识,探索用思维导图方法辅助结构化学的教学过程,将思维导图应用于结构化学教学中从而有助于学生形成逻辑严密、有机统一的量子理论知识结构体系,并且通过系统的调查问卷分析学生在学习过程中对思维导图的应用情况。  相似文献   
2.
3.
Let L be an additive map between (real or complex) matrix algebras sending n×n Hermitian idempotent matrices to m×m Hermitian idempotent matrices. We show that there are nonnegative integers p,q with n(p+q)=rm and an m×m unitary matrix U such thatL(A)=U[(Ip?A)(Iq?At)0m?r]U?,for any n×n Hermitian A with rational trace. We also extend this result to the (complex) von Neumann algebra setting, and provide a supplement to the Dye-Bunce-Wright Theorem asserting that every additive map of Hermitian idempotents extends to a Jordan ?-homomorphism.  相似文献   
4.
《Discrete Mathematics》2022,345(7):112796
We introduce the active partition of the ground set of an oriented matroid perspective (or morphism, or quotient, or strong map) on a linearly ordered ground set. The reorientations obtained by arbitrarily reorienting parts of the active partition share the same active partition. This yields an equivalence relation for the set of reorientations of an oriented matroid perspective, whose classes are enumerated by coefficients of the Tutte polynomial, and a remarkable partition of the set of reorientations into Boolean lattices, from which we get a short direct proof of a 4-variable expansion formula for the Tutte polynomial in terms of orientation activities. This formula was given in the last unpublished preprint by Michel Las Vergnas; the above equivalence relation and notion of active partition generalize a former construction in oriented matroids by Michel Las Vergnas and the author; and the possibility of such a proof technique in perspectives was announced in the aforementioned preprint. We also briefly highlight how the 5-variable expansion of the Tutte polynomial in terms of subset activities in matroid perspectives comes in a similar way from the known partition of the power set of the ground set into Boolean lattices related to subset activities (and we complete the proof with a property which was missing in the literature). In particular, the paper applies to matroids and oriented matroids on a linearly ordered ground set, and applies to graph and directed graph homomorphisms on a linearly ordered edge-set.  相似文献   
5.
The photodissociation dynamics of isocyanic acid (HNCO) has been studied by the timesliced velocity map ion imaging technique at 193 nm. The NH(aΔ) products were measured via (2+1) resonance enhanced multiphoton ionization. Images have been accumulated for the NH(aΔ) rotational states in the ground and vibrational excited state (v=0 and 1). The center-of-mass translational energy distribution derived from the NH(aΔ) images implies that the CO vibrational distributions are inverted for most of the measured NH(v|j) internal states. The anisotropic product angular distribution observed indicates a rapid dissociation process for the N-C bond cleavage. A bimodal rotational state distribution of CO(v) has been observed, this result implies that isocyanic acid dissociates in the S1 state in two different pathways.  相似文献   
6.
In this paper we prove a shadowing lemma for pseudo orbits made by quasi-hyperbolic strings. We allow singularities in question and hence, in particular, the quasi-hyperbolic strings are formulated by the rescaled linear Poincaré flow instead of the usual linear Poincaré flow. We also introduce the sectional Poincaré map and rescaled sectional Poincaré map for Lipschitz vector fields on Banach spaces in the article.  相似文献   
7.
In this paper, we define the generalised relative operator entropy and investigate some of its properties such as subadditivity and homogeneity. As application of our result, we obtain the information inequality. In continuation, we establish some reverses of the operator entropy inequalities under certain conditions by using the Mond–Pe?ari? method.  相似文献   
8.
苏敏  李玉华 《数学学报》2019,62(3):515-520
设■:D→R~3确定了以等温参数表示的极小曲面M,其中D是全平面R~2的开子区域,那么极小曲面的Gauss映射g(z)是D上的亚纯函数.Xavier与Chao提出了一个尚未解决的问题:任意给定区域■上的亚纯函数g(z),它是否是某完备极小曲面的Gauss映射?本文证明了若开平面C上的亚纯函数g(z)的零点列或极点列的收敛指数小于1/2,则g(z)—定是某完备极小曲面的Gauss映射.  相似文献   
9.
This study considers the problem of control and synchronization between fractional‐order and integer‐order, N‐components reaction‐diffusion systems with nonidentical coefficients and different nonlinear parts. The control scheme is designed using the Lyapunov direct method. The results are exemplified by two significant biochemical models, namely, the fractional‐order Lengyel‐Epstein model and the Gray‐Scott model. To illustrate the effectiveness of the proposed scheme, numerical simulations are performed in one and two space dimensions using Homotopy Analysis Method (HAM).  相似文献   
10.
Yining Su 《中国物理 B》2022,31(11):110503-110503
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree. Firstly, other programming software is used to perform the middle order traversal, and the plaintext image is sorted according to the middle order traversal sequence on the permutation. Secondly, the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value. Finally, the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix. The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号