首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32476篇
  免费   1134篇
  国内免费   250篇
化学   22370篇
晶体学   224篇
力学   791篇
综合类   1篇
数学   5509篇
物理学   4965篇
  2023年   183篇
  2021年   336篇
  2020年   569篇
  2019年   530篇
  2018年   403篇
  2017年   395篇
  2016年   868篇
  2015年   756篇
  2014年   825篇
  2013年   1780篇
  2012年   1908篇
  2011年   2434篇
  2010年   1156篇
  2009年   1028篇
  2008年   2045篇
  2007年   2040篇
  2006年   2033篇
  2005年   1890篇
  2004年   1631篇
  2003年   1387篇
  2002年   1132篇
  2001年   328篇
  2000年   303篇
  1999年   266篇
  1998年   249篇
  1997年   312篇
  1996年   418篇
  1995年   333篇
  1994年   295篇
  1993年   272篇
  1992年   268篇
  1991年   235篇
  1990年   203篇
  1989年   207篇
  1988年   238篇
  1987年   203篇
  1986年   185篇
  1985年   357篇
  1984年   343篇
  1983年   247篇
  1982年   318篇
  1981年   336篇
  1980年   301篇
  1979年   287篇
  1978年   262篇
  1977年   238篇
  1976年   216篇
  1975年   215篇
  1974年   219篇
  1973年   218篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Journal of Optimization Theory and Applications - A framework for monitoring a target modeled as Dubins car using multiple UAVs is proposed. The UAVs are subject to minimum and maximum speed,...  相似文献   
2.
Malware detection is in a coevolutionary arms race where the attackers and defenders are constantly seeking advantage. This arms race is asymmetric: detection is harder and more expensive than evasion. White hats must be conservative to avoid false positives when searching for malicious behaviour. We seek to redress this imbalance. Most of the time, black hats need only make incremental changes to evade them. On occasion, white hats make a disruptive move and find a new technique that forces black hats to work harder. Examples include system calls, signatures and machine learning. We present a method, called Hothouse, that combines simulation and search to accelerate the white hat’s ability to counter the black hat’s incremental moves, thereby forcing black hats to perform disruptive moves more often. To realise Hothouse, we evolve EEE, an entropy-based polymorphic packer for Windows executables. Playing the role of a black hat, EEE uses evolutionary computation to disrupt the creation of malware signatures. We enter EEE into the detection arms race with VirusTotal, the most prominent cloud service for running anti-virus tools on software. During our 6 month study, we continually improved EEE in response to VirusTotal, eventually learning a packer that produces packed malware whose evasiveness goes from an initial 51.8% median to 19.6%. We report both how well VirusTotal learns to detect EEE-packed binaries and how well VirusTotal forgets in order to reduce false positives. VirusTotal’s tools learn and forget fast, actually in about 3 days. We also show where VirusTotal focuses its detection efforts, by analysing EEE’s variants.  相似文献   
3.
4.
We investigate the method of conjugate gradients, exploiting inaccurate matrix‐vector products, for the solution of convex quadratic optimization problems. Theoretical performance bounds are derived, and the necessary quantities occurring in the theoretical bounds estimated, leading to a practical algorithm. Numerical experiments suggest that this approach has significant potential, including in the steadily more important context of multiprecision computations.  相似文献   
5.
Antibody-based therapeutic agents and other biopharmaceuticals are now used in the treatment of many diseases. However, when these biopharmaceuticals are administrated to patients, an immune reaction may occur that can reduce the drug's efficacy and lead to adverse side-effects. The immunogenicity of biopharmaceuticals can be evaluated by detecting and measuring antibodies that have been produced against these drugs, or antidrug antibodies. Methods for antidrug antibody detection and analysis can be important during the selection of a therapeutic approach based on such drugs and is crucial when developing and testing new biopharmaceuticals. This review examines approaches that have been used for antidrug antibody detection, measurement, and characterization. Many of these approaches are based on immunoassays and antigen binding tests, including homogeneous mobility shift assays. Other techniques that have been used for the analysis of antidrug antibodies are capillary electrophoresis, reporter gene assays, surface plasmon resonance spectroscopy, and liquid chromatography-mass spectrometry. The general principles of each approach will be discussed, along with their recent applications with regards to antidrug antibody analysis.  相似文献   
6.
Measuring the Lewis-acidic surface sites in catalysis is problematic when the material‘s surface area is very low (SBET ≤1 m2 ⋅ g−1). For the first time, a quantitative assessment of total acidic surface sites of very small surface area catalysts (MoO3 as pure and mixed with 5–30 % CdO (wt/wt), as well as CdO for comparison) was performed using a smart new probe molecule, tetrahydrofuran (THF). The results were nearly identical compared to using another commonly used probe molecule, pyridine. This audition is based on the limited values of the surface area of these samples that likely require a relatively moderate basic molecule as THF with pKb=16.08, rather than strong basic molecules such as NH3 (pKb=4.75) or pyridine (pKb=8.77). We propose mechanisms for the interaction of vapour phase molecules of THF with the Lewis-cationic Mo and Cd atoms of these catalysts. Besides, dehydration of isopropyl alcohol was used as a probe reaction to investigate the catalytic activity of these catalysts to further support our findings in the case of THF in a temperature range of 175–300 °C. A good agreement between the obtained data of sample MoO3-10 % CdO, which is characterised by the highest surface area value, the population of Lewis-acidic sites and % selectivity of propylene at all the applied reaction temperatures was found.  相似文献   
7.
Journal of Radioanalytical and Nuclear Chemistry - The mass fractions of V, Cr, Co, Ni, Cu, Zn, As, Br, Mo, Cd, W, Hg, and Pb in soil of the Czech dump-side were measured by instrumental neutron...  相似文献   
8.
9.
Journal of Algebraic Combinatorics - The well-known Worpitzky identity $$\begin{aligned} (x+1)^n = \sum \limits _{k=0}^{n-1} A_{n,k} {{x+n-k} \atopwithdelims (){n}} \end{aligned}$$ provides a...  相似文献   
10.
Gajbhiye  Sneha  Cabecinhas  David  Silvestre  Carlos  Cunha  Rita 《Nonlinear dynamics》2022,107(3):2291-2308
Nonlinear Dynamics - This paper presents a geometric finite-time inner-outer loop control strategy for slung payload transportation using a quadrotor. The underactuated nature of the quadrotor in...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号