首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5146篇
  免费   586篇
  国内免费   736篇
化学   361篇
晶体学   4篇
力学   215篇
综合类   178篇
数学   4783篇
物理学   927篇
  2024年   3篇
  2023年   51篇
  2022年   58篇
  2021年   81篇
  2020年   103篇
  2019年   124篇
  2018年   145篇
  2017年   163篇
  2016年   182篇
  2015年   121篇
  2014年   224篇
  2013年   481篇
  2012年   242篇
  2011年   272篇
  2010年   290篇
  2009年   312篇
  2008年   394篇
  2007年   422篇
  2006年   337篇
  2005年   296篇
  2004年   266篇
  2003年   284篇
  2002年   282篇
  2001年   220篇
  2000年   209篇
  1999年   182篇
  1998年   141篇
  1997年   128篇
  1996年   109篇
  1995年   62篇
  1994年   44篇
  1993年   31篇
  1992年   31篇
  1991年   24篇
  1990年   20篇
  1989年   21篇
  1988年   6篇
  1987年   8篇
  1986年   10篇
  1985年   13篇
  1984年   11篇
  1983年   4篇
  1982年   13篇
  1981年   7篇
  1980年   6篇
  1979年   9篇
  1978年   4篇
  1977年   9篇
  1976年   3篇
  1936年   2篇
排序方式: 共有6468条查询结果,搜索用时 22 毫秒
1.
2.
Let L be an additive map between (real or complex) matrix algebras sending n×n Hermitian idempotent matrices to m×m Hermitian idempotent matrices. We show that there are nonnegative integers p,q with n(p+q)=rm and an m×m unitary matrix U such thatL(A)=U[(Ip?A)(Iq?At)0m?r]U?,for any n×n Hermitian A with rational trace. We also extend this result to the (complex) von Neumann algebra setting, and provide a supplement to the Dye-Bunce-Wright Theorem asserting that every additive map of Hermitian idempotents extends to a Jordan ?-homomorphism.  相似文献   
3.
In this work, we prove the existence of positive solution for the following class of problems where λ>0 and is a potential satisfying some conditions. Using the variational method developed by Szulkin for functionals, which are the sum of a C1 functional with a convex lower semicontinuous functional, we prove that for each large enough λ>0, there exists a positive solution for the problem, and that, as λ→+, such solutions converge to a positive solution of the limit problem defined on the domain Ω=int(V?1({0})).  相似文献   
4.
In this paper, we define the generalised relative operator entropy and investigate some of its properties such as subadditivity and homogeneity. As application of our result, we obtain the information inequality. In continuation, we establish some reverses of the operator entropy inequalities under certain conditions by using the Mond–Pe?ari? method.  相似文献   
5.
6.
钱冬杰 《中国物理 B》2022,31(1):10503-010503
Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop.  相似文献   
7.
8.
《Discrete Mathematics》2020,343(3):111721
The Z2s-additive codes are subgroups of Z2sn, and can be seen as a generalization of linear codes over Z2 and Z4. A Z2s-linear Hadamard code is a binary Hadamard code which is the Gray map image of a Z2s-additive code. A partial classification of these codes by using the dimension of the kernel is known. In this paper, we establish that some Z2s-linear Hadamard codes of length 2t are equivalent, once t is fixed. This allows us to improve the known upper bounds for the number of such nonequivalent codes. Moreover, up to t=11, this new upper bound coincides with a known lower bound (based on the rank and dimension of the kernel). Finally, when we focus on s{2,3}, the full classification of the Z2s-linear Hadamard codes of length 2t is established by giving the exact number of such codes.  相似文献   
9.
10.
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号