首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13977篇
  免费   1273篇
  国内免费   1084篇
化学   2449篇
晶体学   38篇
力学   1091篇
综合类   293篇
数学   9434篇
物理学   3029篇
  2024年   18篇
  2023年   154篇
  2022年   165篇
  2021年   281篇
  2020年   395篇
  2019年   382篇
  2018年   348篇
  2017年   414篇
  2016年   533篇
  2015年   364篇
  2014年   666篇
  2013年   1253篇
  2012年   588篇
  2011年   820篇
  2010年   713篇
  2009年   844篇
  2008年   886篇
  2007年   916篇
  2006年   800篇
  2005年   741篇
  2004年   622篇
  2003年   616篇
  2002年   567篇
  2001年   468篇
  2000年   446篇
  1999年   386篇
  1998年   336篇
  1997年   296篇
  1996年   238篇
  1995年   177篇
  1994年   130篇
  1993年   113篇
  1992年   94篇
  1991年   88篇
  1990年   57篇
  1989年   65篇
  1988年   40篇
  1987年   35篇
  1986年   38篇
  1985年   41篇
  1984年   33篇
  1983年   20篇
  1982年   21篇
  1981年   23篇
  1980年   19篇
  1979年   19篇
  1978年   15篇
  1977年   16篇
  1976年   7篇
  1973年   7篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
A formal computation proving a new operator identity from known ones is, in principle, restricted by domains and codomains of linear operators involved, since not any two operators can be added or composed. Algebraically, identities can be modelled by noncommutative polynomials and such a formal computation proves that the polynomial corresponding to the new identity lies in the ideal generated by the polynomials corresponding to the known identities. In order to prove an operator identity, however, just proving membership of the polynomial in the ideal is not enough, since the ring of noncommutative polynomials ignores domains and codomains. We show that it suffices to additionally verify compatibility of this polynomial and of the generators of the ideal with the labelled quiver that encodes which polynomials can be realized as linear operators. Then, for every consistent representation of such a quiver in a linear category, there exists a computation in the category that proves the corresponding instance of the identity. Moreover, by assigning the same label to several edges of the quiver, the algebraic framework developed allows to model different versions of an operator by the same indeterminate in the noncommutative polynomials.  相似文献   
3.
非对称声分束超表面是由人工微单元结构按照特定序列构建的二维平面结构,可将垂直入射的声波分成两束传播方向和分束比自由调控的透射波,在声功能器件设计及声通信领域具有广泛的应用前景。本文系统研究了一种实现非对称声分束的设计理论和实现方法,基于局域声功率守恒条件研究了声分束器的设计理论、阻抗矩阵分布、法向声强分布、声压场分布等。利用遗传算法对四串联共振腔结构进行参数优化实现了声分束器所需的阻抗矩阵分布,声压场分布表明声波入射到声分束器后在入射侧激发出两列传播方向相反且幅值和衰减系数均相同的表面波,实现了入射侧与透射侧的局域声功率相互匹配。声波经过声分束器后被分为两束透射波,两束透射波的折射角和透射系数与理论值十分吻合,证明了设计理论及实现方法的正确性和可行性。本文的研究工作可以为新型非对称声分束结构设计提供理论参考、设计方法和技术支持,并促进其在工程领域的实际应用。  相似文献   
4.
5.
6.
We consider the irreducibility of polynomial Ln(α)(x) where α is a negative integer. We observe that the constant term of Ln(α)(x) vanishes if and only if n|α|=?α. Therefore we assume that α=?n?s?1 where s is a non-negative integer. Let g(x)=(?1)nLn(?n?s?1)(x)=j=0najxjj! and more general polynomial, let G(x)=j=0najbjxjj! where bj with 0jn are integers such that |b0|=|bn|=1. Schur was the first to prove the irreducibility of g(x) for s=0. It has been proved that g(x) is irreducible for 0s60. In this paper, by a different method, we prove: Apart from finitely many explicitly given possibilities, either G(x) is irreducible or G(x) is linear factor times irreducible polynomial. This is a consequence of the estimate s>1.9k whenever G(x) has a factor of degree k2 and (n,k,s)(10,5,4). This sharpens earlier estimates of Shorey and Tijdeman and Nair and Shorey.  相似文献   
7.
In order to understand the dynamics of vortices on heat transfer, the unsteady flow field of tangential direction jets flowing in the annular chamber is numerically investigated by scale-adaptive simulation (SAS). The jet Reynolds number is 332,000 based on the jet’s diameter and inflow velocity for a specific geometric model. The analogy theory is used to obtain the convective heat transfer coefficient distribution on the hub surface. Spectral analysis via fast Fourier transform (FFT) is used to analyze frequency information that flows inside the chamber. The proper orthogonal decomposition (POD) method is performed on the velocity field in the chamber and the convective heat transfer coefficient on the hub surface using a snapshot method. The fast Fourier transform helps find the dominant frequency of the unsteady flow in the chamber. The time sequence of velocity fields on the radial plane shows the presence of cyclic flapping of the jet. The proper orthogonal decomposition analysis indicates that the unsteady periodic flow phenomenon in the chamber and unsteady heat transfer on the hub surface are mainly related to the dynamics of the counter-rotating vortices caused by the jet.  相似文献   
8.
G. Peruginelli 《代数通讯》2018,46(11):4724-4738
We classify the maximal subrings of the ring of n×n matrices over a finite field, and show that these subrings may be divided into three types. We also describe all of the maximal subrings of a finite semisimple ring, and categorize them into two classes. As an application of these results, we calculate the covering number of a finite semisimple ring.  相似文献   
9.
Profiling engineered data with robust mining methods continues attracting attention in knowledge engineering systems. The purpose of this article is to propose a simple technique that deals with non-linear multi-factorial multi-characteristic screening suitable for knowledge discovery studies. The method is designed to proactively seek and quantify significant information content in engineered mini-datasets. This is achieved by deploying replicated fractional-factorial sampling schemes. Compiled multi-response data are converted to a single master-response effectuated by a series of distribution-free transformations and multi-compressed data fusions. The resulting amalgamated master response is deciphered by non-linear multi-factorial stealth stochastics intended for saturated schemes. The stealth properties of our method target processing datasets which might be overwhelmed by a lack of knowledge about the nature of reference distributions at play. Stealth features are triggered to overcome restrictions regarding the data normality conformance, the effect sparsity assumption and the inherent collapse of the ‘unexplainable error’ connotation in saturated arrays. The technique is showcased by profiling four ordinary controlling factors that influence webpage content performance by collecting data from a commercial browser monitoring service on a large scale web host. The examined effects are: (1) the number of Cascading Style Sheets files, (2) the number of JavaScript files, (3) the number of Image files, and (4) the Domain Name System Aliasing. The webpage performance level was screened against three popular characteristics: (1) the time to first visual, (2) the total loading time, and (3) the customer satisfaction. Our robust multi-response data mining technique is elucidated for a ten-replicate run study dictated by an L9(34) orthogonal array scheme where any uncontrolled noise embedded contribution has not been necessarily excluded.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号