全文获取类型
收费全文 | 14538篇 |
免费 | 266篇 |
国内免费 | 72篇 |
专业分类
化学 | 8251篇 |
晶体学 | 104篇 |
力学 | 504篇 |
数学 | 2001篇 |
物理学 | 4016篇 |
出版年
2022年 | 97篇 |
2021年 | 118篇 |
2020年 | 166篇 |
2019年 | 113篇 |
2018年 | 121篇 |
2017年 | 92篇 |
2016年 | 199篇 |
2015年 | 214篇 |
2014年 | 250篇 |
2013年 | 530篇 |
2012年 | 572篇 |
2011年 | 728篇 |
2010年 | 408篇 |
2009年 | 359篇 |
2008年 | 618篇 |
2007年 | 676篇 |
2006年 | 674篇 |
2005年 | 701篇 |
2004年 | 566篇 |
2003年 | 452篇 |
2002年 | 416篇 |
2001年 | 409篇 |
2000年 | 378篇 |
1999年 | 223篇 |
1998年 | 198篇 |
1997年 | 192篇 |
1996年 | 249篇 |
1995年 | 228篇 |
1994年 | 211篇 |
1993年 | 254篇 |
1992年 | 234篇 |
1991年 | 217篇 |
1990年 | 172篇 |
1989年 | 179篇 |
1988年 | 205篇 |
1987年 | 186篇 |
1986年 | 144篇 |
1985年 | 192篇 |
1984年 | 185篇 |
1983年 | 138篇 |
1982年 | 173篇 |
1981年 | 153篇 |
1980年 | 153篇 |
1979年 | 152篇 |
1978年 | 157篇 |
1977年 | 120篇 |
1976年 | 136篇 |
1975年 | 102篇 |
1974年 | 119篇 |
1973年 | 97篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
A. A. van der Horst A. M. van der Kraan J. J. van Loef D. J. Lieftink C. Joosten 《Hyperfine Interactions》1994,91(1):613-618
Mössbauer spectroscopy has been applied to two rattle stones found in the Netherlands, which have been formed under different pedoenvironment conditions in the past. Ultrafine particles of goethite are dominantly present in both core and mantle of these stones. The latter differs in both composition and mean particle size; this is related to the distinct manner of their formation. 相似文献
32.
The European Physical Journal C - The tracking system of the LHCb detector has been re-optimised to reduce the amount of material which particles traverse. The different subcomponents involved in... 相似文献
33.
R Teunter E van der Laan D Vlachos 《The Journal of the Operational Research Society》2004,55(5):475-484
We describe hybrid manufacturing/remanufacturing systems with a long lead time for manufacturing and a short lead time for remanufacturing. We review the classes of inventory strategies for hybrid systems in the literature. These are all based on equal lead times. For systems with slow manufacturing and fast remanufacturing, we propose a new class. An extensive numerical experiment shows that the optimal strategy in the new class almost always performs better and often much better than the optimal strategies in all other classes. 相似文献
34.
35.
A Tandem Queue with Coupled Processors: Computational Issues 总被引:2,自引:0,他引:2
In Resing and Örmeci [16] it is shown that the two-stage tandem queue with coupled processors can be solved using the theory of boundary value problems. In this paper we consider the issues that arise when calculating performance measures like the mean queue length and the fraction of time a station is empty. It is assumed that jobs arrive at the first station according to a Poisson process and require service at both stations before leaving the system. The amount of work that a job requires at each of the stations is an independent, exponentially distributed random variable. When both stations are nonempty, the total service capacity is shared among the stations according to fixed proportions. When one of the stations becomes empty, the total service capacity is given to the nonempty station. We study the two-dimensional Markov process representing the numbers of jobs at the two stations. The problem of finding the generating function of the stationary distribution can be reduced to two different Riemann-Hilbert boundary value problems, where both problems yield a complete analytical solution. We discuss the similarities and differences between the two problems, and relate them to the computational aspects of obtaining performance measures. 相似文献
36.
Johan van Benthem 《Logica Universalis》2007,1(1):125-138
We prove new Lindstr?m theorems for the basic modal propositional language, and for some related fragments of first-order
logic. We find difficulties with such results for modal languages without a finite-depth property, high-lighting the difference
between abstract model theory for fragments and for extensions of first-order logic. In addition we discuss new connections
with interpolation properties, and the modal invariance theorem.
Mathematics Subject Classification (2000): Primary 03B45; Secondary 03C95 相似文献
37.
Nynke A. M. Verhaegh Jeroen S. van Duijneveldt Jan K. G. Dhont Henk N. W. Lekkerkerker 《Physica A》1996,230(3-4):409-436
Mixtures of colloidal silica spheres and polydimethylsiloxane in cyclohexane with a colloid-polymer size ratio of about one were found to phase separate into two fluid phases, one which is colloid-rich and one which is colloid-poor. In this work the phase separation kinetics of this fluid-fluid phase separation is studied for different compositions of the colloid-polymer mixtures, and at several degrees of supersaturation, with small angle light scattering and with light microscopy. The small angle light scattering curve exhibits a peak that grows in intensity and that shifts to smaller wave vector with time. The characteristic length scale that is obtained from the scattering peak is of the order of a few μm, in agreement with observations by light microscopy. The domain size increases with time as
, which might be an indication of coarsening by diffusion and coalescence, like in the case of binary liquid mixtures and polymer blends. For sufficiently low degrees of supersaturation the angular scattering intensity curves satisfy dynamical scaling behavior. 相似文献
38.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献
39.
Long-Mei Zeng Xiong Fu Jing-Yu Su Florecita De Guzman J. Francis Schmitz M. Bilayet Hossain Dick van Der Helm 《中国化学》1991,9(2):136-143
Three pyrrololactam alkaloids have been isolated from the marine sponge Phacellia fusca Schmidt collected from the South China Sea, and their structures were determined as 1–3 , on the grounds of spectral data. This is the first report of these compounds from this sponge. The structure of 1 was confirmed by X-ray analysis. 相似文献
40.