全文获取类型
收费全文 | 1787篇 |
免费 | 69篇 |
国内免费 | 10篇 |
专业分类
化学 | 1202篇 |
晶体学 | 15篇 |
力学 | 36篇 |
数学 | 250篇 |
物理学 | 363篇 |
出版年
2023年 | 21篇 |
2022年 | 22篇 |
2021年 | 42篇 |
2020年 | 30篇 |
2019年 | 46篇 |
2018年 | 37篇 |
2017年 | 30篇 |
2016年 | 55篇 |
2015年 | 49篇 |
2014年 | 55篇 |
2013年 | 100篇 |
2012年 | 100篇 |
2011年 | 141篇 |
2010年 | 75篇 |
2009年 | 89篇 |
2008年 | 104篇 |
2007年 | 96篇 |
2006年 | 102篇 |
2005年 | 103篇 |
2004年 | 60篇 |
2003年 | 57篇 |
2002年 | 68篇 |
2001年 | 26篇 |
2000年 | 31篇 |
1999年 | 20篇 |
1998年 | 14篇 |
1997年 | 15篇 |
1996年 | 19篇 |
1995年 | 20篇 |
1994年 | 18篇 |
1993年 | 18篇 |
1992年 | 10篇 |
1991年 | 15篇 |
1990年 | 11篇 |
1989年 | 11篇 |
1988年 | 12篇 |
1986年 | 15篇 |
1985年 | 11篇 |
1984年 | 18篇 |
1983年 | 13篇 |
1982年 | 8篇 |
1981年 | 7篇 |
1980年 | 9篇 |
1979年 | 10篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 5篇 |
1975年 | 7篇 |
1974年 | 6篇 |
1970年 | 5篇 |
排序方式: 共有1866条查询结果,搜索用时 15 毫秒
121.
On Clique-Transversals and Clique-Independent Sets 总被引:1,自引:0,他引:1
Guillermo Durán Min Chih Lin Jayme L. Szwarcfiter 《Annals of Operations Research》2002,116(1-4):71-77
A clique-transversal of a graph G is a subset of vertices intersecting all the cliques of G. A clique-independent set is a subset of pairwise disjoint cliques of G. Denote by
C
(G) and
C
(G) the cardinalities of the minimum clique-transversal and maximum clique-independent set of G, respectively. Say that G is clique-perfect when
C
(H)=
C
(H), for every induced subgraph H of G. In this paper, we prove that every graph not containing a 4-wheel nor a 3-fan as induced subgraphs and such that every odd cycle of length greater than 3 has a short chord is clique-perfect. The proof leads to polynomial time algorithms for finding the parameters
C
(G) and
C
(G), for graphs belonging to this class. In addition, we prove that to decide whether or not a given subset of vertices of a graph is a clique-transversal is Co-NP-Complete. The complexity of this problem has been mentioned as unknown in the literature. Finally, we describe a family of highly clique-imperfect graphs, that is, a family of graphs G whose difference
C
(G)–
C
(G) is arbitrarily large. 相似文献
122.
Gerona-Navarro G García-López MT González-Muñiz R 《The Journal of organic chemistry》2002,67(11):3953-3956
The first general approach toward the asymmetric synthesis of 4-alkyl-4-carboxy-2-azetidinones derived from amino acids is described. The stereoselective construction of the beta-lactam ring was achieved through base-mediated intramolecular cyclization of the corresponding N(alpha)-chloroacetyl derivatives bearing (+)- or (-)-10-(N,N-dicyclohexylsulfamoyl)isoborneol as chiral auxiliary (ee up to 82%). 相似文献
123.
[reaction: see text] Beta-lactones are useful synthetic intermediates allowing access to a number of functional arrays. In this report, enantiomerically pure 4-trichloromethyl-2-oxetanone is shown to be a versatile amino acid synthon leading to a variety of gamma-substituted alpha-amino acid precursors. The utility of this methodology was demonstrated by the concise synthesis of a protected homoserine equivalent, alpha-azidobutyro lactone, and a naturally occurring alpha-amino acid from the seeds of Blighia unijugata. 相似文献
124.
Ultrasound has been used to non-destructively assess the quality of many foods such as meat, fish, vegetables and dairy products. This paper addresses the applications of low intensity ultrasonics in the cheese manufacturing processes and highlights the areas where ultrasonics could be successfully implemented in the future. The decrease of ultrasonic attenuation during the renneting process can be used to determine the optimum cut time for cheese making. The ultrasonic velocity increases during maturation for those types of cheese that become harder during this manufacturing stage, thus being an indicator of the maturity degree. Moreover, ultrasonic measurements could be linked to sensory parameters. From the ultrasonic velocity measurements at two different temperatures, it is possible to assess cheese composition, thus allowing an improvement in the quality and uniformity of cheese commercialization. In addition, in pulse-echo mode it is possible to detect cracked pieces due to abnormal fermentations and also to assess the distance of the crack from the surface. 相似文献
125.
The Volterra convolution operator Vf(x) = x0(xy)f(y)dy,where (·) is a non-negative non-decreasing integrablekernel on [0, 1], is considered. Under certain conditions onthe kernel , the maximal Banach function space on [0, 1] onwhich the Volterra operator is a continuous linear operatorwith values in a given rearrangement invariant function spaceon [0, 1] is identified in terms of interpolation spaces. Thecompactness of the operator on this space is studied. 相似文献
126.
Maryam I. Daneshvar Guillermo A. Casay Gabor Patonay Malgorzata Lipowska Lucjan Strekowski Lawrence Evans III Leila Tarazi Abraham George 《Journal of fluorescence》1996,6(2):69-75
The design and application of a fluorescent fiber-optic immunosensor (FFOI) are reported. The FFOI is utilized for the detection of antibody/antigen binding within the near-infrared (NIR) spectral region. The technique is developed through the combined use of fiber-optic, semiconductor laser-excitation, fluorescence detection, NIR dye, and immunochemical techniques. The antibody is immobilized on the FFOI and utilized as a recognition component for trace amounts of specific antigen. The FFOI is constructed to utilize an antibody sandwich technique. The assay involves the immobilization of the capture antibody on the sensing tip of the FFOI followed by the exposure of the immobilized sensing tip to the antigen. The antigen-coated FFOI is then introduced to a second antibody previously labeled with the NIR dye. Typical measurements are performed in about 15 min. A semiconductor laser provides the excitation (780 nm) of the immune complex. The resulting emission is detected by a silicon photodiode detector (820 nm). The intensity of the resulting fluorescence is directly proportional to the concentration of the antigen. The sensitivity of the analysis reaches 10 ng/ml and the response time is 10–15 min. 相似文献
127.
Affine-Invariant Distances, Envelopes and Symmetry Sets 总被引:3,自引:0,他引:3
Affine invariant symmetry sets of planar curves are introduced and studied in this paper. Two different approaches are investigated. The first one is based on affine invariant distances, and defines the symmetry set as the closure of the locus of points on (at least) two affine normals and affine-equidistant from the corresponding points on the curve. The second approach is based on affine bitangent conics. In this case the symmetry set is defined as the closure of the locus of centers of conics with (at least) 3-point contact with the curve at two or more distinct points on the curve. This is equivalent to conic and curve having, at those points, the same affine tangent, or the same Euclidean tangent and curvature. Although the two analogous definitions for the classical Euclidean symmetry set are equivalent, this is not the case for the affine group. We present a number of properties of both affine symmetry sets, showing their similarities with and differences from the Euclidean case. We conclude the paper with a discussion of possible extensions to higher dimensions and other transformation groups, as well as to invariant Voronoi diagrams. 相似文献
128.
La Iglesia A. García V. Gonzalez Pozas J. M. Martín 《Journal of Thermal Analysis and Calorimetry》1975,8(2):273-278
Journal of Thermal Analysis and Calorimetry - Les anomalies que nous avons observées, dans le cas de l'oxydation de fils de nickel, peuvent s'interpréter en faisant appel à... 相似文献
129.
Ohne Zusammenfassung 相似文献
130.
Guillermo Owen 《International Journal of Game Theory》1971,1(1):3-9
A bi-matrix threat game is defined as a triple (A,B,S) whereA andB arem×n payoff matrices, andS is a closed convex subset of the plane, with (a ij,B ij) εS for eachi,j. Given (threat) mixed strategiesx andy,Nash's model suggests that the eventual outcome will be that point (u, v) εS which maximizes the product (u ?xAy t) (v ?xBy t) subject tou ≥xAy t,v ≥xBy t. Optimality of the threat strategies is then defined in the obvious way. A constructive proof of existence of optimal threat strategies is given; in particular, it is shown that they are optimal strategies for the matrix gameA-kB, wherek is to be determined. In this paper,k is approximated by aNewton-Raphson technique. Two examples are solved in detail. 相似文献