全文获取类型
收费全文 | 8957篇 |
免费 | 1348篇 |
国内免费 | 710篇 |
专业分类
化学 | 5947篇 |
晶体学 | 95篇 |
力学 | 583篇 |
综合类 | 42篇 |
数学 | 1085篇 |
物理学 | 3263篇 |
出版年
2024年 | 22篇 |
2023年 | 169篇 |
2022年 | 300篇 |
2021年 | 305篇 |
2020年 | 371篇 |
2019年 | 319篇 |
2018年 | 287篇 |
2017年 | 270篇 |
2016年 | 433篇 |
2015年 | 442篇 |
2014年 | 482篇 |
2013年 | 616篇 |
2012年 | 806篇 |
2011年 | 789篇 |
2010年 | 549篇 |
2009年 | 520篇 |
2008年 | 589篇 |
2007年 | 447篇 |
2006年 | 463篇 |
2005年 | 344篇 |
2004年 | 278篇 |
2003年 | 232篇 |
2002年 | 185篇 |
2001年 | 148篇 |
2000年 | 153篇 |
1999年 | 191篇 |
1998年 | 165篇 |
1997年 | 139篇 |
1996年 | 151篇 |
1995年 | 121篇 |
1994年 | 101篇 |
1993年 | 81篇 |
1992年 | 85篇 |
1991年 | 80篇 |
1990年 | 50篇 |
1989年 | 42篇 |
1988年 | 41篇 |
1987年 | 35篇 |
1986年 | 29篇 |
1985年 | 21篇 |
1984年 | 20篇 |
1983年 | 20篇 |
1982年 | 11篇 |
1981年 | 14篇 |
1980年 | 9篇 |
1977年 | 6篇 |
1976年 | 10篇 |
1975年 | 9篇 |
1973年 | 8篇 |
1972年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
We study smoothing properties for time-dependent Schrödinger equations , , with potentials which satisfy V(x)=O(|x|m) at infinity, m?2. We show that the solution u(t,x) is 1/m times differentiable with respect to x at almost all , and explain that this is the result of the fact that the sojourn time of classical particles with energy λ in arbitrary compact set is less than CTλ−1/m during [0,T] when λ is very large. We also show Strichartz's inequality with derivative loss for such potentials and give its application to nonlinear Schrödinger equations. 相似文献
992.
A diffusive predator-prey model in heterogeneous environment 总被引:1,自引:0,他引:1
In this paper, we demonstrate some special behavior of steady-state solutions to a predator-prey model due to the introduction of spatial heterogeneity. We show that positive steady-state solutions with certain prescribed spatial patterns can be obtained when the spatial environment is designed suitably. Moreover, we observe some essential differences of the behavior of our model from that of the classical Lotka-Volterra model that seem to arise only in the heterogeneous case. 相似文献
993.
We prove that for large λ>0, the boundary blow-up problem
994.
马尔可夫链模型在灾变预测中的应用 总被引:2,自引:0,他引:2
利用马尔可夫链模型的原理预测灾变,以郑州市旱涝等级的预测作为实例,介绍了使用这种模型的方法与步骤,预测结果表明,利用马尔可夫链模型预测灾变是可行的。 相似文献
995.
Yan-Ni Chen Hong-Ke Du Hai-Yan Zhang 《Proceedings of the American Mathematical Society》2008,136(10):3483-3492
Let and be two idempotents on a Hilbert space. In 2005, J. Giol in [Segments of bounded linear idempotents on a Hilbert space, J. Funct. Anal. 229(2005) 405-423] had established that, if is invertible, then and are homotopic with In this paper, we have given a necessary and sufficient condition that where denotes the minimal number of segments required to connect not only from to , but also from to in the set of idempotents.
996.
Hong-Wei Ge Feng Qian Yan-Chun Liang Wen-li Du Lu Wang 《Nonlinear Analysis: Real World Applications》2008,9(4):1345-1360
In this paper, we first present a learning algorithm for dynamic recurrent Elman neural networks based on a dissimilation particle swarm optimization. The proposed algorithm computes concurrently both the evolution of network structure, weights, initial inputs of the context units, and self-feedback coefficient of the modified Elman network. Thereafter, we introduce and discuss a novel control method based on the proposed algorithm. More specifically, a dynamic identifier is constructed to perform speed identification and a controller is designed to perform speed control for Ultrasonic Motors (USM). Numerical experiments show that the novel identifier and controller based on the proposed algorithm can both achieve higher convergence precision and speed than other state-of-the-art algorithms. In particular, our experiments show that the identifier can approximate the USM's nonlinear input–output mapping accurately. The effectiveness of the controller is verified using different kinds of speeds of constant, step, and sinusoidal types. Besides, a preliminary examination on a randomly perturbation also shows the robust characteristics of the two proposed models. 相似文献
997.
Mingchao Li Miao Liang Beiliang Du Jingyuan Chen 《Designs, Codes and Cryptography》2018,86(8):1739-1755
Authentication and secrecy codes which provide both secrecy and authentication have been intensively studied in the case where there is no splitting; however the results concerning the case where there is splitting are far fewer. In this paper, we focus on the case with c-splitting, and obtain a bound on the number of encoding rules required in order to obtain maximum levels of security. A c-splitting authentication and secrecy code is called optimal if it obtains maximum levels of security and has the minimum number of encoding rules. We define a new design, called an authentication perpendicular multi-array, and prove that the existence of authentication perpendicular multi-arrays implies the existence of optimal c-splitting authentication and secrecy codes. Further, we study the constructions and existence of authentication perpendicular multi-arrays, and then obtain two new infinite classes of optimal c-splitting authentication and secrecy codes. 相似文献
998.
In this paper, a complete classification is achieved of all the regular covers of the complete bipartite graphs \(K_{n,n}\) with cyclic covering transformation group, whose fibre-preserving automorphism group acts 2-arc-transitively. All these covers consist of one threefold covers of \(K_{6,6}\), one twofold cover of \(K_{12, 12}\) and one infinite family X(r, p) of p-fold covers of \(K_{p^r,p^r}\) with p a prime and r an integer such that \(p^r\ge 3\). This infinite family X(r, p) can be derived by a very simple and nice voltage assignment f as follows: \(X(r, p)=K_{p^r, p^r}\times _f \mathbb {Z}_p\), where \(K_{p^r, p^r}\) is a complete bipartite graph with the bipartition \(V=\{ \alpha \bigm |\alpha \in V(r,p)\}\cup \{ \alpha '\bigm |\alpha \in V(r,p)\}\) for the r-dimensional vector space V(r, p) over the field of order p and \(f_{\alpha ,\beta '}=\sum _{i=1}^ra_ib_i,\,\, \mathrm{for\,\,all}\,\,\alpha =(a_i)_r, \beta =(b_i)_r\in V(r,p)\). 相似文献
999.
In this paper, we consider the embedding relations between any two a-modulation spaces. Based on an observation that the a-modulation space with smaller a can be regarded as a corresponding decomposition space associated with a-covering for larger a, we give a complete characterization of the Fourier multipliers between a-modulation spaces with different a. Then we establish a full version of optimal embedding relations between a-modulation spaces. 相似文献
1000.
Let be a graph and let be a group of automorphisms of . The graph is called -normal if is normal in the automorphism group of . Let be a finite non-abelian simple group and let with . In this paper we prove that if every connected pentavalent symmetric -vertex-transitive graph is -normal, then every connected pentavalent symmetric -vertex-transitive graph is -normal. This result, among others, implies that every connected pentavalent symmetric -vertex-transitive graph is -normal except is one of 57 simple groups. Furthermore, every connected pentavalent symmetric -regular graph is -normal except is one of 20 simple groups, and every connected pentavalent -symmetric graph is -normal except is one of 17 simple groups. 相似文献