首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8957篇
  免费   1348篇
  国内免费   710篇
化学   5947篇
晶体学   95篇
力学   583篇
综合类   42篇
数学   1085篇
物理学   3263篇
  2024年   22篇
  2023年   169篇
  2022年   300篇
  2021年   305篇
  2020年   371篇
  2019年   319篇
  2018年   287篇
  2017年   270篇
  2016年   433篇
  2015年   442篇
  2014年   482篇
  2013年   616篇
  2012年   806篇
  2011年   789篇
  2010年   549篇
  2009年   520篇
  2008年   589篇
  2007年   447篇
  2006年   463篇
  2005年   344篇
  2004年   278篇
  2003年   232篇
  2002年   185篇
  2001年   148篇
  2000年   153篇
  1999年   191篇
  1998年   165篇
  1997年   139篇
  1996年   151篇
  1995年   121篇
  1994年   101篇
  1993年   81篇
  1992年   85篇
  1991年   80篇
  1990年   50篇
  1989年   42篇
  1988年   41篇
  1987年   35篇
  1986年   29篇
  1985年   21篇
  1984年   20篇
  1983年   20篇
  1982年   11篇
  1981年   14篇
  1980年   9篇
  1977年   6篇
  1976年   10篇
  1975年   9篇
  1973年   8篇
  1972年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
We study smoothing properties for time-dependent Schrödinger equations , , with potentials which satisfy V(x)=O(|x|m) at infinity, m?2. We show that the solution u(t,x) is 1/m times differentiable with respect to x at almost all , and explain that this is the result of the fact that the sojourn time of classical particles with energy λ in arbitrary compact set is less than CTλ−1/m during [0,T] when λ is very large. We also show Strichartz's inequality with derivative loss for such potentials and give its application to nonlinear Schrödinger equations.  相似文献   
992.
A diffusive predator-prey model in heterogeneous environment   总被引:1,自引:0,他引:1  
In this paper, we demonstrate some special behavior of steady-state solutions to a predator-prey model due to the introduction of spatial heterogeneity. We show that positive steady-state solutions with certain prescribed spatial patterns can be obtained when the spatial environment is designed suitably. Moreover, we observe some essential differences of the behavior of our model from that of the classical Lotka-Volterra model that seem to arise only in the heterogeneous case.  相似文献   
993.
We prove that for large λ>0, the boundary blow-up problem
  相似文献   
994.
马尔可夫链模型在灾变预测中的应用   总被引:2,自引:0,他引:2  
利用马尔可夫链模型的原理预测灾变,以郑州市旱涝等级的预测作为实例,介绍了使用这种模型的方法与步骤,预测结果表明,利用马尔可夫链模型预测灾变是可行的。  相似文献   
995.
Let and be two idempotents on a Hilbert space. In 2005, J. Giol in [Segments of bounded linear idempotents on a Hilbert space, J. Funct. Anal. 229(2005) 405-423] had established that, if is invertible, then and are homotopic with In this paper, we have given a necessary and sufficient condition that where denotes the minimal number of segments required to connect not only from to , but also from to in the set of idempotents.

  相似文献   

996.
In this paper, we first present a learning algorithm for dynamic recurrent Elman neural networks based on a dissimilation particle swarm optimization. The proposed algorithm computes concurrently both the evolution of network structure, weights, initial inputs of the context units, and self-feedback coefficient of the modified Elman network. Thereafter, we introduce and discuss a novel control method based on the proposed algorithm. More specifically, a dynamic identifier is constructed to perform speed identification and a controller is designed to perform speed control for Ultrasonic Motors (USM). Numerical experiments show that the novel identifier and controller based on the proposed algorithm can both achieve higher convergence precision and speed than other state-of-the-art algorithms. In particular, our experiments show that the identifier can approximate the USM's nonlinear input–output mapping accurately. The effectiveness of the controller is verified using different kinds of speeds of constant, step, and sinusoidal types. Besides, a preliminary examination on a randomly perturbation also shows the robust characteristics of the two proposed models.  相似文献   
997.
Authentication and secrecy codes which provide both secrecy and authentication have been intensively studied in the case where there is no splitting; however the results concerning the case where there is splitting are far fewer. In this paper, we focus on the case with c-splitting, and obtain a bound on the number of encoding rules required in order to obtain maximum levels of security. A c-splitting authentication and secrecy code is called optimal if it obtains maximum levels of security and has the minimum number of encoding rules. We define a new design, called an authentication perpendicular multi-array, and prove that the existence of authentication perpendicular multi-arrays implies the existence of optimal c-splitting authentication and secrecy codes. Further, we study the constructions and existence of authentication perpendicular multi-arrays, and then obtain two new infinite classes of optimal c-splitting authentication and secrecy codes.  相似文献   
998.
In this paper, a complete classification is achieved of all the regular covers of the complete bipartite graphs \(K_{n,n}\) with cyclic covering transformation group, whose fibre-preserving automorphism group acts 2-arc-transitively. All these covers consist of one threefold covers of \(K_{6,6}\), one twofold cover of \(K_{12, 12}\) and one infinite family X(rp) of p-fold covers of \(K_{p^r,p^r}\) with p a prime and r an integer such that \(p^r\ge 3\). This infinite family X(rp) can be derived by a very simple and nice voltage assignment f as follows: \(X(r, p)=K_{p^r, p^r}\times _f \mathbb {Z}_p\), where \(K_{p^r, p^r}\) is a complete bipartite graph with the bipartition \(V=\{ \alpha \bigm |\alpha \in V(r,p)\}\cup \{ \alpha '\bigm |\alpha \in V(r,p)\}\) for the r-dimensional vector space V(rp) over the field of order p and \(f_{\alpha ,\beta '}=\sum _{i=1}^ra_ib_i,\,\, \mathrm{for\,\,all}\,\,\alpha =(a_i)_r, \beta =(b_i)_r\in V(r,p)\).  相似文献   
999.
In this paper, we consider the embedding relations between any two a-modulation spaces. Based on an observation that the a-modulation space with smaller a can be regarded as a corresponding decomposition space associated with a-covering for larger a, we give a complete characterization of the Fourier multipliers between a-modulation spaces with different a. Then we establish a full version of optimal embedding relations between a-modulation spaces.  相似文献   
1000.
Let Γ be a graph and let G be a group of automorphisms of Γ. The graph Γ is called G-normal if G is normal in the automorphism group of Γ. Let T be a finite non-abelian simple group and let G=Tl with l1. In this paper we prove that if every connected pentavalent symmetric T-vertex-transitive graph is T-normal, then every connected pentavalent symmetric G-vertex-transitive graph is G-normal. This result, among others, implies that every connected pentavalent symmetric G-vertex-transitive graph is G-normal except T is one of 57 simple groups. Furthermore, every connected pentavalent symmetric G-regular graph is G-normal except T is one of 20 simple groups, and every connected pentavalent G-symmetric graph is G-normal except T is one of 17 simple groups.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号