全文获取类型
收费全文 | 783篇 |
免费 | 17篇 |
国内免费 | 5篇 |
专业分类
化学 | 510篇 |
晶体学 | 7篇 |
力学 | 37篇 |
数学 | 68篇 |
物理学 | 183篇 |
出版年
2020年 | 10篇 |
2019年 | 9篇 |
2018年 | 6篇 |
2016年 | 15篇 |
2015年 | 11篇 |
2014年 | 9篇 |
2013年 | 27篇 |
2012年 | 38篇 |
2011年 | 28篇 |
2010年 | 20篇 |
2009年 | 11篇 |
2008年 | 44篇 |
2007年 | 45篇 |
2006年 | 50篇 |
2005年 | 42篇 |
2004年 | 43篇 |
2003年 | 29篇 |
2002年 | 28篇 |
2001年 | 15篇 |
2000年 | 21篇 |
1999年 | 21篇 |
1998年 | 15篇 |
1997年 | 5篇 |
1996年 | 17篇 |
1995年 | 9篇 |
1994年 | 12篇 |
1993年 | 12篇 |
1992年 | 7篇 |
1990年 | 7篇 |
1989年 | 10篇 |
1988年 | 10篇 |
1986年 | 5篇 |
1985年 | 11篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1980年 | 4篇 |
1979年 | 9篇 |
1978年 | 5篇 |
1977年 | 12篇 |
1976年 | 6篇 |
1975年 | 13篇 |
1974年 | 8篇 |
1973年 | 10篇 |
1972年 | 6篇 |
1970年 | 5篇 |
1968年 | 10篇 |
1967年 | 4篇 |
1966年 | 4篇 |
1965年 | 4篇 |
排序方式: 共有805条查询结果,搜索用时 707 毫秒
91.
92.
Harry Donald Brooke Jenkins Kenneth Frank Pratt 《Journal of Physics and Chemistry of Solids》1977,38(6):573-579
The opportunity to test a new equation for the computation of the lattice energy and at the same time examine a disparity in the literature data for the enthalpy of formation of the azide ion, was the motivation for this study. The results confirm our earlier calculation and show the new equation to be reliable. Thermodynamic data produced in the study take values: ΔHθhyd(N3?) = ?315 KJ mol?1 or ΔHθhyd(N3?) = ?295 KJ mol?1UPOT(NaN3) = 732 kJ mol?1UPOT(KN3) = 659 kJ mol?1UPOT(RbN3) = 637 kJ mol?1UPOT(CsN3) = 612 kJ mol?1UPOT(TIN3) = 689 kJ mol?1. The lattice energies of azides whose enthalpies of formation are documented have been calculated as well as the enthalpy of formation of the azide radical. 相似文献
93.
94.
95.
96.
97.
A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presentedMost of this work was done while he was with Rome CryptoDesign Center, Gemplus, Italy 相似文献
98.
The motion of a holonomic scleronomic non-conservative mechanicalsystem with minimal dissipation is considered. As applicationsof the theory several problems are studied in detail. 相似文献
99.
A. D. Jenkins 《国际流体数值方法杂志》1983,3(1):61-70
From the linearized, time-independent, constant depth, shallow water tidal equations in an f-plane for a two-layer estuary, two independent modal Helmholtz equations are derived. These modal equations are solved using a fifth-degree finite element technique. The first and second space derivatives of the complex modal tidal elevations, and thus the modal currents and their first derivatives, are evaluated directly from the solution at each node of the finite element mesh. The Stokes drift, which is the major part of the residual tidal flow, is evaluated from these nodal values of the currents and their derivatives. Good agreement is obtained with the exact analytical solution for a wedge-shaped estuary with a wedge angle of π/3, using a mesh of 64 equilateral triangles with sides approximately 1/10 of the wavelength 2πC2/σ of a Kelvin wave solution for the short-wavelength mode. 相似文献
100.