首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28888篇
  免费   671篇
  国内免费   178篇
化学   19323篇
晶体学   243篇
力学   741篇
综合类   1篇
数学   4900篇
物理学   4529篇
  2021年   205篇
  2020年   253篇
  2019年   314篇
  2018年   260篇
  2017年   227篇
  2016年   491篇
  2015年   393篇
  2014年   502篇
  2013年   1456篇
  2012年   1324篇
  2011年   1651篇
  2010年   859篇
  2009年   690篇
  2008年   1520篇
  2007年   1552篇
  2006年   1574篇
  2005年   1539篇
  2004年   1346篇
  2003年   1136篇
  2002年   1114篇
  2001年   407篇
  2000年   332篇
  1999年   281篇
  1998年   330篇
  1997年   346篇
  1996年   424篇
  1995年   325篇
  1994年   312篇
  1993年   322篇
  1992年   303篇
  1991年   271篇
  1990年   253篇
  1989年   277篇
  1988年   296篇
  1987年   271篇
  1986年   266篇
  1985年   428篇
  1984年   487篇
  1983年   356篇
  1982年   476篇
  1981年   453篇
  1980年   373篇
  1979年   355篇
  1978年   383篇
  1977年   359篇
  1976年   321篇
  1975年   300篇
  1974年   293篇
  1973年   270篇
  1972年   157篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
11.
A set of exact conditions is compiled for the purpose of developing and testing approximations for the exchange-correlation energy as a functional of the electron density. Special emphasis is placed upon recently developed density-scaling relationships. Commonly used generalized gradient approximations are compared against several of these conditions. A direct tabular comparison of these functionals (not of calculated properties) with one another is also made. © 1994 John Wiley & Sons, Inc.  相似文献   
12.
Recursive algorithms for the computation of standard deviation and average deviation are derived and their applications in data acquisition are discussed. The relative speeds and accuracies of the two algorithms are compared for synthetic data. The performance of recursive estimation under shot and proportional noise limitations is also described. As an example of the utility of these algorithms, absorbance data with constant confidence intervals are collected regardless of incident and transmitted intensities. The desired precision is specified prior to data acquisition and used to control signal-averaging of the data in real time.  相似文献   
13.
A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication and provide protection for documents. Given the interest in watermark generation using chaotic functions a detailed study of one chaotic function for this purpose is performed. In this paper, we present an approach for the generation of watermarks using the logistic map. Using this function, in conjunction with seed management, it is possible to generate chaotic sequences that may be used to create highpass or lowpass digital watermarks. In this paper we provide a detailed study on the generation of optically detectable watermarks and we provide some guidelines on successful chaotic watermark generation using the logistic map, and show using a recently published scheme, how care must be taken in the selection of the function seed.  相似文献   
14.
The multilevel generalized assignment problem is a problem of assigning agents to tasks where the agents can perform tasks at more than one efficiency level. A profit is associated with each assignment and the objective of the problem is profit maximization. Two heuristic solution methods are presented for the problem. The heuristics are developed from solution methods for the generalized assignment problem. One method uses a regret minimization approach whilst the other method uses a repair approach on a relaxation of the problem. The heuristics are able to solve moderately large instances of the problem rapidly and effectively. Procedures for deriving an upper bound on the solution of the problem are also described. On larger and harder instances of the problem one heuristic is particularly effective.  相似文献   
15.
Multiple image encryption using an aperture-modulated optical system   总被引:2,自引:0,他引:2  
A multiple image cryptosystem based on different apertures in an optical set-up under a holographic arrangement is proposed. The system is a security architecture that uses different pupil aperture mask in the encoding lens to encrypt different images. Based on this approach multiple encryption is achieved by changing the pupil aperture arrangement of the optical system among exposures. In addition to the classical speckle phase mask, the geometrical parameters characterizing the apertures are introduced to increase the system security. Even when an illegal user steals the speckle phase mask, the system cannot be broken into without the correct pupil geometrical parameters. The experimental set-up is based on a volume photorefractive BSO crystal as storing device. Information retrieval is done via a phase conjugation operation. We also have to stress that the multiple storage under this scheme, is only possible with the help of the aperture mask. Simulation and experimental results are further introduced to verify the proposed method.  相似文献   
16.
For a ? R\alpha \in \mathbf{R}, the class of a-\alpha -order spherical harmonic functions in an open set W í\Omega \subseteq Sn-1\mathbf{S}^{n-1}, Ha(W)H^{\alpha }(\Omega ) is defined as the C2-C^{2}-solutions of Dau=0\Delta _{\alpha }u=0; where Da=Ds+a(n+a-2)\Delta _{\alpha }=\Delta _{s}+\alpha (n+\alpha -2) is the spherical Laplace--Beltrami operator of order a\alpha and Ds\Delta _{s} is the radially independent part of the Laplace operator. We obtain a Green's integral formula for the functions in Ha(W)H^{\alpha }(\Omega ) with kernel expressed as a Gegenbauer function. As generalizations, higher order spherical iterated Dirac operators are defined in a polynomial form. Integral representations of the null solutions to these operators and an intertwining formula relating these operators on the sphere and their analogues in Euclidean space are presented.  相似文献   
17.
Relying on reliability growth testing to improve system designis neither usually effective nor efficient. Instead it is importantto design in reliability. This requires models to estimate reliabilitygrowth in the design that can be used to assess whether goalreliability will be achieved within the target timescale forthe design process. Many models have been developed for analysisof reliability growth on test, but there has been much lessattention given to reliability growth in design. This paperdescribes and compares two models: one motivated by the practicalengineering process; the other by extending the reasoning ofstatistical reliability growth modelling. Both models are referencedin the recently revised edition of international standard IEC61164. However, there has been no reported evaluation of theirproperties. Therefore, this paper explores the commonalitiesand differences between these models through an assessment oftheir logic and their application to an industrial example.Recommendations are given for the use of reliability growthmodels to aid management of the design process and to informproduct development.  相似文献   
18.
In response to the bio-activity found in fluorine-containing 4-alkyl-3, 5-pyridinedicarboxylates, a series of novel 4-substituted derivatives, not directly available by Hantzsch sequences, were prepared. Starting 4-alkylpyridines, 1 , were converted via enamine 2 to materials 3–8 . Derivatives 9–16 in turn were derived from aldehyde 3 , while acid derivatives 28–36 were prepared from 14 . Addition of oxygen, sulfur, and carbenoids effected conversion of 4-allylpyridine 16 to epoxy and cyclopropyl derivative 16–22 . A number of neighboring group effects were noted, including those forming the fused-ring systems 23-27 .  相似文献   
19.
A proof is given of Witten's conjectures for the rigidity of the index of the Dirac-Ramond operator on the loop space of a spin manifold which admits anS 1 symmetry.Research supported in part by the National Science Foundation  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号