首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16387篇
  免费   2504篇
  国内免费   1814篇
化学   11937篇
晶体学   197篇
力学   838篇
综合类   102篇
数学   1425篇
物理学   6206篇
  2025年   7篇
  2024年   179篇
  2023年   333篇
  2022年   584篇
  2021年   701篇
  2020年   787篇
  2019年   784篇
  2018年   583篇
  2017年   486篇
  2016年   794篇
  2015年   731篇
  2014年   884篇
  2013年   1218篇
  2012年   1391篇
  2011年   1357篇
  2010年   934篇
  2009年   945篇
  2008年   1055篇
  2007年   946篇
  2006年   855篇
  2005年   760篇
  2004年   620篇
  2003年   528篇
  2002年   570篇
  2001年   396篇
  2000年   291篇
  1999年   303篇
  1998年   250篇
  1997年   221篇
  1996年   201篇
  1995年   164篇
  1994年   140篇
  1993年   109篇
  1992年   107篇
  1991年   102篇
  1990年   70篇
  1989年   56篇
  1988年   39篇
  1987年   31篇
  1986年   35篇
  1985年   37篇
  1984年   22篇
  1983年   17篇
  1982年   14篇
  1981年   17篇
  1980年   9篇
  1975年   6篇
  1974年   6篇
  1973年   5篇
  1936年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
211.
Feedback is a significant strategy for the control of quantum system. Information acquisition is the greatest difficulty in quantum feedback applications. After discussing several basic methods for information acquisition, we review three kinds of quantum feedback control strategies: quantum feedback control with measurement, coherent quantum feedback, and quantum feedback control based on cloning and recognition. The first feedback strategy can effectively acquire information, but it destroys the coherence in feedback loop. On the contrary, coherent quantum feedback does not destroy the coherence, but the capability of information acquisition is limited. However, the third feedback scheme gives a compromise between information acquisition and measurement disturbance.  相似文献   
212.
基于光子数目比较的激光测距法   总被引:1,自引:0,他引:1  
提出了一种新颖的激光测距方法。该方法避开了传统激光测距法中使用复杂辅助电子设备对脉冲计时或比较相位差的过程,而主要通过光学手段分析和提取待测距离信息,最终通过比较大量光子数目的方法求得待测距离。并利用单轴晶体的双折射和全内双反射性质,用特殊结构的单块LiNbO3晶体设计了实施该方法的主体装置。结果表明,该激光测距法同目前普遍使用的激光测距法相比,不但简化了结构,而且有很高的测距精度,从而为激光测距开拓了一种新的思路。  相似文献   
213.
We present a scheme for probabilistically teleporting an arbitrary unknown two-qubit state through a quantum channel made up of two nonidentical non-maximally entangled states. In this scheme, the probabilistic teleportation is realized by using a proper positive operator-valued measure instead of usual projective measurement.  相似文献   
214.
We propose two new type sine hyperbolic potentials V(x)=a2sinh2?(x)?ktanh2?(x) and V(x)=c2sinh4?(x)?ktanh2?(x). They may become single- or double-well potentials depending on the potential parameters a,c and k. We find that its exact solutions can be written as the confluent Heun functions Hc(α,β,γ,δ,η;z), in which the energy level E is involved inside the parameter η. The properties of the wave functions, which is strongly relevant for the potential parameters a,c and k, are illustrated.  相似文献   
215.
讨论了目前有关22Na(p,γ)23Mg反应的实验研究工作,结合兰州放射性束流线上的放射性束流23Al的β+延发质子衰变实验的测量结果,给出了23Al延发衰变的质子能谱,并比较了近期实验给出的相关能级的自旋、宇称值,正是由于这种自旋、宇称和能级部分宽度的不确定性,导致了反应率计算的不确定性.计算了同位旋相似态的共振强度.对于测量到的新的延发衰变能级Ed=8.916MeV,由于没有相应的能级宽度值,实验仅给出其相对共振强度值.  相似文献   
216.
This study synthesized Fe3O4 nanoparticles of 30–40 nm by a sonochemical method, and these particles were uniformly dispersed on the reduced graphene oxide sheets (Fe3O4/RGO). The superparamagnetic property of Fe3O4/RGO was evidenced from a saturated magnetization of 30 emu/g tested by a sample-vibrating magnetometer. Based on the testing results, we proposed a mechanism of ultrasonic waves to explain the formation and dispersion of Fe3O4 nanoparticles on RGO. A biosensor was fabricated by modifying a glassy carbon electrode with the combination of Fe3O4/RGO and hemoglobin. The biosensor showed an excellent electrocatalytic reduction toward H2O2 at a wide, linear range from 4 × 10?6 to 1 × 10?3 M (R2 = 0.994) as examined by amperometry, and with a detection limit of 2 × 10?6 M. The high performance of H2O2 detection is attributed to the synergistic effect of the combination of Fe3O4 nanoparticles and RGO, promoting the electron transfer between the peroxide and electrode surface.  相似文献   
217.
ZnO–SnO2 branch–stem nanostructures were realized on a basis of a two-step process. In step 1, SnO2-stem nanowires were synthesized. In step 2, ZnO-branch nanowires were successfully grown on the SnO2-stem nanowires through a simple evaporation technique. We have pre-deposited thin Au layers on the surface of SnO2 nanowire stems and subsequently evaporated Zn powders on the nanowires. The ZnO branches, which sprouted from the SnO2 stems, had diameters in a range of 30–35 nm. As-synthesized branches were of single crystalline hexagonal ZnO structures. Since the branch tips were comprised of Au-containing nanoparticles, the Au-catalyzed vapor–liquid–solid growth mechanism was more likely to control the growth process of the ZnO branches. To test a potential use of ZnO–SnO2 branch–stem nanostructures in chemical gas sensors, their sensing performances with respect to NO2 gas were investigated, showing the promising potential in chemical gas sensors.  相似文献   
218.
A fuzzy overlapping community is an important kind of overlapping community in which each node belongs to each community to different extents. It exists in many real networks but how to identify a fuzzy overlapping community is still a challenging task. In this work, the concept of local random walk and a new distance metric are introduced. Based on the new distance measurement, the dissimilarity index between each node of a network is calculated firstly. Then in order to keep the original node distance as much as possible, the network structure is mapped into low-dimensional space by the multidimensional scaling (MDS). Finally, the fuzzy cc-means clustering is employed to find fuzzy communities in a network. The experimental results show that the proposed algorithm is effective and efficient to identify the fuzzy overlapping communities in both artificial networks and real-world networks.  相似文献   
219.
220.
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号