全文获取类型
收费全文 | 16387篇 |
免费 | 2504篇 |
国内免费 | 1814篇 |
专业分类
化学 | 11937篇 |
晶体学 | 197篇 |
力学 | 838篇 |
综合类 | 102篇 |
数学 | 1425篇 |
物理学 | 6206篇 |
出版年
2025年 | 7篇 |
2024年 | 179篇 |
2023年 | 333篇 |
2022年 | 584篇 |
2021年 | 701篇 |
2020年 | 787篇 |
2019年 | 784篇 |
2018年 | 583篇 |
2017年 | 486篇 |
2016年 | 794篇 |
2015年 | 731篇 |
2014年 | 884篇 |
2013年 | 1218篇 |
2012年 | 1391篇 |
2011年 | 1357篇 |
2010年 | 934篇 |
2009年 | 945篇 |
2008年 | 1055篇 |
2007年 | 946篇 |
2006年 | 855篇 |
2005年 | 760篇 |
2004年 | 620篇 |
2003年 | 528篇 |
2002年 | 570篇 |
2001年 | 396篇 |
2000年 | 291篇 |
1999年 | 303篇 |
1998年 | 250篇 |
1997年 | 221篇 |
1996年 | 201篇 |
1995年 | 164篇 |
1994年 | 140篇 |
1993年 | 109篇 |
1992年 | 107篇 |
1991年 | 102篇 |
1990年 | 70篇 |
1989年 | 56篇 |
1988年 | 39篇 |
1987年 | 31篇 |
1986年 | 35篇 |
1985年 | 37篇 |
1984年 | 22篇 |
1983年 | 17篇 |
1982年 | 14篇 |
1981年 | 17篇 |
1980年 | 9篇 |
1975年 | 6篇 |
1974年 | 6篇 |
1973年 | 5篇 |
1936年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
211.
Dong Dao-yi Chen Zong-hai Zhang Chen-bin Chen Chun-lin 《Frontiers of Physics in China》2006,1(3):256-262
Feedback is a significant strategy for the control of quantum system. Information acquisition is the greatest difficulty in
quantum feedback applications. After discussing several basic methods for information acquisition, we review three kinds of
quantum feedback control strategies: quantum feedback control with measurement, coherent quantum feedback, and quantum feedback
control based on cloning and recognition. The first feedback strategy can effectively acquire information, but it destroys
the coherence in feedback loop. On the contrary, coherent quantum feedback does not destroy the coherence, but the capability
of information acquisition is limited. However, the third feedback scheme gives a compromise between information acquisition
and measurement disturbance. 相似文献
212.
213.
We present a scheme for probabilistically teleporting an arbitrary unknown two-qubit state through a quantum channel made up of two nonidentical non-maximally entangled states. In this scheme, the probabilistic teleportation is realized by using a proper positive operator-valued measure instead of usual projective measurement. 相似文献
214.
We propose two new type sine hyperbolic potentials and . They may become single- or double-well potentials depending on the potential parameters and k. We find that its exact solutions can be written as the confluent Heun functions , in which the energy level E is involved inside the parameter η. The properties of the wave functions, which is strongly relevant for the potential parameters and k, are illustrated. 相似文献
215.
讨论了目前有关22Na(p,γ)23Mg反应的实验研究工作,结合兰州放射性束流线上的放射性束流23Al的β+延发质子衰变实验的测量结果,给出了23Al延发衰变的质子能谱,并比较了近期实验给出的相关能级的自旋、宇称值,正是由于这种自旋、宇称和能级部分宽度的不确定性,导致了反应率计算的不确定性.计算了同位旋相似态的共振强度.对于测量到的新的延发衰变能级Ed=8.916MeV,由于没有相应的能级宽度值,实验仅给出其相对共振强度值. 相似文献
216.
Shenmin Zhu Jingjing Guo Junping Dong Zhaowen Cui Tao Lu Chenglin Zhu Di Zhang Jun Ma 《Ultrasonics sonochemistry》2013,20(3):872-880
This study synthesized Fe3O4 nanoparticles of 30–40 nm by a sonochemical method, and these particles were uniformly dispersed on the reduced graphene oxide sheets (Fe3O4/RGO). The superparamagnetic property of Fe3O4/RGO was evidenced from a saturated magnetization of 30 emu/g tested by a sample-vibrating magnetometer. Based on the testing results, we proposed a mechanism of ultrasonic waves to explain the formation and dispersion of Fe3O4 nanoparticles on RGO. A biosensor was fabricated by modifying a glassy carbon electrode with the combination of Fe3O4/RGO and hemoglobin. The biosensor showed an excellent electrocatalytic reduction toward H2O2 at a wide, linear range from 4 × 10?6 to 1 × 10?3 M (R2 = 0.994) as examined by amperometry, and with a detection limit of 2 × 10?6 M. The high performance of H2O2 detection is attributed to the synergistic effect of the combination of Fe3O4 nanoparticles and RGO, promoting the electron transfer between the peroxide and electrode surface. 相似文献
217.
Sang Sub Kim Sun-Woo Choi Han Gil Na Dong Sub Kwak Yong Jung Kwon Hyoun Woo Kim 《Current Applied Physics》2013,13(3):526-532
ZnO–SnO2 branch–stem nanostructures were realized on a basis of a two-step process. In step 1, SnO2-stem nanowires were synthesized. In step 2, ZnO-branch nanowires were successfully grown on the SnO2-stem nanowires through a simple evaporation technique. We have pre-deposited thin Au layers on the surface of SnO2 nanowire stems and subsequently evaporated Zn powders on the nanowires. The ZnO branches, which sprouted from the SnO2 stems, had diameters in a range of 30–35 nm. As-synthesized branches were of single crystalline hexagonal ZnO structures. Since the branch tips were comprised of Au-containing nanoparticles, the Au-catalyzed vapor–liquid–solid growth mechanism was more likely to control the growth process of the ZnO branches. To test a potential use of ZnO–SnO2 branch–stem nanostructures in chemical gas sensors, their sensing performances with respect to NO2 gas were investigated, showing the promising potential in chemical gas sensors. 相似文献
218.
A fuzzy overlapping community is an important kind of overlapping community in which each node belongs to each community to different extents. It exists in many real networks but how to identify a fuzzy overlapping community is still a challenging task. In this work, the concept of local random walk and a new distance metric are introduced. Based on the new distance measurement, the dissimilarity index between each node of a network is calculated firstly. Then in order to keep the original node distance as much as possible, the network structure is mapped into low-dimensional space by the multidimensional scaling (MDS). Finally, the fuzzy c-means clustering is employed to find fuzzy communities in a network. The experimental results show that the proposed algorithm is effective and efficient to identify the fuzzy overlapping communities in both artificial networks and real-world networks. 相似文献
219.
220.
Yumin Dong Shufen Xiao Hongyang Ma Libo Chen 《International Journal of Theoretical Physics》2016,55(12):5106-5117
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods. 相似文献