首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1374篇
  免费   26篇
  国内免费   5篇
化学   972篇
晶体学   11篇
力学   16篇
数学   54篇
物理学   352篇
  2023年   7篇
  2022年   10篇
  2021年   15篇
  2020年   11篇
  2019年   22篇
  2017年   11篇
  2016年   15篇
  2015年   12篇
  2014年   22篇
  2013年   85篇
  2012年   40篇
  2011年   52篇
  2010年   27篇
  2009年   39篇
  2008年   67篇
  2007年   63篇
  2006年   55篇
  2005年   49篇
  2004年   47篇
  2003年   65篇
  2002年   51篇
  2001年   32篇
  2000年   46篇
  1999年   31篇
  1998年   21篇
  1997年   21篇
  1996年   16篇
  1995年   10篇
  1994年   21篇
  1993年   15篇
  1992年   41篇
  1991年   20篇
  1990年   19篇
  1989年   21篇
  1988年   25篇
  1987年   26篇
  1986年   18篇
  1985年   28篇
  1984年   22篇
  1983年   13篇
  1982年   13篇
  1981年   19篇
  1980年   14篇
  1979年   28篇
  1978年   22篇
  1977年   13篇
  1976年   11篇
  1975年   12篇
  1974年   13篇
  1973年   20篇
排序方式: 共有1405条查询结果,搜索用时 875 毫秒
141.
We study relations between induced subgraphs and (n,m)-subposets. Using properties of (n,m)-subposets, we consider a characterization of chordal double bound graphs in terms of forbidden subposets. Furthermore, we deal with properties of a poset whose double bound graph is isomorphic to its upper bound graph or its comparability graph, etc.  相似文献   
142.
It has been proven that the code lengths of Tardos’s collusion-secure fingerprinting codes are of theoretically minimal order with respect to the number of adversarial users (pirates). However, the code lengths can be further reduced as some preceding studies have revealed. In this article we improve a recent discrete variant of Tardos’s codes, and give a security proof of our codes under an assumption weaker than the original Marking Assumption. Our analysis shows that our codes have significantly shorter lengths than Tardos’s codes. For example, when c = 8, our code length is about 4.94% of Tardos’s code in a practical setting and about 4.62% in a certain limit case. Our code lengths for large c are asymptotically about 5.35% of Tardos’s codes. A part of this work was presented at 17th Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17), Bangalore, India, December 16–20, 2007.  相似文献   
143.
144.
Poly[acryloyl-L-valine (ALV)] microspheres containing peroxy ester groups were prepared by radical copolymerization of ALV with a small amount of di-tert-butyl peroxyfumarate. When the microspheres were irradiated in the presence of second vinyl monomers, long-lived propagating radicals of the second monomers were formed in the microspheres by the reaction of microsphere polymer radicals with the monomers. The presence of a minute quantity of ethyl alcohol served to soften the microspheres and made the polymer radicals more mobile in the microspheres. As a result, sharper ESR spectra of the propagating radicals were observed although their lifetimes became shorter. This microsphere method also yielded easily the stable propagating radicals of a-methylstyrene and 1,1-diphenylethylene which have no homopolymerizability in usual radical polymerization. When N-n-propyldimethacroylamide and N,N′-dimethyl-N,N′-dimethacroylhydrazine, which undergo cyclopolymerization, were used as second monomer, uncyclized polymer radicals were only observed. Some discussions were given on the propagation mechanism of the cyclopolymerization.  相似文献   
145.
On January 21, 2003, an explosion occurred while ion exchange resin (IER) was being used to separate impurities from uranium solution. To clarify the cause of the accident and go/no-go criteria of the explosion, elemental analysis of the IER, DSC analysis, and SIKAREX analysis (a screening tool for runaway reactions) were performed. Finally, experiments on the same scale as the accident were conducted in an explosion chamber. When HClO4 was added to IER-NO3, the IER violently exploded without any heating nor metal ions such as uranium. It was confirmed that the accident was caused by an incorrect procedure in the chemical process. From the standpoint of explosion safety, IER-NO3 in particular should be kept away from perchloric acid in the laboratory.  相似文献   
146.
The second-harmonic generation of a cyanine dye in an LB film was investigated by varying the incident angle of the excitation laser. There was a clear dependence on the incident angle, which was simulated by a simple model. Thus, a highly sensitive determination should be carried out at such an angle where the efficiency of the second-harmonic generation shows its maximum.  相似文献   
147.
The main absorption site of ethyl 2-chloro-3-[4-(2-methyl-2-phenylpropyloxy)phenyl]propionate (AL-294) in rats was the upper portion of the small intestine. Both AL-294 and AL-294 acid (2-chloro-3-[4-(2-methyl-2-phenylpropyloxy)phenyl]propionic acid), a hydrolyzed form of AL-294, were absorbed in a smaller quantity under the bile fistula condition (pancreatic juice and bile were excluded). Compared with the absorption of AL-294 as an emulsion under the sham operation condition, the absorption of AL-294 as the emulsion decreased under the condition where only pancreatic juice was excluded. The bioavailability under this condition was very similar to that under the bile fistula condition, whereas the absorption of AL-294 acid did not decrease when the pancreatic juice was excluded. From these results, the absorption mechanism of AL-294 is considered as follows: AL-294 was hydrolyzed to AL-294 acid by lipase in pancreatic juice, then AL-294 acid was solubilized with bile salts to form mixed micelles in the intestinal lumen. AL-294 acid from this form was easily absorbed into the systemic circulation. Absorption of AL-294 increased when the particle size of the emulsion was smaller. The reason was assumed to be that the smaller particle size offered the greater oil-water interface for lipase activity against AL-294.  相似文献   
148.
149.
150.
For a poset P=(X,≤P), the double bound graph (DB-graph) of P is the graph DB(P)=(X,EDB(P)), where xyEDB(P) if and only if xy and there exist n,mX such that nPx,yPm. We obtain that for a subposet Q of a poset P,Q is an (n, m)-subposet of P if and only if DB(Q) is an induced subgraph DB(P). Using this result, we show some characterizations of split double bound graphs, threshold double bound graphs and difference double bound graphs in terms of (n, m)-subposets and double canonical posets.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号