全文获取类型
收费全文 | 859篇 |
免费 | 14篇 |
国内免费 | 11篇 |
专业分类
化学 | 384篇 |
晶体学 | 5篇 |
力学 | 19篇 |
数学 | 350篇 |
物理学 | 126篇 |
出版年
2023年 | 8篇 |
2022年 | 22篇 |
2021年 | 45篇 |
2020年 | 11篇 |
2019年 | 14篇 |
2018年 | 21篇 |
2017年 | 20篇 |
2016年 | 44篇 |
2015年 | 21篇 |
2014年 | 29篇 |
2013年 | 76篇 |
2012年 | 61篇 |
2011年 | 55篇 |
2010年 | 44篇 |
2009年 | 30篇 |
2008年 | 56篇 |
2007年 | 44篇 |
2006年 | 33篇 |
2005年 | 42篇 |
2004年 | 34篇 |
2003年 | 20篇 |
2002年 | 19篇 |
2001年 | 11篇 |
2000年 | 11篇 |
1999年 | 9篇 |
1998年 | 9篇 |
1997年 | 5篇 |
1996年 | 13篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 6篇 |
1991年 | 11篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1976年 | 3篇 |
1974年 | 1篇 |
1932年 | 1篇 |
1928年 | 1篇 |
1927年 | 1篇 |
1920年 | 1篇 |
排序方式: 共有884条查询结果,搜索用时 0 毫秒
101.
A circular restricted three-body problem describes the motion of a test particle around two massive bodies in circular orbits. In this system, orbital decay caused by a gravitational radiation reaction between the two primary bodies is considered but the direct effect of gravitational radiation on the test particle is neglected. We adopt distance- and time-scale transformations to Newtonian problems so that systems without orbital decay will not depend on separation between the primaries but systems with orbital decay will depend on this separation. If a regular or chaotic orbit is given in a Newtonian system, the starting separation of the primaries varies according to the corresponding decay system. Thus, insights into the chaotic behaviour of a third body in a decay case are provided. For a large initial separation between the primaries, the chaos that exists in a Newtonian problem may be retained for a long enough time scale of dissipative evolution before the primaries coalesce. The final state of a third body is escape attributed to orbital decay. 相似文献
102.
Nikolaos A. Chrysochoidis Dimitris A. Saravanos 《International Journal of Solids and Structures》2007,44(25-26):8751-8768
A coupled linear layerwise laminate theory and a beam FE are formulated for analyzing delaminated composite beams with piezoactuators and sensors. The model assumes zig-zag fields for the axial displacements and the electric potential and it treats the discontinuities in the displacement fields due to the delaminations as additional degrees of freedom. The formulation naturally includes the excitation of piezoelectric actuators, their interactions with the composite laminate, and the effect of delamination on the predicted sensory voltage. The quasistatic and modal response of laminated composite Gr/Epoxy beams with active or sensory layers having various delamination sizes is predicted. The numerical results illustrate the strong effect of delamination on the sensor voltage, on through the thickness displacement and on the stress fields. Finally, the effect of delamination on modal frequencies and shapes are predicted and compared with previously obtained experimental results. 相似文献
103.
Green's functions for the field variables of a complete sphere subjected to normal surface traction are obtained with “free space” properties. Further, self-equilibrated singular solutions of the variables associated with tangentially applied point loads and concentrated surface moments are constructed. The solution formulae are derived within the framework of the improved theory of thin shells and thus incorporate the effect of transverse shear in the equilibrium of the shell element. Despite the complex character of the solution, expressed in terms of complex Legendre functions, the closed form of it reveals the effects of the new assumptions (presence of shear strains) onto the singular behavior of the associated kernels. Numerical results for the field variables demonstrate the differences between the two theories, classical and improved. 相似文献
104.
105.
C-H(ax)···Y(ax) contacts are a textbook prototype of steric hindrance in organic chemistry. The nature of these contacts is investigated in this work. MP2/6-31+G(d,p) calculations predicted the presence of improper hydrogen bonded C-H(ax)···Y(ax) contacts of different strength in substituted cyclohexane rings. To support the theoretical predictions with experimental evidence, several synthetic 2-substituted adamantane analogues (1-24) with suitable improper H-bonded C-H(ax)···Y(ax) contacts of different strength were used as models of a substituted cyclohexane ring. The (1)H NMR signal separation, Δδ(γ-CH(2)), within the cyclohexane ring γ-CH(2)s is raised when the MP2/6-31+G(d,p) calculated parameters, reflecting the strength of the H-bonded C-H(ax)···Y(ax) contact, are increased. In molecules with enhanced improper H-bonded contacts C-H(ax)···Y(ax), like those having sterically crowded contacts (Y(ax) = t-Bu) or contacts including considerable electrostatic attractions (Y(ax) = O-C or O═C) the calculated DFT steric energies of the γ-axial hydrogens are considerably reduced reflecting their electron cloud compression. The results suggest that the proton H(ax) electron cloud compression, caused by the C-H(ax)···Y(ax) contacts, and the resulting increase in Δδ(γ-CH(2)) value can be effected not just from van der Waals spheres compression, but more generally from electrostatic attraction forces and van der Waals repulsion, both of which are improper H-bonding components. 相似文献
106.
107.
Hisham Ali Jawad Ahmad Zakwan Jaroucheh Pavlos Papadopoulos Nikolaos Pitropakis Owen Lo Will Abramson William J. Buchanan 《Entropy (Basel, Switzerland)》2022,24(10)
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage. 相似文献
108.
BARON: A general purpose global optimization software package 总被引:1,自引:0,他引:1
Nikolaos V. Sahinidis 《Journal of Global Optimization》1996,8(2):201-205
109.
Four new stable addition compounds have been prepared by reaction of germanium tetraiodide with various tertiary amines. It is a case of adducts of 1:4 composition, in contrast to the 1:5 addition compound with triethylamine, which we have also prepared and investigated for comparison. Formation, properties, analytical results, conductometric measurements and spectral data (IR and1H-NMR) of these adducts are described and discussed in terms of possible structural types and the nature of the bonding. 相似文献
110.
Nikolaos S. Papageorgiou 《Rendiconti del Circolo Matematico di Palermo》1993,42(3):338-346
In this paper we consider a discrete-time, infinite horizon growth model for a multisector economy with an infinite dimensional commodity space, and we establish the existence of a weakly maximal optimal stationary program. 相似文献