首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   859篇
  免费   14篇
  国内免费   11篇
化学   384篇
晶体学   5篇
力学   19篇
数学   350篇
物理学   126篇
  2023年   8篇
  2022年   22篇
  2021年   45篇
  2020年   11篇
  2019年   14篇
  2018年   21篇
  2017年   20篇
  2016年   44篇
  2015年   21篇
  2014年   29篇
  2013年   76篇
  2012年   61篇
  2011年   55篇
  2010年   44篇
  2009年   30篇
  2008年   56篇
  2007年   44篇
  2006年   33篇
  2005年   42篇
  2004年   34篇
  2003年   20篇
  2002年   19篇
  2001年   11篇
  2000年   11篇
  1999年   9篇
  1998年   9篇
  1997年   5篇
  1996年   13篇
  1995年   4篇
  1994年   6篇
  1993年   6篇
  1992年   6篇
  1991年   11篇
  1990年   4篇
  1989年   3篇
  1987年   4篇
  1986年   3篇
  1985年   5篇
  1984年   5篇
  1983年   5篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1976年   3篇
  1974年   1篇
  1932年   1篇
  1928年   1篇
  1927年   1篇
  1920年   1篇
排序方式: 共有884条查询结果,搜索用时 0 毫秒
101.
A circular restricted three-body problem describes the motion of a test particle around two massive bodies in circular orbits. In this system, orbital decay caused by a gravitational radiation reaction between the two primary bodies is considered but the direct effect of gravitational radiation on the test particle is neglected. We adopt distance- and time-scale transformations to Newtonian problems so that systems without orbital decay will not depend on separation between the primaries but systems with orbital decay will depend on this separation. If a regular or chaotic orbit is given in a Newtonian system, the starting separation of the primaries varies according to the corresponding decay system. Thus, insights into the chaotic behaviour of a third body in a decay case are provided. For a large initial separation between the primaries, the chaos that exists in a Newtonian problem may be retained for a long enough time scale of dissipative evolution before the primaries coalesce. The final state of a third body is escape attributed to orbital decay.  相似文献   
102.
A coupled linear layerwise laminate theory and a beam FE are formulated for analyzing delaminated composite beams with piezoactuators and sensors. The model assumes zig-zag fields for the axial displacements and the electric potential and it treats the discontinuities in the displacement fields due to the delaminations as additional degrees of freedom. The formulation naturally includes the excitation of piezoelectric actuators, their interactions with the composite laminate, and the effect of delamination on the predicted sensory voltage. The quasistatic and modal response of laminated composite Gr/Epoxy beams with active or sensory layers having various delamination sizes is predicted. The numerical results illustrate the strong effect of delamination on the sensor voltage, on through the thickness displacement and on the stress fields. Finally, the effect of delamination on modal frequencies and shapes are predicted and compared with previously obtained experimental results.  相似文献   
103.
Green's functions for the field variables of a complete sphere subjected to normal surface traction are obtained with “free space” properties. Further, self-equilibrated singular solutions of the variables associated with tangentially applied point loads and concentrated surface moments are constructed. The solution formulae are derived within the framework of the improved theory of thin shells and thus incorporate the effect of transverse shear in the equilibrium of the shell element. Despite the complex character of the solution, expressed in terms of complex Legendre functions, the closed form of it reveals the effects of the new assumptions (presence of shear strains) onto the singular behavior of the associated kernels. Numerical results for the field variables demonstrate the differences between the two theories, classical and improved.  相似文献   
104.
105.
C-H(ax)···Y(ax) contacts are a textbook prototype of steric hindrance in organic chemistry. The nature of these contacts is investigated in this work. MP2/6-31+G(d,p) calculations predicted the presence of improper hydrogen bonded C-H(ax)···Y(ax) contacts of different strength in substituted cyclohexane rings. To support the theoretical predictions with experimental evidence, several synthetic 2-substituted adamantane analogues (1-24) with suitable improper H-bonded C-H(ax)···Y(ax) contacts of different strength were used as models of a substituted cyclohexane ring. The (1)H NMR signal separation, Δδ(γ-CH(2)), within the cyclohexane ring γ-CH(2)s is raised when the MP2/6-31+G(d,p) calculated parameters, reflecting the strength of the H-bonded C-H(ax)···Y(ax) contact, are increased. In molecules with enhanced improper H-bonded contacts C-H(ax)···Y(ax), like those having sterically crowded contacts (Y(ax) = t-Bu) or contacts including considerable electrostatic attractions (Y(ax) = O-C or O═C) the calculated DFT steric energies of the γ-axial hydrogens are considerably reduced reflecting their electron cloud compression. The results suggest that the proton H(ax) electron cloud compression, caused by the C-H(ax)···Y(ax) contacts, and the resulting increase in Δδ(γ-CH(2)) value can be effected not just from van der Waals spheres compression, but more generally from electrostatic attraction forces and van der Waals repulsion, both of which are improper H-bonding components.  相似文献   
106.
107.
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage.  相似文献   
108.
109.
Four new stable addition compounds have been prepared by reaction of germanium tetraiodide with various tertiary amines. It is a case of adducts of 1:4 composition, in contrast to the 1:5 addition compound with triethylamine, which we have also prepared and investigated for comparison. Formation, properties, analytical results, conductometric measurements and spectral data (IR and1H-NMR) of these adducts are described and discussed in terms of possible structural types and the nature of the bonding.
  相似文献   
110.
In this paper we consider a discrete-time, infinite horizon growth model for a multisector economy with an infinite dimensional commodity space, and we establish the existence of a weakly maximal optimal stationary program.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号