首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   6篇
  国内免费   3篇
化学   196篇
晶体学   2篇
力学   26篇
数学   68篇
物理学   129篇
  2022年   5篇
  2021年   5篇
  2020年   9篇
  2019年   2篇
  2018年   4篇
  2016年   12篇
  2015年   5篇
  2014年   12篇
  2013年   14篇
  2012年   16篇
  2011年   22篇
  2010年   15篇
  2009年   10篇
  2008年   19篇
  2007年   23篇
  2006年   14篇
  2005年   14篇
  2004年   11篇
  2003年   13篇
  2002年   11篇
  2001年   9篇
  2000年   15篇
  1999年   8篇
  1998年   9篇
  1997年   10篇
  1996年   14篇
  1995年   3篇
  1994年   4篇
  1993年   6篇
  1992年   10篇
  1991年   8篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   11篇
  1986年   4篇
  1985年   11篇
  1984年   6篇
  1983年   8篇
  1982年   12篇
  1981年   7篇
  1980年   2篇
  1979年   2篇
  1978年   3篇
  1977年   2篇
  1976年   2篇
  1975年   2篇
  1973年   1篇
  1972年   1篇
  1963年   1篇
排序方式: 共有421条查询结果,搜索用时 15 毫秒
61.
We report on the study of direct amplification of femtosecond pulses in an 80 mum core diameter microstructured Yb-doped rod-type fiber amplifier in the nonlinear regime. The system includes a compact single grating compressor for the compensation of the small dispersion in the amplifier. With a 1250 line/mm (l/mm) grating-based compressor, pulses as short as 49 fs with 870 nJ pulse energy and 12 MW peak power are obtained. Alternatively, the use of a 1740 l/mm grating allows the production of higher quality pulses of 70 fs, 1.25 microJ pulse energy, and 16 MW peak power.  相似文献   
62.
Let Y and Z be two fixed topological spaces and C(Y, Z) the set of all continuous maps from Y into Z. We construct and study topologies on C(Y, Z) that we call Fn(τn)-family-open topologies. Furthermore, we find necessary and su?cient conditions such that these topologies to be splitting and jointly continuous. Finally, we present questions concerning a further study on this area.  相似文献   
63.
We investigate the solutions of Nambu–Goto-type actions associated with calibrations. We determine the supersymmetry preserved by these solutions using the contact set of the calibration and examine their bulk interpretation as intersecting branes. We show that the supersymmetry preserved by such solutions is closely related to the spinor singlets of the subgroup G of Spin (9,1) or Spin (10,1) that rotates the tangent spaces of the brane. We find that the supersymmetry projections of the worldvolume solutions are precisely those of the associated bulk configurations. We also investigate the supersymmetric solutions of a Born–Infeld action. We show that in some cases this problem again reduces to counting spinor singlets of a subgroup of Spin (9,1) acting on the associated spinor representations. We also find new worldvolume solutions which preserve 1/8 of the supersymmetry of the bulk and give their bulk interpretation. Received: 20 May 1998 / Accepted: 16 November 1998  相似文献   
64.
We study the evolution, the transverse spreadingand the subsequent thermalization of string states inthe Weyl static axisymmetric spacetime. This possessesa singular event horizon on the symmetry axis and a naked singularity along the otherdirections. The branching diffusion process of stringbits approaching the singular black-hole horizonprovides the notion of the temperature that iscalculated for this process. We find that the solution of theFokker-Planck equation in the phase space of thetransverse variables of the string, can be factored asa product of two thermal distributions, provided that the classical conjugate variables satisfy theuncertainty principle. We comment on the possiblephysical significance of this result.  相似文献   
65.
66.
The reaction of Fe(III) with the substituted salicylaldehydes [X-saloH, where X = 3-OCH3 (L 1 ), 5-CH3 (L 2 ), 5-Cl (L 3 ), 5-NO2 (L 4 )] led to the formation of four new iron(III) hetero-heptanuclear complexes (Fe–Na) under the general formula [Fe2(X-salo)8Νa5] · 3OH · zH2Ο. The two different coordination modes of the ligand, as well as the geometry around the metal ions were deduced by X-ray structure analysis of compound 1, [Fe2(3-OCH3-salo)8Νa5] · 3OH · 8H2Ο. The complexes have also been characterized by physicochemical and spectroscopic (IR, UV–Vis, Mössbauer) methods.  相似文献   
67.
This paper examines a model of a serial flow line with two workstations and an intermediate buffer. Each workstation consists of multiple unreliable parallel machines which are not necessarily identical, viz., the processing times, failure times and repair times of the parallel machines at each workstation are assumed to be exponentially distributed with non-identical mean rates. The system under consideration is solved via exact Markovian analysis. More specifically, a recursive algorithm that generates the transition matrix for any value of the intermediate buffer capacity is developed and all possible transition equations are derived and solved analytically. Once the transition equations are solved the performance measures of the model under consideration can be easily evaluated. This model may be used as a decomposition block for solving larger flow lines with parallel unreliable machines at each workstation.  相似文献   
68.
This study illustrates the entrapment of the dye molecule fluorescein sodium salt (FSS) by hydrogel nanoparticles, which are in turn confined inside a water-in-oil-in-water double-emulsion globule, and its subsequent release by the action of the competing agent hydrochloric acid (HCl). Thus, a "double carrier" concept is being introduced in which a nanoscale delivery vehicle is being transported by a microscale delivery vehicle in order to simultaneously take advantage of both systems. This may facilitate storage and handling while protecting the active substance and improving its action upon application.  相似文献   
69.
An efficient model reduction based methodology is presented for predicting the global (impact force, plate deflection and electric potential) and through-thickness local (interfacial strains and stresses) dynamic response of pristine simply-supported cross-ply composite and sandwich composite plates with piezoelectric sensory layers subjected to low-energy impact. The through-thickness response of the laminate is modelled using coupled higher-order layerwise displacement-based piezoelectric laminate theories. Linearized contact laws are implemented for simulating the impactor–target interaction during impact. The stiffness, mass, piezoelectric and permittivity matrices of the plate are formulated from ply to structural level and reduced by applying a Guyan reduction technique to yield the structural system in state space. This reduction technique enables the formulation of a plate–impactor structural system of minimum size (1 term per vibration mode for composite plates – 2 terms for sandwich plates) and reduces computational cost, thus facilitating applicability for real-time impact and vibration control.  相似文献   
70.
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号