首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   334585篇
  免费   4204篇
  国内免费   1232篇
化学   183694篇
晶体学   4557篇
力学   13572篇
综合类   7篇
数学   40376篇
物理学   97815篇
  2020年   2211篇
  2019年   2217篇
  2018年   2178篇
  2017年   2042篇
  2016年   4281篇
  2015年   3588篇
  2014年   4826篇
  2013年   15050篇
  2012年   11608篇
  2011年   14492篇
  2010年   8857篇
  2009年   8837篇
  2008年   13329篇
  2007年   13562篇
  2006年   13192篇
  2005年   12107篇
  2004年   10878篇
  2003年   9556篇
  2002年   9369篇
  2001年   10403篇
  2000年   7971篇
  1999年   6346篇
  1998年   5126篇
  1997年   4986篇
  1996年   5076篇
  1995年   4579篇
  1994年   4364篇
  1993年   4174篇
  1992年   4656篇
  1991年   4499篇
  1990年   4187篇
  1989年   4033篇
  1988年   4340篇
  1987年   3958篇
  1986年   3843篇
  1985年   5568篇
  1984年   5683篇
  1983年   4553篇
  1982年   5046篇
  1981年   5072篇
  1980年   4811篇
  1979年   4933篇
  1978年   4940篇
  1977年   4889篇
  1976年   4838篇
  1975年   4727篇
  1974年   4574篇
  1973年   4736篇
  1972年   2684篇
  1971年   1955篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
Cognitive style refers to differences that can be perceived in individuals due to differing cognitive structures. There has been a large amount of research on how cognitive style affects managerial decision-making, particularly in the context of management information systems, but little or no attempt to relate these findings to operational research. This paper reviews the findings of cognitive-style research from the perspective of operational research, and draws a number of useful inferences concerning the matching of OR aids to managers, the presentation of information and recommendations, the use and acceptance of OR, and the structure of OR groups. Further, it is argued that cognitive-style findings help to give a justification to the move towards ‘soft’ approaches to analysis.  相似文献   
72.
Large fault-tolerant interconnection networks   总被引:5,自引:0,他引:5  
This paper deals with reliability and fault-tolerant properties of networks. We first survey general reliability properties of networks, in particular those concerning diameter vulnerability. Then we study in details reliability properties of some families of networks in particular de Bruijn and Kautz networks and their generalizations which appear as very good fault-tolerant networks.  相似文献   
73.
74.
This paper investigates the combinatorial and computational aspects of certain extremal geometric problems in two and three dimensions. Specifically, we examine the problem of intersecting a convex subdivision with a line in order to maximize the number of intersections. A similar problem is to maximize the number of intersected facets in a cross-section of a three-dimensional convex polytope. Related problems concern maximum chains in certain families of posets defined over the regions of a convex subdivision. In most cases we are able to prove sharp bounds on the asymptotic behavior of the corresponding extremal functions. We also describe polynomial algorithms for all the problems discussed.Bernard Chazelle wishes to acknowledge the National Science Foundation for supporting this research in part under Grant No. MCS83-03925. Herbert Edelsbrunner is pleased to acknowledge the support of Amoco Fnd. Fac. Dev. Comput. Sci. 1-6-44862.  相似文献   
75.
It is assumed that the probability of destruction of a biological asset by natural hazards can be reduced through investment in protection. Specifically a model, in which the hazard rate depends on both the age of the asset and the accumulated invested protection capital, is assumed. The protection capital depreciates through time and its effectiveness in reducing the hazard rate is subject to diminishing returns. It is shown how the investment schedule to maximize the expected net present value of the asset can be determined using the methods of deterministic optimal control, with the survival probability regarded as a state variable. The optimal investment pattern involves “bang-bang-singular” control. A numerical scheme for determining jointly the optimal investment policy and the optimal harvest (or replacement) age is outlined and a numerical example involving forest fire protection is given.  相似文献   
76.
The singular-perturbation expansion of the plasma cold-fluid equations for crossed fields in a planar geometry is presented. The general expansion is carried out to third order. Various instabilities that occur in the first, second, and third orders are discussed.  相似文献   
77.
Partially supported by the general research fund at the University of Kansas  相似文献   
78.
Selected experiences in the control of contamination and the threat it poses to the quality of analytical date are discussed in the context of the whole analytical process from collection of marine environmental samples, through handling and radiochemical separation, to the final interpretation of results. Examples include a demonstration of the contamination introduced during sediment core sectioning, contamination of sea water by a ship's pumping system, and the effect of filtration on the apparent partitioning of radionuclides between solid and liquid phases of sea water.  相似文献   
79.
Lithium (10–150 ng ml?1) in wine is determined by atomic absorption spectrometry by direct nebulization and after digestion with mixed acids. The results of methods are similar. Thirty-four wines from various Spanish provinces are analysed.  相似文献   
80.
We study matter-wave solitons in Bose-Einstein condensates of ultracold gaseous atoms with spin degrees of freedom and present a class of exact solutions based on the inverse scattering method. The one-soliton solutions are classified with respect to the spin states. We analyze collisional effects between solitons in the same or different spin state(s), which reveals a very interesting possibility: we can manipulate the spin dynamics by controlling the parameters of colliding solitons.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号