首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30536篇
  免费   762篇
  国内免费   394篇
化学   18443篇
晶体学   207篇
力学   941篇
综合类   31篇
数学   4091篇
物理学   7979篇
  2022年   278篇
  2021年   331篇
  2020年   389篇
  2019年   323篇
  2018年   313篇
  2017年   248篇
  2016年   603篇
  2015年   587篇
  2014年   680篇
  2013年   1376篇
  2012年   1293篇
  2011年   1541篇
  2010年   996篇
  2009年   900篇
  2008年   1368篇
  2007年   1464篇
  2006年   1320篇
  2005年   1358篇
  2004年   1214篇
  2003年   1080篇
  2002年   1054篇
  2001年   872篇
  2000年   787篇
  1999年   550篇
  1998年   428篇
  1997年   402篇
  1996年   472篇
  1995年   464篇
  1994年   444篇
  1993年   438篇
  1992年   412篇
  1991年   392篇
  1990年   366篇
  1989年   330篇
  1988年   343篇
  1987年   325篇
  1986年   269篇
  1985年   411篇
  1984年   428篇
  1983年   303篇
  1982年   358篇
  1981年   305篇
  1980年   310篇
  1979年   298篇
  1978年   279篇
  1977年   289篇
  1976年   285篇
  1975年   223篇
  1974年   231篇
  1973年   214篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
112.
A Tandem Queue with Coupled Processors: Computational Issues   总被引:2,自引:0,他引:2  
In Resing and Örmeci [16] it is shown that the two-stage tandem queue with coupled processors can be solved using the theory of boundary value problems. In this paper we consider the issues that arise when calculating performance measures like the mean queue length and the fraction of time a station is empty. It is assumed that jobs arrive at the first station according to a Poisson process and require service at both stations before leaving the system. The amount of work that a job requires at each of the stations is an independent, exponentially distributed random variable. When both stations are nonempty, the total service capacity is shared among the stations according to fixed proportions. When one of the stations becomes empty, the total service capacity is given to the nonempty station. We study the two-dimensional Markov process representing the numbers of jobs at the two stations. The problem of finding the generating function of the stationary distribution can be reduced to two different Riemann-Hilbert boundary value problems, where both problems yield a complete analytical solution. We discuss the similarities and differences between the two problems, and relate them to the computational aspects of obtaining performance measures.  相似文献   
113.
We consider a SOS type model of interfaces on a substrate which is both heterogeneous and rough. We first show that, for appropriate values of the parameters, the differential wall tension that governs wetting on such a substrate satisfies a generalized law which combines both Cassie and Wenzel laws. Then in the case of an homogeneous substrate, we show that this differential wall tension satisfies either the Wenzel's law or the Cassie's law, according to the values of the parameters.  相似文献   
114.
Control of light intensity and colour are two of the major features required in the realization of smart windows. We designed a bi-functional polymer dispersed liquid crystal (PDLC) film in order to satisfy such requirements, i.e. it is able both to modulate the optical transmission, if an external electric field is applied, and to change colour if exposed to sunlight. A monomer/liquid crystal mixture was doped with a small amount of photochromic material and homeotropically aligned by means of rough surfaces. A transparent and pale pink coloured film was achieved after photopolymerization. Such a film changes colour upon exposure for some seconds to sunlight or ultraviolet radiation in a persistent but reversible manner. In addition, the film appears transparent without the application of an electric field (OFF state) and becomes opaque on application of a driving voltage of about 75 V (ON state), and thus the film operates in reverse mode with respect to conventional PDLCs.  相似文献   
115.
We prove new Lindstr?m theorems for the basic modal propositional language, and for some related fragments of first-order logic. We find difficulties with such results for modal languages without a finite-depth property, high-lighting the difference between abstract model theory for fragments and for extensions of first-order logic. In addition we discuss new connections with interpolation properties, and the modal invariance theorem. Mathematics Subject Classification (2000): Primary 03B45; Secondary 03C95  相似文献   
116.
Mixtures of colloidal silica spheres and polydimethylsiloxane in cyclohexane with a colloid-polymer size ratio of about one were found to phase separate into two fluid phases, one which is colloid-rich and one which is colloid-poor. In this work the phase separation kinetics of this fluid-fluid phase separation is studied for different compositions of the colloid-polymer mixtures, and at several degrees of supersaturation, with small angle light scattering and with light microscopy. The small angle light scattering curve exhibits a peak that grows in intensity and that shifts to smaller wave vector with time. The characteristic length scale that is obtained from the scattering peak is of the order of a few μm, in agreement with observations by light microscopy. The domain size increases with time as , which might be an indication of coarsening by diffusion and coalescence, like in the case of binary liquid mixtures and polymer blends. For sufficiently low degrees of supersaturation the angular scattering intensity curves satisfy dynamical scaling behavior.  相似文献   
117.
A modified expansion-shock tube for nucleation and condensation studies in a supersaturated vapour is described. An analysis is made of the gas-dynamical properties of the new tube configuration and numerical simulations with the Random Choice Method are compared with experiments. It is shown that with the modified configuration one single nucleation pulse can be realized.  相似文献   
118.
119.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号