首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14561篇
  免费   266篇
  国内免费   72篇
化学   8248篇
晶体学   104篇
力学   504篇
数学   2005篇
物理学   4038篇
  2022年   97篇
  2021年   116篇
  2020年   166篇
  2019年   112篇
  2018年   121篇
  2017年   92篇
  2016年   199篇
  2015年   214篇
  2014年   250篇
  2013年   530篇
  2012年   572篇
  2011年   728篇
  2010年   408篇
  2009年   360篇
  2008年   619篇
  2007年   676篇
  2006年   674篇
  2005年   701篇
  2004年   566篇
  2003年   452篇
  2002年   418篇
  2001年   410篇
  2000年   379篇
  1999年   230篇
  1998年   199篇
  1997年   192篇
  1996年   250篇
  1995年   230篇
  1994年   215篇
  1993年   256篇
  1992年   235篇
  1991年   217篇
  1990年   172篇
  1989年   179篇
  1988年   205篇
  1987年   186篇
  1986年   144篇
  1985年   194篇
  1984年   185篇
  1983年   138篇
  1982年   173篇
  1981年   153篇
  1980年   153篇
  1979年   152篇
  1978年   157篇
  1977年   120篇
  1976年   136篇
  1975年   102篇
  1974年   119篇
  1973年   97篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
A modified expansion-shock tube for nucleation and condensation studies in a supersaturated vapour is described. An analysis is made of the gas-dynamical properties of the new tube configuration and numerical simulations with the Random Choice Method are compared with experiments. It is shown that with the modified configuration one single nucleation pulse can be realized.  相似文献   
42.
43.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
44.
Three pyrrololactam alkaloids have been isolated from the marine sponge Phacellia fusca Schmidt collected from the South China Sea, and their structures were determined as 1–3 , on the grounds of spectral data. This is the first report of these compounds from this sponge. The structure of 1 was confirmed by X-ray analysis.  相似文献   
45.
46.
47.
A series of nucleon–nucleon bremsstrahlung (NNγ) experiments at 190 MeV incident beam energy have been performed at KVI in order to gain more insight into the dynamics governing the bremsstrahlung reaction. After initial measurements wherein the bremsstrahlung process was studied far away from the elastic limit, a new study was used to probe the process nearer to the elastic limit by measuring at lower photon energies. Measured cross sections and analyzing powers are compared with the predictions of a microscopic model and those of two soft-photon models. The theoretical calculations overestimate the data by up to ≈30%, for some kinematics.  相似文献   
48.
The ddµ molecule formation rate is experimentally measured for the two hyperfine states of the dµ-atom in the temperature range of 5–30 K. Results are consistent with a preliminary measurement by the TRIUMF group and contradict theoretical predictions. The work has been performed on the JINR phasotron (Dubna).  相似文献   
49.
A voting scheme assigns to each profile of alternatives reported byn individuals a compromise alternative. A voting scheme is strategy-proof if no individual is better off by lying, i.e., not reporting a best alternative. In this paper the main results concern the case where the set of alternatives is the Euclidean plane and the preferences are Euclidean. It is shown that for strategy-proof voting schemes continuity is equivalent to convexity of the range of the voting scheme. Using a result by Kim and Roush (1984), this leads to characterizations of surjective or unanimous, anonymous, strategy-proof voting schemes.Furthermore, the paper contains an extensive discussion of related results in the area.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号