全文获取类型
收费全文 | 43220篇 |
免费 | 869篇 |
国内免费 | 200篇 |
专业分类
化学 | 24443篇 |
晶体学 | 273篇 |
力学 | 1385篇 |
综合类 | 9篇 |
数学 | 6467篇 |
物理学 | 11712篇 |
出版年
2023年 | 223篇 |
2022年 | 525篇 |
2021年 | 651篇 |
2020年 | 646篇 |
2019年 | 562篇 |
2018年 | 633篇 |
2017年 | 548篇 |
2016年 | 1017篇 |
2015年 | 902篇 |
2014年 | 1036篇 |
2013年 | 1752篇 |
2012年 | 2146篇 |
2011年 | 2487篇 |
2010年 | 1407篇 |
2009年 | 1306篇 |
2008年 | 2096篇 |
2007年 | 2088篇 |
2006年 | 1963篇 |
2005年 | 2386篇 |
2004年 | 2244篇 |
2003年 | 1640篇 |
2002年 | 1252篇 |
2001年 | 1022篇 |
2000年 | 930篇 |
1999年 | 588篇 |
1998年 | 507篇 |
1997年 | 516篇 |
1996年 | 618篇 |
1995年 | 557篇 |
1994年 | 531篇 |
1993年 | 583篇 |
1992年 | 538篇 |
1991年 | 475篇 |
1990年 | 385篇 |
1989年 | 376篇 |
1988年 | 370篇 |
1987年 | 367篇 |
1986年 | 313篇 |
1985年 | 416篇 |
1984年 | 393篇 |
1983年 | 320篇 |
1982年 | 357篇 |
1981年 | 330篇 |
1980年 | 314篇 |
1979年 | 296篇 |
1978年 | 325篇 |
1977年 | 252篇 |
1976年 | 256篇 |
1974年 | 237篇 |
1973年 | 217篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
A systematic study of the efficiency of protons, Ni, Pd and Th as chemical modifiers for the determination of cadmium by electrothermal atomic absorption spectrometry (ETAAS) using fast temperature programs was made for platform atomization. A comparison was made in terms of the salt type, absorbance-time profiles and elimination of the sodium chloride interference. The results were adapted to develop a method for the ETAAS determination of cadmium in biological and environmental samples. The highest sensitivity to determine cadmium in biological and environmental samples was obtained using nickel (together with protons) as a chemical modifier. The accuracy of the method was tested by the determination of cadmium in different certified reference materials. The best detection limit and the characteristic mass of Cd were found to be 0.03 ng mL(-1) and 0.35 pg, respectively. 相似文献
112.
113.
114.
A Tandem Queue with Coupled Processors: Computational Issues 总被引:2,自引:0,他引:2
In Resing and Örmeci [16] it is shown that the two-stage tandem queue with coupled processors can be solved using the theory of boundary value problems. In this paper we consider the issues that arise when calculating performance measures like the mean queue length and the fraction of time a station is empty. It is assumed that jobs arrive at the first station according to a Poisson process and require service at both stations before leaving the system. The amount of work that a job requires at each of the stations is an independent, exponentially distributed random variable. When both stations are nonempty, the total service capacity is shared among the stations according to fixed proportions. When one of the stations becomes empty, the total service capacity is given to the nonempty station. We study the two-dimensional Markov process representing the numbers of jobs at the two stations. The problem of finding the generating function of the stationary distribution can be reduced to two different Riemann-Hilbert boundary value problems, where both problems yield a complete analytical solution. We discuss the similarities and differences between the two problems, and relate them to the computational aspects of obtaining performance measures. 相似文献
115.
Johan van Benthem 《Logica Universalis》2007,1(1):125-138
We prove new Lindstr?m theorems for the basic modal propositional language, and for some related fragments of first-order
logic. We find difficulties with such results for modal languages without a finite-depth property, high-lighting the difference
between abstract model theory for fragments and for extensions of first-order logic. In addition we discuss new connections
with interpolation properties, and the modal invariance theorem.
Mathematics Subject Classification (2000): Primary 03B45; Secondary 03C95 相似文献
116.
Marco Caliari Marco Vianello Luca Bergamaschi 《Journal of Computational and Applied Mathematics》2007,210(1-2):56-63
We implement a second-order exponential integrator for semidiscretized advection–diffusion–reaction equations, obtained by coupling exponential-like Euler and Midpoint integrators, and computing the relevant matrix exponentials by polynomial interpolation at Leja points. Numerical tests on 2D models discretized in space by finite differences or finite elements, show that the Leja–Euler–Midpoint (LEM) exponential integrator can be up to 5 times faster than a classical second-order implicit solver. 相似文献
117.
Nynke A. M. Verhaegh Jeroen S. van Duijneveldt Jan K. G. Dhont Henk N. W. Lekkerkerker 《Physica A》1996,230(3-4):409-436
Mixtures of colloidal silica spheres and polydimethylsiloxane in cyclohexane with a colloid-polymer size ratio of about one were found to phase separate into two fluid phases, one which is colloid-rich and one which is colloid-poor. In this work the phase separation kinetics of this fluid-fluid phase separation is studied for different compositions of the colloid-polymer mixtures, and at several degrees of supersaturation, with small angle light scattering and with light microscopy. The small angle light scattering curve exhibits a peak that grows in intensity and that shifts to smaller wave vector with time. The characteristic length scale that is obtained from the scattering peak is of the order of a few μm, in agreement with observations by light microscopy. The domain size increases with time as
, which might be an indication of coarsening by diffusion and coalescence, like in the case of binary liquid mixtures and polymer blends. For sufficiently low degrees of supersaturation the angular scattering intensity curves satisfy dynamical scaling behavior. 相似文献
118.
A Kind of direct methods is presented for the solution of optimal control problems with state constraints.These methods are sequential quadratic programming methods.At every iteration a quadratic programming which is obtained by quadratic approximation to Lagrangian function and Linear approximations to constraints is solved to get a search direction for a merit function.The merit function is formulated by augmenting the Lagrangian funetion with a penalty term.A line search is carried out along the search direction to determine a step length such that the merit function is decreased.The methods presented in this paper include continuous sequential quadratic programming methods and discreate sequential quadrade programming methods. 相似文献
119.
120.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献