首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   43220篇
  免费   869篇
  国内免费   200篇
化学   24443篇
晶体学   273篇
力学   1385篇
综合类   9篇
数学   6467篇
物理学   11712篇
  2023年   223篇
  2022年   525篇
  2021年   651篇
  2020年   646篇
  2019年   562篇
  2018年   633篇
  2017年   548篇
  2016年   1017篇
  2015年   902篇
  2014年   1036篇
  2013年   1752篇
  2012年   2146篇
  2011年   2487篇
  2010年   1407篇
  2009年   1306篇
  2008年   2096篇
  2007年   2088篇
  2006年   1963篇
  2005年   2386篇
  2004年   2244篇
  2003年   1640篇
  2002年   1252篇
  2001年   1022篇
  2000年   930篇
  1999年   588篇
  1998年   507篇
  1997年   516篇
  1996年   618篇
  1995年   557篇
  1994年   531篇
  1993年   583篇
  1992年   538篇
  1991年   475篇
  1990年   385篇
  1989年   376篇
  1988年   370篇
  1987年   367篇
  1986年   313篇
  1985年   416篇
  1984年   393篇
  1983年   320篇
  1982年   357篇
  1981年   330篇
  1980年   314篇
  1979年   296篇
  1978年   325篇
  1977年   252篇
  1976年   256篇
  1974年   237篇
  1973年   217篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
A systematic study of the efficiency of protons, Ni, Pd and Th as chemical modifiers for the determination of cadmium by electrothermal atomic absorption spectrometry (ETAAS) using fast temperature programs was made for platform atomization. A comparison was made in terms of the salt type, absorbance-time profiles and elimination of the sodium chloride interference. The results were adapted to develop a method for the ETAAS determination of cadmium in biological and environmental samples. The highest sensitivity to determine cadmium in biological and environmental samples was obtained using nickel (together with protons) as a chemical modifier. The accuracy of the method was tested by the determination of cadmium in different certified reference materials. The best detection limit and the characteristic mass of Cd were found to be 0.03 ng mL(-1) and 0.35 pg, respectively.  相似文献   
112.
113.
114.
A Tandem Queue with Coupled Processors: Computational Issues   总被引:2,自引:0,他引:2  
In Resing and Örmeci [16] it is shown that the two-stage tandem queue with coupled processors can be solved using the theory of boundary value problems. In this paper we consider the issues that arise when calculating performance measures like the mean queue length and the fraction of time a station is empty. It is assumed that jobs arrive at the first station according to a Poisson process and require service at both stations before leaving the system. The amount of work that a job requires at each of the stations is an independent, exponentially distributed random variable. When both stations are nonempty, the total service capacity is shared among the stations according to fixed proportions. When one of the stations becomes empty, the total service capacity is given to the nonempty station. We study the two-dimensional Markov process representing the numbers of jobs at the two stations. The problem of finding the generating function of the stationary distribution can be reduced to two different Riemann-Hilbert boundary value problems, where both problems yield a complete analytical solution. We discuss the similarities and differences between the two problems, and relate them to the computational aspects of obtaining performance measures.  相似文献   
115.
We prove new Lindstr?m theorems for the basic modal propositional language, and for some related fragments of first-order logic. We find difficulties with such results for modal languages without a finite-depth property, high-lighting the difference between abstract model theory for fragments and for extensions of first-order logic. In addition we discuss new connections with interpolation properties, and the modal invariance theorem. Mathematics Subject Classification (2000): Primary 03B45; Secondary 03C95  相似文献   
116.
We implement a second-order exponential integrator for semidiscretized advection–diffusion–reaction equations, obtained by coupling exponential-like Euler and Midpoint integrators, and computing the relevant matrix exponentials by polynomial interpolation at Leja points. Numerical tests on 2D models discretized in space by finite differences or finite elements, show that the Leja–Euler–Midpoint (LEM) exponential integrator can be up to 5 times faster than a classical second-order implicit solver.  相似文献   
117.
Mixtures of colloidal silica spheres and polydimethylsiloxane in cyclohexane with a colloid-polymer size ratio of about one were found to phase separate into two fluid phases, one which is colloid-rich and one which is colloid-poor. In this work the phase separation kinetics of this fluid-fluid phase separation is studied for different compositions of the colloid-polymer mixtures, and at several degrees of supersaturation, with small angle light scattering and with light microscopy. The small angle light scattering curve exhibits a peak that grows in intensity and that shifts to smaller wave vector with time. The characteristic length scale that is obtained from the scattering peak is of the order of a few μm, in agreement with observations by light microscopy. The domain size increases with time as , which might be an indication of coarsening by diffusion and coalescence, like in the case of binary liquid mixtures and polymer blends. For sufficiently low degrees of supersaturation the angular scattering intensity curves satisfy dynamical scaling behavior.  相似文献   
118.
A Kind of direct methods is presented for the solution of optimal control problems with state constraints.These methods are sequential quadratic programming methods.At every iteration a quadratic programming which is obtained by quadratic approximation to Lagrangian function and Linear approximations to constraints is solved to get a search direction for a merit function.The merit function is formulated by augmenting the Lagrangian funetion with a penalty term.A line search is carried out along the search direction to determine a step length such that the merit function is decreased.The methods presented in this paper include continuous sequential quadratic programming methods and discreate sequential quadrade programming methods.  相似文献   
119.
120.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号