首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30157篇
  免费   4057篇
  国内免费   2713篇
化学   20509篇
晶体学   284篇
力学   1945篇
综合类   273篇
数学   3286篇
物理学   10630篇
  2024年   105篇
  2023年   589篇
  2022年   907篇
  2021年   1011篇
  2020年   1112篇
  2019年   1082篇
  2018年   912篇
  2017年   813篇
  2016年   1279篇
  2015年   1268篇
  2014年   1537篇
  2013年   2049篇
  2012年   2631篇
  2011年   2657篇
  2010年   1647篇
  2009年   1633篇
  2008年   1736篇
  2007年   1659篇
  2006年   1493篇
  2005年   1228篇
  2004年   940篇
  2003年   792篇
  2002年   751篇
  2001年   561篇
  2000年   560篇
  1999年   652篇
  1998年   580篇
  1997年   574篇
  1996年   661篇
  1995年   508篇
  1994年   464篇
  1993年   388篇
  1992年   371篇
  1991年   322篇
  1990年   256篇
  1989年   202篇
  1988年   158篇
  1987年   137篇
  1986年   127篇
  1985年   118篇
  1984年   88篇
  1983年   61篇
  1982年   41篇
  1981年   36篇
  1980年   18篇
  1978年   19篇
  1977年   23篇
  1976年   20篇
  1975年   28篇
  1974年   27篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
This article proposes an innovative quantum private comparison (QPC) protocol for n users using GHZ states, where an almost-dishonest third party (TP) is introduced to assist the participants for comparing their secrets. It is argued that as compared to the existing QPC protocols our proposed scheme has some considerable advantages. First, in the existing QPC protocols, the TP can only to determine whether all participants’ secrets are equal or not. Instead of that, in our proposed scheme a TP can even compare the secrets between any subsects of users. Second, since our proposed scheme is based on GHZ state; hence it can ensure higher efficiency as compared to other existing multi-party QPC protocols on d-dimension photons.  相似文献   
972.
Wang et al. (J Operat Res Soc 62: 1898–1902, 2011) studied the m identical parallel-machine and unrelated parallel-machine scheduling with a deteriorating maintenance activity to minimize the total completion time. They showed that each problem can be solved in O(n 2m+3) time, where n is the number of jobs. In this note, we discuss the unrelated parallel-machine setting and show that the problem can be optimally solved by a lower order algorithm.  相似文献   
973.
利用神光Ⅱ装置上搭建的用于激光冲击波实验的温度诊断系统(该系统包括高时空分辨的扫描高温计和谱时分辨的扫描高温计),以强激光加载铝材料冲击温度的测量,获得了铝材料冲击高温辐射发光谱的高时空分辨信号图像,结合灰体辐射理论模型,计算得到了冲击波速度19.06 km/s时铝材料的冲击温度达2.95 eV,该温度与SESAME库中冲击温度接近。研究结果表明采用该测温系统能够有效诊断金属材料的冲击温度,为后续进一步获取金属材料冲击温度数据奠定了基础。  相似文献   
974.
中国工程物理研究院流体物理研究所研发的介质壁直线加速器是基于固态脉冲形成线、GaAs光导开关和高梯度绝缘介质壁三项关键技术的新型直线脉冲加速器。在加速器调试阶段,测量出获得加速的质子束流能量远低于预期值,在排除功率源负载能力因素之后,发现脉冲功率源因连接回路引起的电路耦合效应是导致束流能量低的主要原因。基于介质壁直线加速器加速单元放电回路结构的分析,确认了加速单元之间的电路耦合的必然性。并通过测量回路电流,研究了几种不同工作模式下的电路耦合效应。结合电路耦合的特点,给出了两种基于磁芯隔离的解耦方法,并测量了这两种方法的解耦效率。  相似文献   
975.
为了在介质壁加速器中增大轴向加速电场, 提高加速梯度的同时抑制径向电场对束包络的扩张, 提出了在每个加速电极上添加金属栅网结构。采用基于粒子云网格方法的电磁粒子模拟软件对不加栅网与添加栅网的电极结构进行了数值仿真, 分析了不同结构下加速管道中的电场分布和束包络变化。通过实验对比了两种不同结构下经过相同的加速长度获得的粒子能量。结果表明:添加金属栅网结构相对于不加栅网的金属小孔式结构, 轴向加速电场强度提高20%, 同时径向电场得到有效抑制;栅网结构下, 被加速的粒子束在自由漂移空间中的径向发散基本得到抑制;在相同的加速长度下加速H3+粒子, 栅网结构得到的能量增益提高了一倍。  相似文献   
976.
A series of photochromic phosphotungstic acid (PWA)/SiO2 composites were synthesized using the sol-gel method. Depending on the feeding schedule of PWA during synthesis, the size of the formed PWA/SiO2 particles varied considerably from as small as 1.2 nm to ca. 10 nm. With decreasing silica particle size, the total contact area/interaction between SiO2 and PWA increases, as revealed by FT-IR and solid-state 29Si-NMR analyses. Particularly, when the size of PWA/SiO2 is ~1 nm, crystallization of PWA is inhibited, and PWA presents as amorphous molecular entities distributing uniformly in the SiO2 host, which is in evidence in the XRD spectroscopy and HR-TEM imaging. In contrast, substantial crystallization of PWA takes place when PWA/SiO2 particles are as large as 10 nm, in which case less amount of surface free Si-OH is available for PWA to make bonds with. Photochromism occurs activated by ultraviolet light irradiation. The rate of coloration/bleaching is found to depend strongly on the particle size of PWA/SiO2; specifically, the rate increases twice when the particle size is reduced from 10 nm to 1.2 nm.  相似文献   
977.
978.
The anomalous temperature dependence of elastic constant c44 for elements V, Nb, Ta, Pd, and Pt, has been calculated using first-principles theory. It is shown that the variation of elastic constant for simple elements can be approximated as the sum of thermal expansion and electronic components. The thermal expansion contributes the normal linearly decreasing effect to the elastic constant with temperature, while electronic contribution is determined by the unique character of electronic structure of elements and leads to the anomalous effect to the elastic constant with temperature.  相似文献   
979.
Let R, S be Bezout domains. Assume that n is an integer ≥ 3, 1 ≤ k ≤ n − 2. Denoted by the k-dimensional Grassmann space on . Let be a map. This paper proves the following are equivalent: (i) is an adjacency preserving bijection in both directions. (ii) is a diameter preserving bijection in both directions. Moreover, Chow’s theorem on Grassmann spaces over division rings is extended to the case of Bezout domains: If is an adjacency preserving bijection in both directions, then is induced by either a collineation or the duality of a collineation. Project 10671026 supported by National Natural Science Foundation of China.  相似文献   
980.
This paper studies the risk minimization problem in semi-Markov decision processes with denumerable states. The criterion to be optimized is the risk probability (or risk function) that a first passage time to some target set doesn't exceed a threshold value. We first characterize such risk functions and the corresponding optimal value function, and prove that the optimal value function satisfies the optimality equation by using a successive approximation technique. Then, we present some properties of optimal policies, and further give conditions for the existence of optimal policies. In addition, a value iteration algorithm and a policy improvement method for obtaining respectively the optimal value function and optimal policies are developed. Finally, two examples are given to illustrate the value iteration procedure and essential characterization of the risk function.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号