首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10374篇
  免费   168篇
  国内免费   47篇
化学   6454篇
晶体学   129篇
力学   302篇
综合类   1篇
数学   1287篇
物理学   2416篇
  2021年   61篇
  2020年   87篇
  2019年   86篇
  2018年   56篇
  2016年   117篇
  2015年   106篇
  2014年   144篇
  2013年   476篇
  2012年   376篇
  2011年   451篇
  2010年   242篇
  2009年   250篇
  2008年   447篇
  2007年   459篇
  2006年   467篇
  2005年   428篇
  2004年   383篇
  2003年   341篇
  2002年   342篇
  2001年   215篇
  2000年   226篇
  1999年   121篇
  1998年   105篇
  1997年   120篇
  1996年   160篇
  1995年   131篇
  1994年   177篇
  1993年   195篇
  1992年   183篇
  1991年   135篇
  1990年   137篇
  1989年   142篇
  1988年   110篇
  1987年   138篇
  1986年   119篇
  1985年   211篇
  1984年   190篇
  1983年   119篇
  1982年   153篇
  1981年   139篇
  1980年   145篇
  1979年   158篇
  1978年   157篇
  1977年   133篇
  1976年   152篇
  1975年   139篇
  1974年   150篇
  1973年   144篇
  1972年   67篇
  1971年   69篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
21.
22.
This paper examines the effect of infinitesimal functional variations in a rigid rotor He-HF potential surface on several different types of observables: inelastic cross sections, rate constants, and rotational energy level populations. The dynamics and kinetic observables studied were found to be sensitive to a large number of Legendre components of the potential with the region of highest sensitivity dependent upon the energy or temperature as well as the states related by the individual observable. Sensitivity to the entire surface tends to show a large degree of structure due to competition among sensitivities to the individual potential components. Significant information loss has been observed in the transition from microscopic to macroscopic observables.  相似文献   
23.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.  相似文献   
24.
Due to the hot, arid nature of its bordering lands, seawater in the Arabian Gulf can have significant evaporation rates leading to hypersaline conditions. If additional desalination plants were to operate along its coast, then the extraction of desalinated water and returned brine waste stream into the Gulf would increase the salinity. This paper uses a tidally and cross-sectionally averaged mathematical model that reveals multiplicative dependence of the salinity on factors associated with river flow, evaporation rates and each of the desalination plants. Present-day desalinated water production rates are in the linear regime, but hypersalinity has exponential sensitivity to the position and volumetric rate of desalinated water extraction.  相似文献   
25.
When depicted on maps as homogenous territorial wholes, ancient states are visually summarized as static entities in a way that conceals the highly fluid dynamics of polity formation, maintenance, and growth. Models derived from studies of animal behavior show that “territory” does not consist of an undifferentiated use of the landscape. Instead, the concept of territory can be parsed into a series of resource‐rich nodes linked by corridors of access, surrounded by unutilized regions and boundaries marked at points of competition. Ancient human groups also can be analyzed as having perceived and occupied landscapes through strategies of flexible networks in which nodes and corridors were surrounded by unutilized spaces around which boundaries were selectively identified and defended. This strategy is identifiable in human social groups at different levels of complexity ranging from hunter‐gatherers through ancient chiefdoms and states. © 2007 Wiley Periodicals, Inc. Complexity 12: 28–35, 2007  相似文献   
26.
The anti-Parkinson’s agent SIB-1508Y was prepared in six steps from (S)-nicotine in 20% overall yield. The strategy involves a regioselective formylation at C-5 of a 1,4-dihydronicotine intermediate.  相似文献   
27.
Pure adaptive search constructs a sequence of points uniformly distributed within a corresponding sequence of nested regions of the feasible space. At any stage, the next point in the sequence is chosen uniformly distributed over the region of feasible space containing all points that are equal or superior in value to the previous points in the sequence. We show that for convex programs the number of iterations required to achieve a given accuracy of solution increases at most linearly in the dimension of the problem. This compares to exponential growth in iterations required for pure random search.  相似文献   
28.
Letn cells be arranged in a ring, or alternatively, in a row. Initially, all cells are unmarked. Sequentially, one of the unmarked cells is chosen at random and marked until, aftern steps, each cell is marked. After thekth cell has been marked the configuration of marked cells defines some number of islands: maximal sets of adjacent marked cells. Let ξ k denote the random number of islands afterk cells have been marked. We give explicit expressions for moments of products of ξ k ’s and for moments of products of 1/ξ k ’s. These are used in a companion paper to prove that if a random graph on the natural number is made by drawing an edge betweeni≧1 andj>i with probabilityλ/j, then the graph is almost surely connected ifλ>1/4 and almost surely disconnected ifλ≦1/4.  相似文献   
29.
30.
In previous work, we considered the representation of human decision-making processes in closed-form simulation models of conflict. An important element of this representation is the rapid planning process that embodies the processing of information for situation assessment to support a course of action decision (eg in a military headquarters). The application of this work is in support of operational analysis models for defence procurement and balance of investment. This paper describes the application of non-linear multi-attribute utility theory in conflict scenarios in order to extend the representation of the rapid planning process to account for a wider set of subjective attributes of the decision-maker. The results show, through examination of experimental data, that decision-making can be modelled through a particular class of utility functions. These utilities embody a geometry which allows us to classify the types of decision being made when there are conflicting objectives and when decision-makers adopt very different and subjective appraisals of constraints and beliefs in outcome. The experimental results help to demonstrate that the subjective nature of the situation assessment, and the personality, training, experience and history of the decision-maker are central to the functional representations. This paper presents a way to capture this deeper representation of human decision-making in a way that is potentially useful for quantitative modelling using the rapid planning process as a basis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号