首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3459篇
  免费   184篇
  国内免费   83篇
化学   2275篇
晶体学   38篇
力学   99篇
数学   551篇
物理学   763篇
  2023年   29篇
  2022年   38篇
  2021年   61篇
  2020年   84篇
  2019年   81篇
  2018年   60篇
  2017年   52篇
  2016年   119篇
  2015年   84篇
  2014年   120篇
  2013年   198篇
  2012年   242篇
  2011年   253篇
  2010年   168篇
  2009年   131篇
  2008年   212篇
  2007年   179篇
  2006年   186篇
  2005年   154篇
  2004年   139篇
  2003年   111篇
  2002年   94篇
  2001年   64篇
  2000年   77篇
  1999年   65篇
  1998年   42篇
  1997年   49篇
  1996年   29篇
  1995年   45篇
  1994年   41篇
  1993年   48篇
  1992年   57篇
  1991年   42篇
  1990年   35篇
  1989年   36篇
  1988年   26篇
  1987年   21篇
  1986年   23篇
  1985年   41篇
  1984年   25篇
  1983年   9篇
  1982年   20篇
  1981年   20篇
  1980年   13篇
  1979年   25篇
  1978年   15篇
  1977年   9篇
  1976年   7篇
  1974年   13篇
  1973年   10篇
排序方式: 共有3726条查询结果,搜索用时 15 毫秒
61.
62.
We have studied the fragmentation of Au projectiles interacting with targets of C, Al and Cu at an incident energy ofE/A=600 MeV. The employed inverse kinematics allowed a nearly complete detection of projectile fragments with chargeZ≧2. The recorded fragmentation events were sorted according to three observables, the multiplicityM lp of light charged particles, the largest atomic numberZ max within an event, and a new observable,Z bound, representing the sum of the atomic numbersZ of all fragments withZ≧2. Using these observables, the impact parameter dependence of the fragmentation process was investigated. For all three targets, a maximum mean multiplicity of 3 to 4 intermediate mass fragments (IMFs) is observed. The corresponding impact parameters range from central collisions for theC target to increasingly peripheral collisions for the heavier targets. It is found that the correlation between the IMF multiplicity andZ bound, extending from evaporation type processes (largeZ bound) to the total disassembly of the projectile (smallZ bound), is independent of the target nucleus. This universal behaviour may suggest an — at least partial — equilibration of the projectile fragment prior to its decay.  相似文献   
63.
In 1987 the Canadian Department of National Defence enunciated the Total Force concept. The Total Force is comprised of Regular and Reserve components. The intention is to make maximum use of the Reserve to reduce defence expenditures and at the same time to ensure that military capability remains adequate to support national policy objectives. This paper discusses some of the governing parameters that affect the modelling of the composition of the Total Force and analyses the mix of regular and reserve forces. The interplay between the key factors and their marginal costs will be stressed. The models are employed to study two units in the Canadian Forces, a maintenance support unit and a tactical unit with high operational activity cost. The lessons drawn from these studies are highlighted.  相似文献   
64.
Least squares estimations have been used extensively in many applications, e.g. system identification and signal prediction. When the stochastic process is stationary, the least squares estimators can be found by solving a Toeplitz or near-Toeplitz matrix system depending on the knowledge of the data statistics. In this paper, we employ the preconditioned conjugate gradient method with circulant preconditioners to solve such systems. Our proposed circulant preconditioners are derived from the spectral property of the given stationary process. In the case where the spectral density functions() of the process is known, we prove that ifs() is a positive continuous function, then the spectrum of the preconditioned system will be clustered around 1 and the method converges superlinearly. However, if the statistics of the process is unknown, then we prove that with probability 1, the spectrum of the preconditioned system is still clustered around 1 provided that large data samples are taken. For finite impulse response (FIR) system identification problems, our numerical results show that annth order least squares estimator can usually be obtained inO(n logn) operations whenO(n) data samples are used. Finally, we remark that our algorithm can be modified to suit the applications of recursive least squares computations with the proper use of sliding window method arising in signal processing applications.Research supported in part by HKRGC grant no. 221600070, ONR contract no. N00014-90-J-1695 and DOE grant no. DE-FG03-87ER25037.  相似文献   
65.
66.
67.
Chan KW 《Optics letters》2012,37(13):2739-2741
The theory of ghost imaging is examined by taking into account the quantum state of the light source explicitly. It is proved that ghost images can be obtained by any light source that is non-Poissonian. It is also shown that ghost images with unity visibility can be achieved with either quantum or classical correlation.  相似文献   
68.
Conventionally, surface roughness is predominantly determined through the use of stylus instruments. However, there are certain limitations involved in the method, particularly when a test specimen, such as a silicon wafer, has a smooth mirror-like surface. Hence, it is necessary to explore alternative non-contact techniques. Light scattering has recently been gaining popularity as an optical technique to provide prompt and precise inspection of surface roughness. In this paper, the total integrated scattering (TIS) model is modified to retrieve parameters on surface micro-topography through light scattering. The applicability of the proposed modified TIS model is studied and compared with an atomic force microscope. Experimental results obtained show that the proposed technique is highly accurate for measuring surface roughness in the nanometer range.  相似文献   
69.
70.
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号