全文获取类型
收费全文 | 3459篇 |
免费 | 184篇 |
国内免费 | 83篇 |
专业分类
化学 | 2275篇 |
晶体学 | 38篇 |
力学 | 99篇 |
数学 | 551篇 |
物理学 | 763篇 |
出版年
2023年 | 29篇 |
2022年 | 38篇 |
2021年 | 61篇 |
2020年 | 84篇 |
2019年 | 81篇 |
2018年 | 60篇 |
2017年 | 52篇 |
2016年 | 119篇 |
2015年 | 84篇 |
2014年 | 120篇 |
2013年 | 198篇 |
2012年 | 242篇 |
2011年 | 253篇 |
2010年 | 168篇 |
2009年 | 131篇 |
2008年 | 212篇 |
2007年 | 179篇 |
2006年 | 186篇 |
2005年 | 154篇 |
2004年 | 139篇 |
2003年 | 111篇 |
2002年 | 94篇 |
2001年 | 64篇 |
2000年 | 77篇 |
1999年 | 65篇 |
1998年 | 42篇 |
1997年 | 49篇 |
1996年 | 29篇 |
1995年 | 45篇 |
1994年 | 41篇 |
1993年 | 48篇 |
1992年 | 57篇 |
1991年 | 42篇 |
1990年 | 35篇 |
1989年 | 36篇 |
1988年 | 26篇 |
1987年 | 21篇 |
1986年 | 23篇 |
1985年 | 41篇 |
1984年 | 25篇 |
1983年 | 9篇 |
1982年 | 20篇 |
1981年 | 20篇 |
1980年 | 13篇 |
1979年 | 25篇 |
1978年 | 15篇 |
1977年 | 9篇 |
1976年 | 7篇 |
1974年 | 13篇 |
1973年 | 10篇 |
排序方式: 共有3726条查询结果,搜索用时 15 毫秒
61.
Kubota Y Nelson JK Perticone D Poling R Schrenk S Crawford G Fulton R Jensen T Johnson DR Kagan H Kass R Malchow R Morrow F Whitmore J Wilson P Bortoletto D Brown D Dominick J McIlwain RL Miller DH Modesitt M Ng CR Schaffner SF Shibata EI Shipsey IP Battle M Kroha H Sparks K Thorndike EH Wang C Alam MS Kim IJ Li WC Nemati B Romero V Sun CR Wang P Zoeller MM Goldberg M Haupt T Horwitz N Jain V Mestayer MD Moneti GC Rozen Y Rubin P Skwarnicki T Stone S Thusalidas M Yao W Zhu G Barnes AV Bartelt J 《Physical review D: Particles and fields》1991,44(3):593-600
62.
J. Hubele P. Kreutz J. C. Adloff M. Begemann-Blaich P. Bouissou G. Imme I. Iori G. J. Kunde S. Leray V. Lindenstruth Z. Liu U. Lynen R. J. Meijer U. Milkau A. Moroni W. F. J. Müller C. Ngô C. A. Ogilvie J. Pochodzalla G. Raciti G. Rudolf H. Sann A. Schüttauf W. Seidel L. Stuttge W. Trautmann A. Tucholski 《Zeitschrift für Physik A Hadrons and Nuclei》1991,340(3):263-270
We have studied the fragmentation of Au projectiles interacting with targets of C, Al and Cu at an incident energy ofE/A=600 MeV. The employed inverse kinematics allowed a nearly complete detection of projectile fragments with chargeZ≧2. The recorded fragmentation events were sorted according to three observables, the multiplicityM lp of light charged particles, the largest atomic numberZ max within an event, and a new observable,Z bound, representing the sum of the atomic numbersZ of all fragments withZ≧2. Using these observables, the impact parameter dependence of the fragmentation process was investigated. For all three targets, a maximum mean multiplicity of 3 to 4 intermediate mass fragments (IMFs) is observed. The corresponding impact parameters range from central collisions for theC target to increasingly peripheral collisions for the heavier targets. It is found that the correlation between the IMF multiplicity andZ bound, extending from evaporation type processes (largeZ bound) to the total disassembly of the projectile (smallZ bound), is independent of the target nucleus. This universal behaviour may suggest an — at least partial — equilibration of the projectile fragment prior to its decay. 相似文献
63.
In 1987 the Canadian Department of National Defence enunciated the Total Force concept. The Total Force is comprised of Regular and Reserve components. The intention is to make maximum use of the Reserve to reduce defence expenditures and at the same time to ensure that military capability remains adequate to support national policy objectives. This paper discusses some of the governing parameters that affect the modelling of the composition of the Total Force and analyses the mix of regular and reserve forces. The interplay between the key factors and their marginal costs will be stressed. The models are employed to study two units in the Canadian Forces, a maintenance support unit and a tactical unit with high operational activity cost. The lessons drawn from these studies are highlighted. 相似文献
64.
Least squares estimations have been used extensively in many applications, e.g. system identification and signal prediction. When the stochastic process is stationary, the least squares estimators can be found by solving a Toeplitz or near-Toeplitz matrix system depending on the knowledge of the data statistics. In this paper, we employ the preconditioned conjugate gradient method with circulant preconditioners to solve such systems. Our proposed circulant preconditioners are derived from the spectral property of the given stationary process. In the case where the spectral density functions() of the process is known, we prove that ifs() is a positive continuous function, then the spectrum of the preconditioned system will be clustered around 1 and the method converges superlinearly. However, if the statistics of the process is unknown, then we prove that with probability 1, the spectrum of the preconditioned system is still clustered around 1 provided that large data samples are taken. For finite impulse response (FIR) system identification problems, our numerical results show that annth order least squares estimator can usually be obtained inO(n logn) operations whenO(n) data samples are used. Finally, we remark that our algorithm can be modified to suit the applications of recursive least squares computations with the proper use of sliding window method arising in signal processing applications.Research supported in part by HKRGC grant no. 221600070, ONR contract no. N00014-90-J-1695 and DOE grant no. DE-FG03-87ER25037. 相似文献
65.
Beltrami I Bylsma BG DeBonte R Gan KK Koltick D Loeffler FJ Low EH McIlwain RL Miller DH Ng CR Ong PP Rangan LK Shibata EI Wilson RJ Derrick M Fernandez E Fries R Hyman L Kooijman P Loos JS Musgrave B Price LE Schlereth J Sugano K Weiss JM Wood DE Baranko G Baringer P Blockus D Brabson B Forden GE Gray SW Jung C Neal H Ogren H Rust DR Valdata-Nappi M Akerlof C Bonvicini G Chapman J Errede D Harnew N Kesten P Kooijman S Meyer DI Nitz D Rubin D Seidl AA Thun R Trinko T Willutzky W Cork B Keller L 《Physical review letters》1985,54(16):1775-1778
66.
67.
Chan KW 《Optics letters》2012,37(13):2739-2741
The theory of ghost imaging is examined by taking into account the quantum state of the light source explicitly. It is proved that ghost images can be obtained by any light source that is non-Poissonian. It is also shown that ghost images with unity visibility can be achieved with either quantum or classical correlation. 相似文献
68.
Conventionally, surface roughness is predominantly determined through the use of stylus instruments. However, there are certain limitations involved in the method, particularly when a test specimen, such as a silicon wafer, has a smooth mirror-like surface. Hence, it is necessary to explore alternative non-contact techniques. Light scattering has recently been gaining popularity as an optical technique to provide prompt and precise inspection of surface roughness. In this paper, the total integrated scattering (TIS) model is modified to retrieve parameters on surface micro-topography through light scattering. The applicability of the proposed modified TIS model is studied and compared with an atomic force microscope. Experimental results obtained show that the proposed technique is highly accurate for measuring surface roughness in the nanometer range. 相似文献
69.
70.
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols. 相似文献