首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   165945篇
  免费   914篇
  国内免费   312篇
化学   64875篇
晶体学   2610篇
力学   10421篇
综合类   8篇
数学   30051篇
物理学   59206篇
  2022年   463篇
  2021年   484篇
  2020年   466篇
  2019年   454篇
  2018年   10087篇
  2017年   10968篇
  2016年   5278篇
  2015年   1613篇
  2014年   1151篇
  2013年   2701篇
  2012年   6969篇
  2011年   16349篇
  2010年   9888篇
  2009年   10038篇
  2008年   14154篇
  2007年   17811篇
  2006年   2741篇
  2005年   9710篇
  2004年   5830篇
  2003年   5474篇
  2002年   3236篇
  2001年   3231篇
  2000年   2510篇
  1999年   1618篇
  1998年   1147篇
  1997年   1091篇
  1996年   1096篇
  1995年   900篇
  1994年   812篇
  1993年   721篇
  1992年   1044篇
  1991年   1046篇
  1990年   943篇
  1989年   855篇
  1988年   846篇
  1987年   905篇
  1986年   748篇
  1985年   1014篇
  1984年   967篇
  1983年   691篇
  1982年   675篇
  1981年   652篇
  1980年   609篇
  1979年   766篇
  1978年   793篇
  1977年   702篇
  1976年   671篇
  1975年   554篇
  1974年   584篇
  1973年   558篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
An exact charged solution with axial symmetry is obtained in the teleparallel equivalent of general relativity. The associated metric has the structure function G(ξ)=1-ξ2-2mAξ3-q2A2ξ4. The fourth order nature of the structure function can make calculations cumbersome. Using a coordinate transformation we get a tetrad whose metric has the structure function in a factorizable form (1-ξ2)(1+r+Aξ)(1+r-Aξ) with r± as the horizons of Reissner–Nordström space-time. This new form has the advantage that its roots are now trivial to write down. Then, we study the singularities of this space-time. Using another coordinate transformation, we obtain a tetrad field. Its associated metric yields the Reissner–Nordström black hole. In calculating the energy content of this tetrad field using the gravitational energy-momentum, we find that the resulting form depends on the radial coordinate! Using the regularized expression of the gravitational energy-momentum in the teleparallel equivalent of general relativity we get a consistent value for the energy.  相似文献   
992.
According to Fortunato and Barthélemy, modularity-based community detection algorithms have a resolution threshold such that small communities in a large network are invisible. Here we generalize their work and show that the q-state Potts community detection method introduced by Reichardt and Bornholdt also has a resolution threshold. The model contains a parameter by which this threshold can be tuned, but no a priori principle is known to select the proper value. Single global optimization criteria do not seem capable for detecting all communities if their size distribution is broad.  相似文献   
993.
The strong suppression of high-pT hadrons observed in heavy ion collisions at RHIC indicates the interaction of high energy partons with a dense colored medium prior to hadronization. We review the main results from the high-pT hadron analysis at RHIC and what they tell us about the medium. We then concentrate on the new possibilities that the wider kinematic range at the LHC will offer and how they will help us to better characterize the medium produced in these collisions.  相似文献   
994.
A linear problem of parametric oscillations of a low-viscous two-layer fluid in a closed vessel partially filled with a porous medium is studied. An asymptotic solution is constructed on the basis of combined application of boundary functions and averaging methods. Approximate formulas for boundaries of instability domains in the case of subharmonic and harmonic resonances are derived.  相似文献   
995.
In apparel industry, manufacturers developed standard allowed minutes (SAMs) databases on various manufacturing operations in order to facilitate better scheduling, while effective production schedules ensure smoothness of downstream operations. As apparel manufacturing environment is fuzzy and dynamic, rigid production schedules based on SAMs become futile in the presence of any uncertainty. In this paper, a fuzzification scheme is proposed to fuzzify the static standard time so as to incorporate some uncertainties, in terms of both job-specific and human related factors, into the fabric-cutting scheduling problem. A genetic optimisation procedure is also proposed to search for fault-tolerant schedules using genetic algorithms, such that makespan and scheduling uncertainties are minimised. Two sets of real production data were collected to validate the proposed method. Experimental results indicate that the genetically optimised fault-tolerant schedules not only improve the operation performance but also minimise the scheduling risks.  相似文献   
996.
A new variant of realization of quantum memory based on the use of a photon echo in an optically dense three-level gaseous medium is proposed. The use of a long-lived highly excited optical level as a storage of quantum information is the characteristic feature of the scheme proposed. This scheme of quantum memory is distinguished by reduced optical noises owing to the possibility of realizing temporal, spectral, and spatial selection of weak quantum radiation relative to the accompanying laser pulsed fields.  相似文献   
997.
Bismuth iron garnet films prepared through electron-beam and laser-induced evaporation on (001)-oriented substrates of scandium gallium gadolinium garnet are investigated using ferromagnetic resonance. It is assumed that the additional minima observed in the angular dependence of the resonance field can be associated with the magnetic moment of bismuth ions.  相似文献   
998.
999.
Numerical solution of the Slonczewski equations were used to study the motion of an individual domain wall in a two-layer uniaxial film in which the damping parameter and the gyromagnetic ratio depend on the specific layer.  相似文献   
1000.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号