首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13523篇
  免费   1249篇
  国内免费   500篇
化学   9911篇
晶体学   81篇
力学   357篇
综合类   18篇
数学   1136篇
物理学   2220篇
无线电   1549篇
  2024年   23篇
  2023年   207篇
  2022年   212篇
  2021年   346篇
  2020年   437篇
  2019年   418篇
  2018年   316篇
  2017年   292篇
  2016年   519篇
  2015年   493篇
  2014年   574篇
  2013年   738篇
  2012年   1067篇
  2011年   1275篇
  2010年   672篇
  2009年   619篇
  2008年   1013篇
  2007年   862篇
  2006年   845篇
  2005年   770篇
  2004年   680篇
  2003年   556篇
  2002年   513篇
  2001年   213篇
  2000年   159篇
  1999年   139篇
  1998年   123篇
  1997年   123篇
  1996年   142篇
  1995年   96篇
  1994年   77篇
  1993年   67篇
  1992年   61篇
  1991年   59篇
  1990年   39篇
  1989年   38篇
  1988年   29篇
  1987年   28篇
  1986年   27篇
  1985年   55篇
  1984年   34篇
  1983年   34篇
  1982年   42篇
  1981年   37篇
  1980年   33篇
  1979年   30篇
  1978年   18篇
  1977年   18篇
  1976年   20篇
  1975年   20篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
We employ an agent‐based model to show that memory and the absence of an a priori best strategy are sufficient for self‐segregation and clustering to emerge in a complex adaptive system with discrete agents that do not compete over a limited resource nor contend in a winner‐take‐all scenario. An agent starts from a corner of a two‐dimensional lattice and aims to reach a randomly selected site in the opposite side within the shortest possible time. The agent is isolated during the course of its journey and does not interact with other agents. Time‐bound obstacles appear at random lattice locations and the agent must decide whether to challenge or evade any obstacle blocking its path. The agent is capable of adapting a strategy in dealing with an obstacle. We analyze the dependence of strategy‐retention time with strategy for both memory‐based and memory‐less agents. We derive the equality spectrum to establish the environmental conditions that favor the existence of an a priori best strategy. We found that memory‐less agents do not polarize into two opposite strategy‐retention time distributions nor cluster toward a center distribution. © 2004 Wiley Periodicals, Inc. Complexity 9: 41–46, 2004  相似文献   
32.
明确从地胆草中分离得到的两对牦牛儿内酯型的立体异构体即地胆草种内酯(scabertopin)、异地胆草种内酯(isoscabertopin)、异去氧地胆草内酯(isodeoxyelephantopin)和去氧地胆草内酯(deoxyelephantopin)的C-2相对构型;方法 NOESY技术,并结合这4个化合物的1H NMR,13C NMR,HMQC谱;结果 两对立体异构体的NOESY谱有明显差异;结论 通过分析NOESY谱,找寻H-1相关信息,若发现H-1与H-8,H-9β和14-CH3有NOE相关,可以判断化合物的C-2为α构型,若H-1与H-5,H-7,H-3α及H-9α之间有NOE相关,则化合物的C-2为β构型.  相似文献   
33.
This paper introduces the analysis method and principle of pulse fast-thermal neutron analysis (PFTNA). A system for the measurement of low caloric power of coal by PFTNA is also presented. The 14 MeV pulse neutron generator and BGO detector and 4096 MCA were applied in this system. A multiple linear regression method applied to the data solved the interferential problem of multiple elements. The error of low caloric power between chemical analysis and experiment was less than 0.4 MJ/kg. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
34.
大焦深成像系统仿真实验研究   总被引:4,自引:3,他引:1  
如何增大非相干光学成像系统的焦深是应用光学研究领域的热点问题.本文对采用高次非球面光学掩模板与图像处理相结合增大成像光学系统焦深的新方法进行了深入分析,建立了大焦深成像系统仿真实验模型,并进行了大焦深成像系统仿真实验.实验结果证明了该方法在维持原相对孔径的同时使光学系统在较大的离焦范围内有好的成像质量.实际应用中还要综合考虑模板参量、信噪比等关键因素.  相似文献   
35.
Advances in internet congestion control   总被引:1,自引:0,他引:1  
In this survey, we first review the concept of congestion control with a focus on the Transmission Control Protocol⁄Internet Protocol (TCP⁄IP). We describe many recently proposed algorithms to combat congestion and improve performance, particularly active queue management (AQM) algorithms such as random early detection (RED) and its variants. We then survey control-theoretic analysis and design of TCP congestion control with an AQM scheme. In addition, we discuss three problems associated with AQM proposals: parameter setting, the insensitivity to the input traffic load variation, and the mismatch between macroscopic and microscopic behavior of queue length dynamics. As alternatives to AQM algorithms, we also survey architectural approaches such as modification of source or network algorithms, and economic approaches including pricing or optimization of allocated resources. Finally, we list many open issues that persist in the design, operation, and control of the Internet.  相似文献   
36.
Novel algorithms for shared segment protection   总被引:8,自引:0,他引:8  
The major challenges in designing survivable schemes are how to allocate a minimal amount of spare resources (e.g., bandwidth) using fast (e.g., polynomial-time) algorithms, and, in case a failure occurs, to be able to recover quickly from it. All existing approaches invariably make tradeoffs. We propose novel shared segment protection algorithms which make little or no compromise . We develop an elegant integer linear programming (ILP) model to determine an optimal set of segments to protect a given active path. Although the ILP approach is useful for a medium-size network, it is too time consuming for large networks. Accordingly, we also design a fast heuristic algorithm based on dynamic programming to obtain a near-optimal set of segments. Although the heuristic algorithm has a polynomial time complexity, it can achieve a bandwidth efficiency as high as some best-performing shared path protection schemes and, at the same time, much faster recovery than these shared path protection schemes. The proposed scheme is also applicable to a wide range of networking technologies, including Internet Protocol and wavelength-division multiplexing networks under the generalized multiprotocol label switched framework.  相似文献   
37.
Achieving fast and bandwidth-efficient shared-path protection   总被引:4,自引:0,他引:4  
Dynamic provisioning of restorable bandwidth guaranteed paths is a challenge in the design of broad-band transport networks, especially next-generation optical networks. A common approach is called (failure-independent) path protection, whereby for every mission-critical active path to be established, a link (or node) disjoint backup path (BP) is also established. To optimize network resource utilization, shared path protection should be adopted, which often allows a new BP to share the bandwidth allocated to some existing BPs. However, it usually leads the backup paths to use too many links, with zero cost in term of additional backup bandwidth, along its route. It will violate the restoration time guarantee. In this paper, we propose novel integer linear programming (ILP) formulations by introducing two parameters (/spl epsi/ and /spl mu/) in both the sharing with complete information (SCI) scheme and the distributed partial information management (DPIM) scheme. Our results show that the proposed ILP formulations can not only improve the network resource utilization effectively, but also keep the BPs as short as possible.  相似文献   
38.
The cyclomercurated ferrocenylimines containing heterocyclic ring were prepared by the condensation of cyclomercuration of acylferrocene with the appropriate heterocyclic amine.This procedure provides an efficient method for the synthesis of cyclomerucurated ferrocenylimines containing heterocyclic ring which are difficultly synthesized by the conventional method.The reaction mechanism is proposed.  相似文献   
39.
40.
以陆地棉(冀棉20)下胚轴为外植体,在含KT0.3mg/L和2,4-D0.08mg/L的MS培养基上,诱导产生了胚性愈伤组织,继代培养不需要添加激素,胚性愈伤组织即分化为胚状体,并萌发出小芽,胚状体萌发过程与合子胚相似,但出现了一些畸形胚,解剖学方法观察发现,这些畸形胚的维管束系统不明显或形态异常,以农杆菌介导法对冀棉20胚状体及胚性愈伤组织进行了雪花莲凝集素(GNA)基因的遗传转化条件探索,并以GUS基域瞬间进行检测加以证实,得出农杆菌的浓度为O.D600=0.8时,浸染时间为5min,共培养时间为3d,筛选培养基中卡那霉素浓度为75mg/L,对冀棉20胚状体及胚性愈伤组织转化是较为适合的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号