首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29072篇
  免费   767篇
  国内免费   179篇
化学   18047篇
晶体学   218篇
力学   667篇
综合类   1篇
数学   4505篇
物理学   4312篇
无线电   2268篇
  2021年   217篇
  2020年   264篇
  2019年   336篇
  2018年   277篇
  2017年   269篇
  2016年   505篇
  2015年   406篇
  2014年   522篇
  2013年   1446篇
  2012年   1302篇
  2011年   1619篇
  2010年   878篇
  2009年   743篇
  2008年   1510篇
  2007年   1580篇
  2006年   1543篇
  2005年   1530篇
  2004年   1327篇
  2003年   1128篇
  2002年   1121篇
  2001年   419篇
  2000年   345篇
  1999年   276篇
  1998年   322篇
  1997年   344篇
  1996年   438篇
  1995年   340篇
  1994年   328篇
  1993年   319篇
  1992年   307篇
  1991年   260篇
  1990年   263篇
  1989年   260篇
  1988年   291篇
  1987年   290篇
  1986年   291篇
  1985年   435篇
  1984年   485篇
  1983年   364篇
  1982年   483篇
  1981年   449篇
  1980年   389篇
  1979年   373篇
  1978年   374篇
  1977年   363篇
  1976年   311篇
  1975年   306篇
  1974年   281篇
  1973年   264篇
  1972年   164篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
A set of exact conditions is compiled for the purpose of developing and testing approximations for the exchange-correlation energy as a functional of the electron density. Special emphasis is placed upon recently developed density-scaling relationships. Commonly used generalized gradient approximations are compared against several of these conditions. A direct tabular comparison of these functionals (not of calculated properties) with one another is also made. © 1994 John Wiley & Sons, Inc.  相似文献   
12.
A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication and provide protection for documents. Given the interest in watermark generation using chaotic functions a detailed study of one chaotic function for this purpose is performed. In this paper, we present an approach for the generation of watermarks using the logistic map. Using this function, in conjunction with seed management, it is possible to generate chaotic sequences that may be used to create highpass or lowpass digital watermarks. In this paper we provide a detailed study on the generation of optically detectable watermarks and we provide some guidelines on successful chaotic watermark generation using the logistic map, and show using a recently published scheme, how care must be taken in the selection of the function seed.  相似文献   
13.
The multilevel generalized assignment problem is a problem of assigning agents to tasks where the agents can perform tasks at more than one efficiency level. A profit is associated with each assignment and the objective of the problem is profit maximization. Two heuristic solution methods are presented for the problem. The heuristics are developed from solution methods for the generalized assignment problem. One method uses a regret minimization approach whilst the other method uses a repair approach on a relaxation of the problem. The heuristics are able to solve moderately large instances of the problem rapidly and effectively. Procedures for deriving an upper bound on the solution of the problem are also described. On larger and harder instances of the problem one heuristic is particularly effective.  相似文献   
14.
It is shown that any finite dimensionalC 0 manifold (connected and Hausdorff but otherwise unrestricted) has an atlas of cardinality not greater than that of the continuum; while if it has a Hölder continuous pseudo-Riemannian metric then there is a countable atlas.  相似文献   
15.
Multiple image encryption using an aperture-modulated optical system   总被引:2,自引:0,他引:2  
A multiple image cryptosystem based on different apertures in an optical set-up under a holographic arrangement is proposed. The system is a security architecture that uses different pupil aperture mask in the encoding lens to encrypt different images. Based on this approach multiple encryption is achieved by changing the pupil aperture arrangement of the optical system among exposures. In addition to the classical speckle phase mask, the geometrical parameters characterizing the apertures are introduced to increase the system security. Even when an illegal user steals the speckle phase mask, the system cannot be broken into without the correct pupil geometrical parameters. The experimental set-up is based on a volume photorefractive BSO crystal as storing device. Information retrieval is done via a phase conjugation operation. We also have to stress that the multiple storage under this scheme, is only possible with the help of the aperture mask. Simulation and experimental results are further introduced to verify the proposed method.  相似文献   
16.
For a ? R\alpha \in \mathbf{R}, the class of a-\alpha -order spherical harmonic functions in an open set W í\Omega \subseteq Sn-1\mathbf{S}^{n-1}, Ha(W)H^{\alpha }(\Omega ) is defined as the C2-C^{2}-solutions of Dau=0\Delta _{\alpha }u=0; where Da=Ds+a(n+a-2)\Delta _{\alpha }=\Delta _{s}+\alpha (n+\alpha -2) is the spherical Laplace--Beltrami operator of order a\alpha and Ds\Delta _{s} is the radially independent part of the Laplace operator. We obtain a Green's integral formula for the functions in Ha(W)H^{\alpha }(\Omega ) with kernel expressed as a Gegenbauer function. As generalizations, higher order spherical iterated Dirac operators are defined in a polynomial form. Integral representations of the null solutions to these operators and an intertwining formula relating these operators on the sphere and their analogues in Euclidean space are presented.  相似文献   
17.
Relying on reliability growth testing to improve system designis neither usually effective nor efficient. Instead it is importantto design in reliability. This requires models to estimate reliabilitygrowth in the design that can be used to assess whether goalreliability will be achieved within the target timescale forthe design process. Many models have been developed for analysisof reliability growth on test, but there has been much lessattention given to reliability growth in design. This paperdescribes and compares two models: one motivated by the practicalengineering process; the other by extending the reasoning ofstatistical reliability growth modelling. Both models are referencedin the recently revised edition of international standard IEC61164. However, there has been no reported evaluation of theirproperties. Therefore, this paper explores the commonalitiesand differences between these models through an assessment oftheir logic and their application to an industrial example.Recommendations are given for the use of reliability growthmodels to aid management of the design process and to informproduct development.  相似文献   
18.
In response to the bio-activity found in fluorine-containing 4-alkyl-3, 5-pyridinedicarboxylates, a series of novel 4-substituted derivatives, not directly available by Hantzsch sequences, were prepared. Starting 4-alkylpyridines, 1 , were converted via enamine 2 to materials 3–8 . Derivatives 9–16 in turn were derived from aldehyde 3 , while acid derivatives 28–36 were prepared from 14 . Addition of oxygen, sulfur, and carbenoids effected conversion of 4-allylpyridine 16 to epoxy and cyclopropyl derivative 16–22 . A number of neighboring group effects were noted, including those forming the fused-ring systems 23-27 .  相似文献   
19.
电动汽车常被喻作“归来的孩子”,因为这项技术在多年前进入市场后便一直沉寂,直至最近才再次活跃起来。其实,电动汽车早于1835年首次于美国出现,到1899年,纽约市接近90%的出租车都是由电力驱动。然而,当电力启动器和内燃机变得完善时,电动汽车的使用就迅速衰退。随着如今对环境保护的关注,由燃烧碳氢化合物造成的污染,加之汽油成本高升的影响,再次  相似文献   
20.
It is well known that tile-boundary artifacts occur in wavelet-based lossy image coding. However, until now, their cause has not been understood well. In this paper, we show that boundary artifacts are an inescapable consequence of the usual methods used to choose tile size and the type of symmetric extension employed in a wavelet-based image decomposition system. This paper presents a novel method for reducing these tile-boundary artifacts. The method employs odd tile sizes (2N + 1 samples) rather than the conventional even tile sizes (2N samples). It is shown that, for the same bit rate, an image compressed using an odd tile length low-pass first (OTLPF) convention has significantly less boundary artifacts than an image compressed using even tile sizes. The OTLPF convention can also be incorporated into the JPEG 2000 image compression algorithm using extensions defined in Part 2 of this standard.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号