首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7080篇
  免费   182篇
  国内免费   31篇
化学   3317篇
晶体学   134篇
力学   262篇
数学   823篇
物理学   1687篇
无线电   1070篇
  2022年   127篇
  2021年   144篇
  2020年   144篇
  2019年   159篇
  2018年   143篇
  2017年   125篇
  2016年   198篇
  2015年   156篇
  2014年   213篇
  2013年   478篇
  2012年   345篇
  2011年   358篇
  2010年   240篇
  2009年   226篇
  2008年   282篇
  2007年   309篇
  2006年   259篇
  2005年   247篇
  2004年   194篇
  2003年   150篇
  2002年   153篇
  2001年   85篇
  2000年   83篇
  1999年   78篇
  1998年   68篇
  1997年   58篇
  1996年   67篇
  1995年   63篇
  1994年   78篇
  1993年   89篇
  1992年   86篇
  1991年   64篇
  1990年   77篇
  1989年   64篇
  1988年   77篇
  1987年   70篇
  1986年   51篇
  1985年   125篇
  1984年   133篇
  1983年   87篇
  1982年   81篇
  1981年   82篇
  1980年   82篇
  1979年   88篇
  1978年   81篇
  1977年   85篇
  1976年   70篇
  1975年   54篇
  1974年   61篇
  1973年   85篇
排序方式: 共有7293条查询结果,搜索用时 0 毫秒
81.
Microbial metabolism of the diterpene sclareol ( 1 ) was studied. Screening studies have shown a number of microorganisms capable of metabolizing 1 . Preparative-scale fermentation with Septomyxa affinis ATCC 6737 has resulted in the production of three fungal metabolites that have been characterized by 2D-NMR techniques and chemical reactions. These metabolites have been identified as 8α,13β-dihydroxylabd-14-en-3-one ( 2 ), labd-14-ene-3β.8α,13β-triol ( 4 ), and labd-14-ene-2α,8α,13β-triol ( 6 ).  相似文献   
82.
The question of possible neutral intermediates which may lie on the reaction pathway in going from longifolene to isolongifolene has been investigated using BF3·Et2O-AcOD and D3PO4-dioxane, as reagents. It has been found that longicyclene is not an obligatory intermediate. The mode of cleavage of cyclopropane ring in longicyclene has been investigated.  相似文献   
83.
Adly  Samir  Attouch  Hedy 《Mathematical Programming》2022,191(1):405-444

We present a Branch-and-Cut algorithm for a class of nonlinear chance-constrained mathematical optimization problems with a finite number of scenarios. Unsatisfied scenarios can enter a recovery mode. This class corresponds to problems that can be reformulated as deterministic convex mixed-integer nonlinear programming problems with indicator variables and continuous scenario variables, but the size of the reformulation is large and quickly becomes impractical as the number of scenarios grows. The Branch-and-Cut algorithm is based on an implicit Benders decomposition scheme, where we generate cutting planes as outer approximation cuts from the projection of the feasible region on suitable subspaces. The size of the master problem in our scheme is much smaller than the deterministic reformulation of the chance-constrained problem. We apply the Branch-and-Cut algorithm to the mid-term hydro scheduling problem, for which we propose a chance-constrained formulation. A computational study using data from ten hydroplants in Greece shows that the proposed methodology solves instances faster than applying a general-purpose solver for convex mixed-integer nonlinear programming problems to the deterministic reformulation, and scales much better with the number of scenarios.

  相似文献   
84.
Algebras and Representation Theory - We introduce the concept of a prime band in a string algebra Λ and use it to associate to Λ its finite bridge quiver. Then we introduce a new...  相似文献   
85.
86.
87.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   
88.
Wireless Personal Communications - Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes...  相似文献   
89.
For independent random variables X and Y, define % MathType!MTEF!2!1!+-% feaafeart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXafv3ySLgzGmvETj2BSbqefm0B1jxALjhiov2D% aebbfv3ySLgzGueE0jxyaibaiGc9yrFr0xXdbba91rFfpec8Eeeu0x% Xdbba9frFj0-OqFfea0dXdd9vqaq-JfrVkFHe9pgea0dXdar-Jb9hs% 0dXdbPYxe9vr0-vr0-vqpWqaaeaabiGaciaacaqabeaadaqaaqGaaO% qaaiaabofaruWrL9MCNLwyaGqbciaa-bcacqGHHjIUcaWFGaGaa8hw% aiaa-TcacaWFzbaaaa!4551!\[{\rm{S}} \equiv X + Y\]. When the conditional expectations % MathType!MTEF!2!1!+-% feaafeart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXafv3ySLgzGmvETj2BSbqefm0B1jxALjhiov2D% aebbfv3ySLgzGueE0jxyaibaiGc9yrFr0xXdbba91rFfpec8Eeeu0x% Xdbba9frFj0-OqFfea0dXdd9vqaq-JfrVkFHe9pgea0dXdar-Jb9hs% 0dXdbPYxe9vr0-vr0-vqpWqaaeaabiGaciaacaqabeaadaqaaqGaaO% qaaiaadweacaGGBbqefCuzVj3zPfgaiuGajaaqcaWFNbGccaGGOaGa% amiwaiaacMcacaGG8bGaam4uaiaac2facqGHHjIUcaWGHbGaaiikai% aadofacaGGPaaaaa!4BC4!\[E[g(X)|S] \equiv a(S)\]and % MathType!MTEF!2!1!+-% feaafeart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXafv3ySLgzGmvETj2BSbqefm0B1jxALjhiov2D% aebbfv3ySLgzGueE0jxyaibaiGc9yrFr0xXdbba91rFfpec8Eeeu0x% Xdbba9frFj0-OqFfea0dXdd9vqaq-JfrVkFHe9pgea0dXdar-Jb9hs% 0dXdbPYxe9vr0-vr0-vqpWqaaeaabiGaciaacaqabeaadaqaaqGaaO% qaaiaadweacaGGBbGaamiAaiaacIcacaWGybGaaiykaiaacYhacaWG% tbGaaiyxaiabggMi6kaadkgacaGGOaGaam4uaiaacMcaaaa!4894!\[E[h(X)|S] \equiv b(S)\]are given, then under certain assumptions, the density function of X has the form of u(x)k()eax, where u(x) is uniquely determined by the functions a(·) and b(·).  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号