首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6969篇
  免费   457篇
  国内免费   657篇
化学   444篇
晶体学   4篇
力学   531篇
综合类   174篇
数学   6360篇
物理学   570篇
  2024年   8篇
  2023年   77篇
  2022年   97篇
  2021年   129篇
  2020年   139篇
  2019年   152篇
  2018年   165篇
  2017年   181篇
  2016年   178篇
  2015年   153篇
  2014年   296篇
  2013年   446篇
  2012年   290篇
  2011年   396篇
  2010年   357篇
  2009年   456篇
  2008年   460篇
  2007年   443篇
  2006年   443篇
  2005年   383篇
  2004年   295篇
  2003年   336篇
  2002年   304篇
  2001年   284篇
  2000年   239篇
  1999年   236篇
  1998年   215篇
  1997年   203篇
  1996年   136篇
  1995年   104篇
  1994年   82篇
  1993年   69篇
  1992年   50篇
  1991年   29篇
  1990年   31篇
  1989年   17篇
  1988年   17篇
  1987年   15篇
  1986年   16篇
  1985年   28篇
  1984年   26篇
  1983年   15篇
  1982年   21篇
  1981年   17篇
  1980年   21篇
  1979年   6篇
  1978年   6篇
  1977年   3篇
  1976年   6篇
  1974年   3篇
排序方式: 共有8083条查询结果,搜索用时 11 毫秒
61.
We show that there is a continuous map of the unit interval into itself of type which has a trajectory disjoint from the set of recurrent points of , but contained in the closure of . In particular, is not closed. A function of type , with nonclosed set of recurrent points, was found by H. Chu and J. Xiong [Proc. Amer. Math. Soc. 97 (1986), 361-366]. However, there is no trajectory contained in , since any point in is eventually mapped into . Moreover, our construction is simpler.

We use to show that there is a continuous map of the interval of type for which the set of recurrent points is not an set. This example disproves a conjecture of A. N. Sharkovsky et al., from 1989. We also provide another application of .

  相似文献   

62.
Let be domains in . Under very mild conditions on we show that there exist holomorphic functions , defined on with the property that is nowhere extendible across , while the graph of over is not complete pluripolar in . This refutes a conjecture of Levenberg, Martin and Poletsky (1992).

  相似文献   

63.
In this article we prove a strong law of large numbers for Borel measurable nonseparably valued random elements in the case of generalized random sets.

  相似文献   

64.
For a coanalytic-complete or -complete subspace of a Polish space we prove that there exists a continuous bijection of onto the Hilbert cube . This extends results of Pytkeev. As an application of our main theorem we give an answer to some questions of Arkhangelskii and Christensen.

Under the assumption of Projective Determinacy we also give some generalizations of these results to higher projective classes.

  相似文献   

65.
基于粗糙集理论的知识约简及应用实例   总被引:5,自引:0,他引:5  
陈晓红  陈岚 《大学数学》2003,19(4):68-73
在保持分类能力不变的前提下 ,通过利用粗糙集理论中的知识约简方法 ,在保护知识库分类不变的条件下 ,删除其中不相关或不重要的知识 ,从而导出问题的决策 .利用基于决策表的粗糙集模型算法 ,实例分析如何数字化表示决策表 ,并对其进行属性约简和属性值的约简 ,从而提取决策规则 .  相似文献   
66.
HL-2M 装置供电系统研制   总被引:2,自引:0,他引:2  
为满足 HL-2M 装置的供电需求,须配套建设相应的供电系统。通过仿真计算 HL-2M 装置的总体供 电需求,考虑到 HL-2A 装置现有的供电系统设备,提出了兼顾 HL-2A 和 HL-2M 装置供电需求的总体配置方案。介绍了国内首台 300MVA 立式交流脉冲发电机组、磁体电源、高压电源和电源控制系统的研制情况。  相似文献   
67.
The traditional sequential pattern mining method is carried out considering the whole time period and often ignores the sequential patterns that only occur in local time windows, as well as possible periodicity. Therefore, in order to overcome the limitations of traditional methods, this paper proposes status set sequential pattern mining with time windows (SSPMTW). In contrast to traditional methods, the item status is considered, and time windows, minimum confidence, minimum coverage, minimum factor set ratios and other constraints are added to mine more valuable rules in local time windows. The periodicity of these rules is also analyzed. According to the proposed method, this paper improves the Apriori algorithm, proposes the TW-Apriori algorithm, and explains the basic idea of the algorithm. Then, the feasibility, validity and efficiency of the proposed method and algorithm are verified by small-scale and large-scale examples. In a large-scale numerical example solution, the influence of various constraints on the mining results is analyzed. Finally, the solution results of SSPM and SSPMTW are compared and analyzed, and it is suggested that SSPMTW can excavate the laws existing in local time windows and analyze the periodicity of the laws, which solves the problem of SSPM ignoring the laws existing in local time windows and overcomes the limitations of traditional sequential pattern mining algorithms. In addition, the rules mined by SSPMTW reduce the entropy of the system.  相似文献   
68.
The vulnerability of water resources is an important criterion for evaluating the carrying capacity of water resources systems under the influence of climate change and human activities. Moreover, assessment and prediction of river basins’ water resources vulnerability are important means to assess the water resources security state of river basins and identify possible problems in future water resources systems. Based on the constructed indicator system of water resources vulnerability assessment in Song-Liao River Basin, this paper uses the neighborhood rough set (abbreviated as NRS) method to reduce the dimensionality of the original indicator system to remove redundant attributes. Then, assessment indicators’ standard values after dimensionality reduction are taken as the evaluation sample, and the random forest regression (abbreviated as RF) model is used to assess the water resources vulnerability of the river basin. Finally, based on data under three different future climate and socio-economic scenarios, scenario predictions are made on the vulnerability of future water resources. The results show that the overall water resources vulnerability of the Song-Liao River Basin has not improved significantly in the past 18 years, and the overall vulnerability of the Song-Liao River Basin is in the level V of moderate to high vulnerability. In the future scenario 1, the overall water resources vulnerability of the river basin will improve, and it is expected to achieve an improvement to the level III of moderate to low vulnerability. At the same time, the natural vulnerability and vulnerability of carrying capacity will increase significantly in the future, and the man-made vulnerability will increase slowly, which will deteriorate to the level V of moderate to high vulnerability under Scenario 3. Therefore, taking active measures can significantly reduce the vulnerability of nature and carrying capacity, but man-made vulnerability will become a bottleneck restricting the fragility of the overall water resources of the river basin in the future.  相似文献   
69.
Ming-En Tian 《中国物理 B》2021,30(5):58503-058503
A single-stage ring resonator capable of introducing six modes within the ultra-wideband (UWB) passband is presented. The sextuple-mode resonator consists of three rings and three sets of stepped-impedance open stubs. Based on this sextuple-mode resonator, a UWB filter fed by the interdigital-coupling line (ICL) is designed. And we propose a two-round interpolation method to obtain the filter's initial dimensions. The designed filter is fabricated on a double-sided YBCO/MgO/YBCO high-temperature superconducting (HTS) thin film for demonstration. The experimental results show that this UWB filter produces eight resonances in the passband eventually, which effectively improves the in-band reflection and the band-edge steepness. Moreover, the upper stopband performance is enhanced due to the transmission zeros (TZs) generated by the stepped-impedance open stubs and the ICL structure. The measured good performance verifies the practicability of the two-round interpolation approach, which can also be extended to other odd-even-mode filter designs.  相似文献   
70.
提出了一种基于谱线幅值归零的加窗插值FFT谐波检测方法用于分析复杂电网信号中的各次谐波.该检测方法将每一次在离散频谱中找到的最大谱线及其左右两侧的数根谱线幅值归零,直到各次谐波分析完毕.通过仿真实验分析了在基波频率稳定时对模拟信号的测量精度,研究了基波频率波动对谐波分析的影响.通过对EAST实验数据的分析,验证了该谐波...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号