首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13476篇
  免费   1787篇
  国内免费   1029篇
化学   3305篇
晶体学   72篇
力学   869篇
综合类   266篇
数学   5601篇
物理学   6179篇
  2023年   96篇
  2022年   317篇
  2021年   346篇
  2020年   287篇
  2019年   285篇
  2018年   288篇
  2017年   390篇
  2016年   431篇
  2015年   370篇
  2014年   714篇
  2013年   965篇
  2012年   683篇
  2011年   817篇
  2010年   672篇
  2009年   796篇
  2008年   931篇
  2007年   912篇
  2006年   775篇
  2005年   719篇
  2004年   586篇
  2003年   571篇
  2002年   539篇
  2001年   400篇
  2000年   415篇
  1999年   393篇
  1998年   376篇
  1997年   283篇
  1996年   243篇
  1995年   208篇
  1994年   212篇
  1993年   136篇
  1992年   132篇
  1991年   104篇
  1990年   79篇
  1989年   92篇
  1988年   82篇
  1987年   80篇
  1986年   61篇
  1985年   81篇
  1984年   55篇
  1983年   41篇
  1982年   56篇
  1981年   27篇
  1980年   29篇
  1979年   37篇
  1978年   44篇
  1977年   26篇
  1976年   26篇
  1975年   15篇
  1973年   21篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
《Electroanalysis》2005,17(3):255-262
Characteristics of mass transport and potential distribution applicable to microfluidic electrochemical flow cell devices has been modelled using the finite element method. A flexible, automatic grid generation algorithm has been combined with an a‐posteriori error indication technique presented by Nann and Heinze to allow irregular cell geometries to be modelled. The code has been applied to the problem of steady state generator – detector linear sweep voltammetry in a channel flow cell showing the effects of IR drop on the voltammetric response of each electrode.  相似文献   
102.
Petr Lachout 《Acta Appl Math》2003,78(1-3):243-250
The paper introduces an extension of the epi-convergence, the lower semicontinuous approximation and the epi-upper semicontinuous approximation of random real functions in distribution. The new notions could be helpful tools for sensitivity analyzes of stochastic optimization problems. The research is evoked by S. Vogel and continues the research started by Vogel and the author.  相似文献   
103.
We determine the limiting density of the zeroes of Heine–Stieltjes polynomials (or of any set of points satisfying the conclusion of Heine–Stieltjes Theorem) in the thermodynamic limit and use this to prove a strong law of large numbers for the zeroes.  相似文献   
104.
It is generally in a firm’s interest for its supply chain partners to invest in innovations. To the extent that these innovations either reduce the partners’ variable costs or stimulate demand for the end product, they will tend to lead to higher levels of output for all of the firms in the chain. However, in response to the innovations of its partners, a firm may have an incentive to opportunistically increase its own prices. The possibility of such opportunistic behavior creates a hold-up problem that leads supply chain partners to underinvest in innovation. Clearly, this hold-up problem could be eliminated by a pre-commitment to price. However, by making an advance commitment to price, a firm sacrifices an important means of responding to demand uncertainty. In this paper we examine the trade-off that is faced when a firm’s channel partner has opportunities to invest in either cost reduction or quality improvement, i.e. demand enhancement. Should it commit to a price in order to encourage innovation, or should it remain flexible in order to respond to demand uncertainty. We discuss several simple wholesale pricing mechanisms with respect to this trade-off.  相似文献   
105.
A Tandem Queue with Coupled Processors: Computational Issues   总被引:2,自引:0,他引:2  
In Resing and Örmeci [16] it is shown that the two-stage tandem queue with coupled processors can be solved using the theory of boundary value problems. In this paper we consider the issues that arise when calculating performance measures like the mean queue length and the fraction of time a station is empty. It is assumed that jobs arrive at the first station according to a Poisson process and require service at both stations before leaving the system. The amount of work that a job requires at each of the stations is an independent, exponentially distributed random variable. When both stations are nonempty, the total service capacity is shared among the stations according to fixed proportions. When one of the stations becomes empty, the total service capacity is given to the nonempty station. We study the two-dimensional Markov process representing the numbers of jobs at the two stations. The problem of finding the generating function of the stationary distribution can be reduced to two different Riemann-Hilbert boundary value problems, where both problems yield a complete analytical solution. We discuss the similarities and differences between the two problems, and relate them to the computational aspects of obtaining performance measures.  相似文献   
106.
肖伯钧 《大学物理》2003,22(5):22-24
讨论了银道面内的引力场强分布和太阳在银河系中所受引力与到银心距离r的关系,指出引力场强g并不是与r的平方成反比,这是由于银河系的大小和形状不能忽略造成的.强调了万有引力定律的适用条件.  相似文献   
107.
本文研究了三维Minkowski空间中直线汇的一些性质,特别是关于类时线汇的性质.讨论了线汇基本元素的存在性,并证明了关于三维Minkowski空间中类时线汇的配分参数的一个结果,推广了苏步青1927年的—个成果.  相似文献   
108.
Two simple kinetic models of a Ne-buffered XeCl laser discharge are presented based on different simplifications of the chemical kinetics of a complex model that recently appeared in the literature. When applied to the study of a small-volume XeCl laser, the results of both simple and complex models are in satisfactory agreement with the experiments. Shifting to a larger-volume laser, both models show problems due to loss of stability of the discharge. A one-dimensional modelling is performed, and it is found that different assumptions on the kinetics of the NeXe+ ion in the discharge lead to completely different results as regards the effect of a preionization-triggered instability.  相似文献   
109.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
110.
本文讨论了在指数型寿命数据中,对同时存在的异常大数据和异常小数据的检验方法,给出了一个明确的判别标准,并以一例说明其应用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号