全文获取类型
收费全文 | 96278篇 |
免费 | 6023篇 |
国内免费 | 12075篇 |
专业分类
化学 | 72169篇 |
晶体学 | 1184篇 |
力学 | 2825篇 |
综合类 | 1059篇 |
数学 | 14929篇 |
物理学 | 22210篇 |
出版年
2024年 | 103篇 |
2023年 | 735篇 |
2022年 | 1916篇 |
2021年 | 2116篇 |
2020年 | 2390篇 |
2019年 | 2307篇 |
2018年 | 1973篇 |
2017年 | 2967篇 |
2016年 | 3146篇 |
2015年 | 2598篇 |
2014年 | 3738篇 |
2013年 | 7101篇 |
2012年 | 6611篇 |
2011年 | 5367篇 |
2010年 | 4550篇 |
2009年 | 6174篇 |
2008年 | 6321篇 |
2007年 | 6551篇 |
2006年 | 5925篇 |
2005年 | 4970篇 |
2004年 | 4584篇 |
2003年 | 3859篇 |
2002年 | 5062篇 |
2001年 | 2960篇 |
2000年 | 2753篇 |
1999年 | 2576篇 |
1998年 | 2237篇 |
1997年 | 1771篇 |
1996年 | 1509篇 |
1995年 | 1404篇 |
1994年 | 1261篇 |
1993年 | 1053篇 |
1992年 | 975篇 |
1991年 | 662篇 |
1990年 | 562篇 |
1989年 | 530篇 |
1988年 | 392篇 |
1987年 | 307篇 |
1986年 | 295篇 |
1985年 | 243篇 |
1984年 | 251篇 |
1983年 | 139篇 |
1982年 | 217篇 |
1981年 | 181篇 |
1980年 | 196篇 |
1979年 | 185篇 |
1978年 | 170篇 |
1977年 | 127篇 |
1976年 | 111篇 |
1973年 | 67篇 |
排序方式: 共有10000条查询结果,搜索用时 312 毫秒
131.
Admissible slopes for monotone and convex interpolation 总被引:1,自引:0,他引:1
Summary In many applications, interpolation of experimental data exhibiting some geometric property such as nonnegativity, monotonicity or convexity is unacceptable unless the interpolant reflects these characteristics. This paper identifies admissible slopes at data points of variousC
1 interpolants which ensure a desirable shape. We discuss this question, in turn for the following function classes commonly used for shape preserving interpolations: monotone polynomials,C
1 monotone piecewise polynomials, convex polynomials, parametric cubic curves and rational functions. 相似文献
132.
骆雪梅 《光谱学与光谱分析》2003,23(1):178-181
量子计算机是一种以量子耦合方式进行信息处理的装置[1 ] 。原则上 ,它能利用量子相干干涉方法以比传统计算机更快的速度进行诸如大数的因式分解、未排序数据库中的数据搜索等工作[2 ] 。建造大型量子计算机的主要困难是噪音、去耦和制造工艺。一方面 ,虽然离子陷阱和光学腔实验方法大有希望 ,但这些方法都还没有成功实现过量子计算。另一方面 ,因为隔离于自然环境 ,核自旋可以成为很好的“量子比特” ,可能以非传统方式使用核磁共振 (NMR)技术实现量子计算。本文介绍一种用NMR方法实现量子计算的方法 ,该方法能够用比传统方法少的步骤解决一个纯数学问题。基于该方法的简单量子计算机使用比传统计算机使用更少的函数“调用”判断一未知函数的类别。 相似文献
133.
We predict ultraslow collapse of “tubular image states” (TIS) on material surfaces. TIS are bound Rydberg-like electronic states formed at large distances (∼30 nm) from the surfaces of suspended circularly-symmetric nanowires, such as metallic C nanotubes. The states are formed in potential wells, resulting from a combination of the TIS-electron attraction to image charges in the nanotube and its centrifugal repulsion, caused by spinning around the tube. We demonstrate that TIS can collapse on the tube surface by passing their angular momentum l to circularly polarized flexural phonons excited in the tube. Our analysis shows that for highly detached TIS with l ? 6 the relaxation lifetimes are of the order of 10 ns-1 μs, while for l < 6 these lifetimes are reduced by several orders of magnitude. 相似文献
134.
135.
Experimental analysis, modeling, and theoretical design of McMaster pore-filled nanofiltration membranes 总被引:1,自引:0,他引:1
A side-by-side comparison of the performance of McMaster pore-filled (MacPF) and commercial nanofiltration (NF) membranes is presented here. The single-salt and multi-component performance of these membranes is studied using experimental data and using a mathematical model. The pseudo two-dimensional model is based on the extended Nernst–Planck equation, a modified Poisson–Boltzmann equation, and hydrodynamic calculations. The model includes four structural properties of the membrane: pore radius, pure water permeability, surface charge density and the ratio of effective membrane thickness to water content. The analysis demonstrates that the rejection and transport mechanisms are the same in the commercial and MacPF membranes with different contributions from each type of mechanism (convection, diffusion and electromigration). Solute rejection in NF membranes is determined primarily by a combination of steric and electrostatic effects. The selectivity of MacPF membranes is primarily determined by electrostatic effects with a significantly smaller contribution of steric effects compared to commercial membranes. Hence, these membranes have the ability to reject ions while remaining highly permeable to low molecular weight organics. Additionally, a new theoretical membrane design approach is presented. This design procedure potentially offers the optimization of NF membrane performance by tailoring the membrane structure and operating variables to the specific process, simultaneously. The procedure is validated at the laboratory scale. 相似文献
136.
New explicit, zero dissipative, hybrid Numerov type methods are presented in this paper. We derive these methods using an alternative which avoids the use of costly high accuracy interpolatory nodes. We only need the Taylor expansion at some internal points then. The method is of sixth algebraic order at a cost of seven stages per step while their phase lag order is fourteen. The zero dissipation condition is satisfied, so the methods possess an non empty interval of periodicity. Numerical results over some well known problems in physics and mechanics indicate the superiority of the new method. 相似文献
137.
138.
The development of the poly(3‐hydroxybutyrate) (PHB) morphology in the presence of already existent poly(vinylidene fluoride) (PVDF) spherulites was studied by two‐stage solidification with two separate crystallization temperatures. PVDF formed irregular dendrites at lower temperatures and regular, banded spherulites at elevated temperatures. The transition temperature of the spherulitic morphology from dendrites to regular, banded spherulites increased with increasing PVDF content. A remarkable amount of PHB was included in the PVDF dendrites, whereas PHB was rejected into the remaining melt from the banded spherulites. When PVDF crystallized as banded spherulites, PHB could consequently crystallize only around them, if at all. In contrast, PHB crystallized with a common growth front, starting from a defined site in the interfibrillar regions of volume‐filling PVDF dendrites. It formed by itself dendritic spherulites that included a large number of PVDF spherulites. For blends with a PHB content of more than 80 wt %, for which the PVDF dendrites were not volume‐filling, PHB first formed regular spherulites. Their growth started from outside the PVDF dendrites but could later interpenetrate them, and this made their own morphology dendritic. These PHB spherulites melted stepwise because the lamellae inside the PVDF dendrites melted at a lower temperature than those from outside. This reflected the regularity of the two fractions of the lamellae because that of those inside the dendrites of PVDF was controlled by the intraspherulitic order of PVDF, whereas that from outside was only controlled by the temperature and the melt composition. The described morphologies developed without mutual nucleating efficiency of the components. © 2003 Wiley Periodicals, Inc. J Polym Sci Part B: Polym Phys 41: 873–882, 2003 相似文献
139.
A new prediction technique is proposed for chaotic time series. The usefulness of the technique is thatit can kick off some false neighbor points which are not suitable for the local estimation of the dynamics systems. Atime-delayed embedding is used to reconstruct the underlying attractor, and the prediction model is based on the timeevolution of the topological neighboring in the phase space. We use a feedforward neural network to approximate thelocal dominant Lyapunov exponent, and choose the spatial neighbors by the Lyapunov exponent. The model is testedfor the Mackey-Glass equation and the convection amplitude of lorenz systems. The results indicate that this predictiontechnique can improve the prediction of chaotic time series. 相似文献
140.
On effectiveness of wiretap programs in mapping social networks 总被引:1,自引:0,他引:1
Maksim Tsvetovat Kathleen M. Carley 《Computational & Mathematical Organization Theory》2007,13(1):63-87
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost.
Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on
Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php 相似文献