首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   60000篇
  免费   11380篇
  国内免费   2185篇
化学   60618篇
晶体学   859篇
力学   1615篇
综合类   20篇
数学   5440篇
物理学   5013篇
  2024年   8篇
  2023年   10篇
  2022年   48篇
  2021年   237篇
  2020年   583篇
  2019年   2392篇
  2018年   2273篇
  2017年   2708篇
  2016年   2992篇
  2015年   5296篇
  2014年   4978篇
  2013年   6827篇
  2012年   5479篇
  2011年   5109篇
  2010年   4179篇
  2009年   3958篇
  2008年   4297篇
  2007年   3620篇
  2006年   3364篇
  2005年   3213篇
  2004年   2659篇
  2003年   2421篇
  2002年   3114篇
  2001年   1580篇
  2000年   1427篇
  1999年   608篇
  1998年   31篇
  1997年   31篇
  1996年   23篇
  1995年   13篇
  1994年   19篇
  1993年   9篇
  1992年   12篇
  1991年   7篇
  1990年   8篇
  1989年   4篇
  1988年   3篇
  1987年   4篇
  1986年   7篇
  1984年   2篇
  1983年   1篇
  1982年   4篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1971年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Let {Xk}k?1 be a strictly stationary time series. For a strictly increasing sampling function g:?→? define Yk=Xg(k) as the deterministic sub‐sampled time series. In this paper, the extreme value theory of {Yk} is studied when Xk has representation as a moving average driven by heavy‐tailed innovations. Under mild conditions, convergence results for a sequence of point processes based on {Yk} are proved and extremal properties of the deterministic sub‐sampled time series are derived. In particular, we obtain the limiting distribution of the maximum and the corresponding extremal index. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
82.
We study the probabilistic consequences of the choice of the basic number field in the quantum formalism. We demonstrate that by choosing a number field for a linear space representation of quantum model it is possible to describe various interference phenomena. We analyse interference of probabilistic alternatives induced by real, complex, hyperbolic (Clifford) and p‐adic representations.  相似文献   
83.
We establish the existence and stability of multidimensional transonic shocks for the Euler equations for steady potential compressible fluids. The Euler equations, consisting of the conservation law of mass and the Bernoulli law for the velocity, can be written as a second-order, nonlinear equation of mixed elliptic-hyperbolic type for the velocity potential. The transonic shock problem can be formulated into the following free boundary problem: The free boundary is the location of the transonic shock which divides the two regions of smooth flow, and the equation is hyperbolic in the upstream region where the smooth perturbed flow is supersonic. We develop a nonlinear approach to deal with such a free boundary problem in order to solve the transonic shock problem. Our results indicate that there exists a unique solution of the free boundary problem such that the equation is always elliptic in the downstream region and the free boundary is smooth, provided that the hyperbolic phase is close to a uniform flow. We prove that the free boundary is stable under the steady perturbation of the hyperbolic phase. We also establish the existence and stability of multidimensional transonic shocks near spherical or circular transonic shocks.

  相似文献   

84.
We investigate the dynamics of the Λ system driven by two resonant laser fields in presence of dissipation for coupling strengths where the rotating‐wave approximation starts to break down. This regime is characterised by Rabi frequencies being approximately equal or smaller than the field frequencies. A systematic procedure to obtain an expansion for the solution of the Bloch evolution equations of the system is presented. The lowest contribution results to be the well‐known rotating‐wave approximation. The method is based on a semi‐classical treatment of the problem, and its predictions are interpreted fully quantum mechanically. The theory is illustrated by a detailed study of the disappearance of coherent population trapping as the intensities of the fields increase.  相似文献   
85.
A (w,r) cover‐free family is a family of subsets of a finite set such that no intersection of w members of the family is covered by a union of r others. A (w,r) superimposed code is the incidence matrix of such a family. Such a family also arises in cryptography as the concept of key distribution pattern. In the present paper, we give some new results on superimposed codes. First we construct superimposed codes from super‐simple designs which give us results better than superimposed codes constructed by other known methods. Next we prove the uniqueness of the (1,2) superimposed code of size 9 × 12, the (2,2) superimposed code of size 14 × 8, and the (2,3) superimposed code of size 30 × 10. Finally, we improve numerical values of upper bounds for the asymptotic rate of some (w,r) superimposed codes. © 2004 Wiley Periodicals, Inc.  相似文献   
86.
In the framework of stochastic volatility models we examine estimators for the integrated volatility based on the pth power variation (i.e. the sum of pth absolute powers of the log‐returns). We derive consistency and distributional results for the estimators given high‐frequency data, especially taking into account what kind of process we may add to our model without affecting the estimate of the integrated volatility. This may on the one hand be interpreted as a possible flexibility in modelling, for example adding jumps or even leaving the framework of semimartingales by adding a fractional Brownian motion, or on the other hand as robustness against model misspecification. We will discuss possible choices of p under different model assumptions and irregularly spaced data. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
87.
The semi‐iterative method (SIM) is applied to the hyper‐power (HP) iteration, and necessary and sufficient conditions are given for the convergence of the semi‐iterative–hyper‐power (SIM–HP) iteration. The root convergence rate is computed for both the HP and SIM–HP methods, and the quotient convergence rate is given for the HP iteration. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
88.
89.
A graph G is N2locally connected if for every vertex ν in G, the edges not incident with ν but having at least one end adjacent to ν in G induce a connected graph. In 1990, Ryjá?ek conjectured that every 3‐connected N2‐locally connected claw‐free graph is Hamiltonian. This conjecture is proved in this note. © 2004 Wiley Periodicals, Inc. J Graph Theory 48: 142–146, 2005  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号