全文获取类型
收费全文 | 1477篇 |
免费 | 193篇 |
国内免费 | 62篇 |
专业分类
化学 | 105篇 |
力学 | 6篇 |
综合类 | 8篇 |
数学 | 177篇 |
物理学 | 766篇 |
无线电 | 670篇 |
出版年
2024年 | 3篇 |
2023年 | 12篇 |
2022年 | 30篇 |
2021年 | 32篇 |
2020年 | 51篇 |
2019年 | 25篇 |
2018年 | 33篇 |
2017年 | 33篇 |
2016年 | 48篇 |
2015年 | 37篇 |
2014年 | 56篇 |
2013年 | 63篇 |
2012年 | 82篇 |
2011年 | 123篇 |
2010年 | 73篇 |
2009年 | 107篇 |
2008年 | 111篇 |
2007年 | 120篇 |
2006年 | 129篇 |
2005年 | 86篇 |
2004年 | 64篇 |
2003年 | 53篇 |
2002年 | 72篇 |
2001年 | 52篇 |
2000年 | 51篇 |
1999年 | 39篇 |
1998年 | 40篇 |
1997年 | 23篇 |
1996年 | 17篇 |
1995年 | 9篇 |
1994年 | 10篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 4篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1974年 | 1篇 |
排序方式: 共有1732条查询结果,搜索用时 15 毫秒
21.
Computational schemes are presented with which to evaluate the electrostatic Coulomb energy in relativistic molecular electronic
structure calculations using a basis of four-component Dirac spinor amplitudes. We demonstrate that algorithms may be constructed
and implemented which differ only in minor details from those in common use in nonrelativistic quantum chemistry, and that
the four-component formalism is neither as complicated nor as expensive as has been suggested recently in the literature.
Spherically symmetrical atomic basis sets are presented which indicate that accurate representations of the Coulomb energy
may be obtained using modest expansions of the electronic density in a scalar auxiliary basis set of spherical harmonic Gaussian-type
functions.
Received: 15 April 2002 / Accepted: 15 May 2002 / Published online: 29 July 2002 相似文献
22.
Hanne?Heiberg Odd?GropenEmail author Jon K.?Laerdahl Ole?Swang Ulf?Wahlgren 《Theoretical chemistry accounts》2003,110(3):118-125
Different density functional theory (DFT) functionals have been evaluated by studying geometries and bond strengths of YbH, YbF, EuF, GdF, and NdF and compared with accurate CCSD(T) results and, when available, experiment. The agreement between the CCSD(T) results and experiment, when available, is good. The agreement is also good between bond strengths calculated at the DFT level using relativistic effective core potentials and the CCSD(T) results. However, the all-electron ADF calculations systematically overestimate binding energies. The geometries obtained by both the all-electron and the effective-core-potential-based DFT calculations are generally in good agreement with the CCSD(T) results.Contribution to the Björn Roos Honorary Issue 相似文献
23.
Summary The first-order polarized basis sets for the use in high-level-correlated investigations of molecular electric properties have been generated for Pb, Bi, Po, and At. The performance of the standard [10.17.14.5/13.11.8.2] and extended [20.17.14.9/13.11.8.4] basis sets has been examined in nonrelativistic and quasirelativistic calculations for atoms and simple closed-shell hydrides. The relativistic contributions to electric dipole properties of those systems have been evaluated by using the recently developed quasirelativistic scheme. The predicted dipole polarizability of At is in good agreement with the results of other relativistic calculations. The calculated quasirelativistic dipole moments of BiH3 (–0.499 a.u.), PoH2 (–0.207 a.u.), and AtH (+0.036 a.u.) involve a significant relativistic contribution which amounts to —0.230 a.u., –0.177 a.u., and –0.097 a.u., respectively. The basis set details append this paper. They are also available as a part of the basis set library of the MOLCAS system. 相似文献
24.
E. M. van Wezenbeek E. J. Baerends J. G. Snijders 《Theoretical chemistry accounts》1991,81(3):139-155
Summary Relativistic calculations on UO2 [1] have shown that relativity leads to substantial bondlengthening in this compound, in contrast to the bond contraction found almost exclusively for other compounds. The bond lengthening isnot caused by the relativistic expansion of the 5f valence AO of U, which is the primary bond forming orbital on U in UO2. The origin of the bond lengthening can be traced back to the semi-core resp. subvalence character of the U 6p AO. The valence character of 6p shows up in an increasing depopulation of the 6p upon bond shortening, and hence loss of mass-velocity stabilization. The core character of 6p shows up in large off-diagonal mass-velocity matrix elements 5p|h
MV|6p which are shown to have an overall bond lengthening effect. The larger expansion in UO2 than in UO
2
2+
is due to destabilization of U levels in UO2, caused by repulsion of the two additional 5f electrons.The present analysis corroborates the picture of relativistic bond length effects of Ref. [2]. 相似文献
25.
Summary The virial theorem for a molecule in the relativistic clamped-nuclei approximation is derived. The individual energy contributionsA (momentum energy),B (mass energy),T=A+B (kinetic energy) andV (potential energy) are expressed in terms ofE, E/R (derivate w.r.t. the nuclear coordinates) and the relativistic correction E/2 (derivative w.r.t. Sommerfield's fine-structure constant ). IfE and E/R are known as functions of , then all individual energy terms are also known as functions of . As an example, numerical results for H
2
+
are presented. The relativistic and nonrelativistic potential energy curves and the paradoxical behavior of their different contributions are analyzed and interpreted in both the largeR and shortR ranges.Dedicated to Professor W. Kutzelnigg on the occasion of his 60th birthday 相似文献
26.
27.
28.
分析了入侵容忍模型和MAFTIA体系结构及其中间件,将入侵容忍策略应用在中间件的执行过程中,保证不同系统之间具有相同的安全策略.在中间件层实现了基于门限密码技术的密钥管理服务,使得参与者只能拥有一定数量的密钥份额才能恢复密钥进行解密,防止恶意参与者的攻击行为,有效地保护了系统中信息的机密性与完整性. 相似文献
29.
将分段Logistic映射作为局部混沌映射,引入到二维耦合映像格子模型中,构造了一种具有复杂动力学特性的混沌模型.从密码学应用出发,深入分析了该模型中参数设置对Lyapunov指数、分岔、遍历区间和概率密度分布等特性的影响.分析的结果为将该模型应用于保密通信的参数设置提供了理论依据.在此基础上,通过引入状态值偏移量,解决了该模型状态值概率密度分布不均的问题,研究结果表明本文模型具有良好的性能,为将其应用于混沌保密通信方案设计提供了基础与条件. 相似文献
30.
田景成 《信息安全与通信保密》2012,(11):132-134
文章在对云计算模式与密码技术的研究基础上,进一步研究了云计算模式与密码技术的有益结合。一方面,讨论了云计算中目前应关注的主要密码应用模式,从云存储中的数据加密、虚拟机的安全、身份认证与访问控制、安全审计等关键点出发,进行了概念性的讨论;另一方面,探讨了密码技术的云化,即以云计算模式作为构建密码系统的基础支撑,整合各种安全密码设备,形成密码服务资源池,实现"密码即服务"。 相似文献