首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7831篇
  免费   1343篇
  国内免费   870篇
化学   1374篇
晶体学   61篇
力学   342篇
综合类   80篇
数学   1164篇
物理学   1212篇
无线电   5811篇
  2024年   41篇
  2023年   157篇
  2022年   216篇
  2021年   239篇
  2020年   272篇
  2019年   258篇
  2018年   229篇
  2017年   289篇
  2016年   346篇
  2015年   384篇
  2014年   497篇
  2013年   650篇
  2012年   526篇
  2011年   586篇
  2010年   468篇
  2009年   538篇
  2008年   547篇
  2007年   507篇
  2006年   490篇
  2005年   389篇
  2004年   348篇
  2003年   364篇
  2002年   275篇
  2001年   243篇
  2000年   211篇
  1999年   192篇
  1998年   123篇
  1997年   108篇
  1996年   91篇
  1995年   74篇
  1994年   68篇
  1993年   45篇
  1992年   47篇
  1991年   47篇
  1990年   33篇
  1989年   28篇
  1988年   23篇
  1987年   23篇
  1986年   10篇
  1985年   9篇
  1984年   11篇
  1983年   11篇
  1982年   4篇
  1981年   3篇
  1980年   5篇
  1979年   10篇
  1978年   2篇
  1977年   2篇
  1975年   2篇
  1974年   2篇
排序方式: 共有10000条查询结果,搜索用时 406 毫秒
41.
We give a Gray code and constant average time generating algorithm for derangements, i.e., permutations with no fixed points. In our Gray code, each derangement is transformed into its successor either via one or two transpositions or a rotation of three elements. We generalize these results to permutations with number of fixed points bounded between two constants.  相似文献   
42.
In this paper low‐gain adaptive stabilization of undamped semilinear second‐order hyperbolic systems is considered in the case where the input and output operators are collocated. The linearized systems have an infinite number of poles and zeros on the imaginary axis. The adaptive stabilizer is constructed by a low‐gain adaptive velocity feedback. The closed‐loop system is governed by a non‐linear evolution equation. First, the well‐posedness of the closed‐loop system is shown. Next, an energy‐like function and a multiplier function are introduced and the exponential stability of the closed‐loop system is analysed. Some examples are given to illustrate the theory. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
43.
SD2300是兴威帆电子公司生产的一种新型高精度实时时钟芯片。TMS320F2812是TI公司最新推出的DSP芯片,该芯片广泛地运用于测控和控制场合。文中给出了基于SD2300和TMS320F2812的时钟输入、低功耗“软件时间锁”的硬件和软件设计方法。  相似文献   
44.
The covering radius of all ternary cyclic codes of length up to 25 is given. Some of the results were obtained by computer and for others mathematical reasonings were applied. The minimal distances of all codes were recalculated.  相似文献   
45.
1 Introduction  Moderndigitalcommunicationsystemsoftenrequireerror freetransmission .Errorcontrolcodingtechnologyhasbeenusedwidelyincommunicationsystem .Andithasbeenimprovingtheperformanceofcommunicationsystem greatly ,especiallyinwirelesscommunicationss…  相似文献   
46.
M. Ismail 《Pramana》1998,51(6):743-749
Fusion-evaporation cross-sections for the α-induced reactions upon197Au,193Ir,191Ir,185Re,181Ta,121Sb and69Ga nuclei at bombarding energies near the Coulomb barrier have been measured by off-line observation of the γ-rays emitted in the radioactive decay of the residual nuclei using stacked foil technique. The total fusion cross-section for the systems have been compared with simple statistical model calculations using the code ALICE/91 as well as with the coupled channel calculations that include the β2 and ν4 slatic deformations and dynamic couplings of the vibrational/rotational states of the target and the projet tile using the code CCDEF.  相似文献   
47.
Recently extremal double circulant self-dual codes have been classified for lengths n ≤ 62. In this paper, a complete classification of extremal double circulant self-dual codes of lengths 64 to 72 is presented. Almost all of the extremal double circulant singly-even codes given have weight enumerators for which extremal codes were not previously known to exist.  相似文献   
48.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
49.
In this paper, a construction of optimal constant composition codes is developed, and used to derive some series of new optimal constant composition codes meeting the upper bound given by [13].  相似文献   
50.
Tensile impact experiments of EC8.0−24×7 glass fiber bundles at different low temperaturesT(14°C, −40°C and −10°C) and strain rates ɛ were carried out, and complete stress-strain curves were obtained. Within the range of the experiment temperatures and strain rates, it is found that the initial modulusE, the ultimate strength σmax and the unstable strain ɛ b of the glass fiber bundles all increase with ɛ at an identicalT. At an identical ɛ, with the decrease ofT, E and σmax increase; but ɛ b increases when 10°C>T>−40°C and decreases when −40°C>T>−100°C. The strain-rate- and temperature-dependent bimodal Weibull statistical constitutive theory was adopted for the statistical analysis of the experimental results, and the Weibull parameters of single fiber were obtained. The results show that the bimodal Weibull distribution function is suitable to represent the strength distribution of the glass fiber at low temperature and different strain rates. The differences in the mechanical properties between EC8.0−24×7 and EC5.5−12 ×14 glass fiber bundles were also discussed. Project supported by the National Natural Science Foundation of China (No. 19772058).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号