首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9846篇
  免费   554篇
  国内免费   978篇
化学   484篇
晶体学   11篇
力学   317篇
综合类   124篇
数学   4923篇
物理学   467篇
综合类   5052篇
  2024年   13篇
  2023年   89篇
  2022年   117篇
  2021年   139篇
  2020年   145篇
  2019年   171篇
  2018年   186篇
  2017年   184篇
  2016年   205篇
  2015年   215篇
  2014年   392篇
  2013年   508篇
  2012年   469篇
  2011年   558篇
  2010年   472篇
  2009年   637篇
  2008年   613篇
  2007年   692篇
  2006年   670篇
  2005年   532篇
  2004年   506篇
  2003年   499篇
  2002年   459篇
  2001年   398篇
  2000年   340篇
  1999年   320篇
  1998年   290篇
  1997年   273篇
  1996年   222篇
  1995年   152篇
  1994年   163篇
  1993年   129篇
  1992年   103篇
  1991年   99篇
  1990年   85篇
  1989年   67篇
  1988年   63篇
  1987年   36篇
  1986年   27篇
  1985年   27篇
  1984年   21篇
  1983年   13篇
  1982年   21篇
  1981年   16篇
  1980年   18篇
  1979年   5篇
  1978年   6篇
  1977年   3篇
  1976年   4篇
  1974年   3篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
51.
本文首先定义了环的中心指数的概念,然后特别讨论了中心指数是2的一些环。  相似文献   
52.
软件补偿方法具有效果好、精确度高、成本低的优点。介绍了在研制多点巡回检测仪中采用的几种软件补偿方法:前向通道特性补偿使放大器等元件不因外界条件的变化而受到任何影响;引线电阻的补偿可实现引线电阻对系统无任何影响;热电阻、热电偶的非线性度补偿效果明显,节省开销。  相似文献   
53.
Browder-Petryshyn 型的严格伪压缩映射的粘滞迭代逼近方法   总被引:1,自引:0,他引:1  
主要研究Browder-Petryshyn型的严格伪压缩映射的粘滞迭代逼近过程,证明了Browder-Petryshyn型的严格伪压缩映射的不动点集F(T)是闭凸集.在q-一致光滑且一致凸的Banach空间中,对于严格伪压缩映射T,利用徐洪坤在2004年引进的粘滞迭代得到的序列弱收敛于T的某个不动点.同时证明了Hilbert空间中Browder-Petryshyn型的严格伪压缩映射的相应迭代序列强收敛到T的某个不动点,其结果推广与改进了徐洪坤2004年的相应结果.  相似文献   
54.
We extract some properties of Mahlo’s operation and show that some other very natural operations share these properties. The weakly compact sets form a similar hierarchy as the stationary sets. The height of this hierarchy is a large cardinal property connected to saturation properties of the weakly compact ideal.  相似文献   
55.
This paper introduces a novel approach for extracting the maximum number of non-overlapping test forms from a large collection of overlapping test sections assembled from a given item bank. The approach involves solving maximum set packing problems (MSPs). A branch-and-bound MSP algorithm is developed along with techniques adapted from constraint programming to estimate lower and upper bounds on the optimal MSP solution. The algorithm is general and can be applied in other applications including combinatorial auctions. The results of computer simulations and experiments with an operational item bank are presented. An erratum to this article is available at .  相似文献   
56.
One consequence of the graph minor theorem is that for every k there exists a finite obstruction set Obs(TW?k). However, relatively little is known about these sets, and very few general obstructions are known. The ones that are known are the cliques, and graphs which are formed by removing a few edges from a clique. This paper gives several general constructions of minimal forbidden minors which are sparse in the sense that the ratio of the treewidth to the number of vertices n does not approach 1 as n approaches infinity. We accomplish this by a novel combination of using brambles to provide lower bounds and achievable sets to demonstrate upper bounds. Additionally, we determine the exact treewidth of other basic graph constructions which are not minimal forbidden minors.  相似文献   
57.
Many recent algorithmic approaches involve the construction of a differential equation model for computational purposes, typically by introducing an artificial time variable. The actual computational model involves a discretization of the now time-dependent differential system, usually employing forward Euler. The resulting dynamics of such an algorithm is then a discrete dynamics, and it is expected to be “close enough” to the dynamics of the continuous system (which is typically easier to analyze) provided that small – hence many – time steps, or iterations, are taken. Indeed, recent papers in inverse problems and image processing routinely report results requiring thousands of iterations to converge. This makes one wonder if and how the computational modeling process can be improved to better reflect the actual properties sought. In this article we elaborate on several problem instances that illustrate the above observations. Algorithms may often lend themselves to a dual interpretation, in terms of a simply discretized differential equation with artificial time and in terms of a simple optimization algorithm; such a dual interpretation can be advantageous. We show how a broader computational modeling approach may possibly lead to algorithms with improved efficiency. AMS subject classification (2000)  65L05, 65M32, 65N21, 65N22, 65D18  相似文献   
58.
We report on the simultaneous generation of phase-conjugate signals by degenerate four-wave mixing (DFWM) and holographic processes using a nanosecond pulse and a CW lasers in polyvinyl alcohol (PVA) films doped with four kinds of saturable absorbing dyes. For the pulse laser, of the four kinds of dye-doped PVA films, the erythrosine B-doped PVA and uranine doped-PVA films generate PC signals only by the DFWM process, while the other dye-doped PVA films generate PC signals simultaneously by not only the DFWM process but also the holographic process. Especially, the safranin T-doped PVA film generates strong PC signals by the holographic process. In contrast, all of the dye-doped PVA films generate the two types of PC signals for the CW laser. The fading of dye molecules is found to result in the generation of the holographic component of PC signals which governs the temporal behavior of the total PC signals.  相似文献   
59.
对覆盖广义Rough集中的隶属关系、隶属函数进行了定义,并利用隶属函数定义了集合的Rough包含与Rough相等,得到一些与Pawlak的Rough集不同的性质。  相似文献   
60.
A stable set of a graph is a vertex set in which any two vertices are not adjacent. It was proven in [A. Brandstädt, V.B. Le, T. Szymczak, The complexity of some problems related to graph 3-colorability, Discrete Appl. Math. 89 (1998) 59-73] that the following problem is NP-complete: Given a bipartite graph G, check whether G has a stable set S such thatG-Sis a tree. In this paper we prove the following problem is polynomially solvable: Given a graph G with maximum degree 3 and containing no vertices of degree 2, check whether G has a stable set S such thatG-Sis a tree. Thus we partly answer a question posed by the authors in the above paper. Moreover, we give some structural characterizations for a graph G with maximum degree 3 that has a stable set S such that G-S is a tree.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号