首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   76516篇
  免费   3821篇
  国内免费   3801篇
化学   22443篇
晶体学   234篇
力学   4117篇
综合类   589篇
数学   8683篇
物理学   9762篇
综合类   38310篇
  2024年   265篇
  2023年   693篇
  2022年   1587篇
  2021年   1656篇
  2020年   1608篇
  2019年   1522篇
  2018年   1379篇
  2017年   1780篇
  2016年   2193篇
  2015年   2227篇
  2014年   3545篇
  2013年   4204篇
  2012年   4579篇
  2011年   4303篇
  2010年   3541篇
  2009年   4221篇
  2008年   4146篇
  2007年   5113篇
  2006年   4417篇
  2005年   4032篇
  2004年   3707篇
  2003年   3169篇
  2002年   2537篇
  2001年   2149篇
  2000年   1910篇
  1999年   1814篇
  1998年   1527篇
  1997年   1368篇
  1996年   1208篇
  1995年   1161篇
  1994年   1080篇
  1993年   888篇
  1992年   843篇
  1991年   720篇
  1990年   683篇
  1989年   548篇
  1988年   518篇
  1987年   347篇
  1986年   209篇
  1985年   168篇
  1984年   120篇
  1983年   58篇
  1982年   94篇
  1981年   54篇
  1980年   44篇
  1979年   74篇
  1978年   33篇
  1977年   14篇
  1976年   22篇
  1955年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
The stress-strain state in the zone of load transfer in a uniaxially stretched specimen made of a unidirectional epoxy carbon-fiber-reinforced plastic (CFRP) is investigated. A parametric analysis of the influence of geometric and mechanical characteristics of the specimen on its stress-strain state is performed by means of finite-element modeling. The parameters allowing us to significantly reduce the dangerous concentration of transverse and tangential stresses are revealed. The mechanical tensile characteristics of a high-strength pultruded unidirectional CFRP are determined experimentally, and the size effect of its strength is estimated.  相似文献   
22.
本文对前缘弯掠斜流转子叶顶间隙内的流动特性进行了数值分析。结果表明:叶顶间隙气流与主流发生卷吸而生成泄漏涡。泄漏涡作用的区域具有较低的压力分布。在叶片通道内,泄漏涡沿着与转子旋向相反的方向朝相邻叶片的压力面移动。大间隙时的泄漏涡比小间隙时强烈。低流量时泄漏涡的作用区域比高流量时大。在各种流量特性下,叶顶尾缘近吸力面区域都存在着二次间隙流。  相似文献   
23.
The turbulent flow in a compound meandering channel with a rectangular cross section is one of the most complicated turbulent flows, because the flow behaviour is influenced by several kinds of forces, including centrifugal forces, pressure‐driven forces and shear stresses generated by momentum transfer between the main channel and the flood plain. Numerical analysis has been performed for the fully developed turbulent flow in a compound meandering open‐channel flow using an algebraic Reynolds stress model. The boundary‐fitted coordinate system is introduced as a method for coordinate transformation in order to set the boundary conditions along the complicated shape of the meandering open channel. The turbulence model consists of transport equations for turbulent energy and dissipation, in conjunction with an algebraic stress model based on the Reynolds stress transport equations. With reference to the pressure–strain term, we have made use of a modified pressure–strain term. The boundary condition of the fluctuating vertical velocity is set to zero not only for the free surface, but also for computational grid points next to the free surface, because experimental results have shown that the fluctuating vertical velocity approaches zero near the free surface. In order to examine the validity of the present numerical method and the turbulent model, the calculated results are compared with experimental data measured by laser Doppler anemometer. In addition, the compound meandering open channel is clarified somewhat based on the calculated results. As a result of the analysis, the present algebraic Reynolds stress model is shown to be able to reasonably predict the turbulent flow in a compound meandering open channel. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
24.
本课题通过用不同的方法测定的电动势分析,经过电动势测定的误差分析,找到各种方法的利弊,并且对电极制备以及测定电动势的装置进行改进,近而对问题进行探讨。改进后找到实验和研究的捷径,从而在高等学校化学实验以及生产中节省很多的人力和财力。  相似文献   
25.
On effectiveness of wiretap programs in mapping social networks   总被引:1,自引:0,他引:1  
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost. Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php  相似文献   
26.
一种小波域音频信息隐藏方法   总被引:1,自引:0,他引:1  
提出了一种基于量化的小波域音频隐藏算法,将保密语音隐藏到载体音频中.为提高隐藏重和保密语音传输的安全性,对保密语音进行了小波域压缩编码和m序列的扩频调制,生成待隐藏的比特序列;通过量化方法,将编码和调制后的保密语音隐藏到载体音频的小波系数中;保密语音的恢复过程不需要使用原始音频、仿真结果表明,隐藏有保密语音的载体音频听觉质量没有明显下降,提取的保密语音感知质量较好;该算法对重量化、加噪、低通滤波等攻击均有良好的鲁棒性.  相似文献   
27.
This paper is devoted to the analysis of function spaces modeled on Besov spaces and their applications to non-linear partial differential equations, with emphasis on the incompressible, isotropic Navier-Stokes system and semi-linear heat equations. Specifically, we consider the class, introduced by Hideo Kozono and Masao Yamazaki, of Besov spaces based on Morrey spaces, which we call Besov-Morrey or BM spaces. We obtain equivalent representations in terms of the Weierstrass semigroup and wavelets, and various embeddings in classical spaces. We then establish pseudo-differential and para-differential estimates. Our results cover non-regular and exotic symbols. Although the heat semigroup is not strongly continuous on Morrey spaces, we show that its action defines an equivalent norm. In particular, homogeneous BM spaces belong to a larger class constructed by Grzegorz Karch to analyze scaling in parabolic equations. We compare Karch's results with those of Kozono and Yamazaki and generalize them by obtaining short-time existence and uniqueness of solutions for arbitrary data with subcritical regularity. We exploit pseudo-differential calculus to extend the analysis to compact, smooth, boundaryless, Riemannian manifolds. BM spaces are defined by means of partitions of unity and coordinate patches, and intrinsically in terms of functions of the Laplace operator.

  相似文献   

28.
详细介绍了双光头同步控制原理.对采集的伺服模块聚焦误差跟踪信号及共焦模块读写光头的聚焦线圈驱动信号进行了频域分析,并以此两路信号作为系统输入输出,分别对三种参数模型进行参数优化.根据3种模型的频率响应及阶跃响应,选择双光头同步控制过程的参数模型为[450]阶的ARX模型.实测曲线与模型仿真结果符合度(fit)为78.0259%.  相似文献   
29.
Summary Characteristics of optimal solutions under nonlinear buckling constraints are investigated by using a bar-spring model. It is demonstrated that optimization under buckling constraints of a symmetric system often leads to a structure with hill-top branching, where a limit point and bifurcation points coincide. A general formulation is derived for imperfection sensitivity of the critical load factor corresponding to a hill-top branching point. It is shown that the critical load is not imperfection-sensitive even for the case where an asymmetric bifurcation point exists at the limit point.  相似文献   
30.
提出一种新的比较框架,其中包含了一系列面向对象分析(OOA)方法共同的基本特性.以5种著名的面向对象分析方法为例,阐述了如何通过它们的特性细节,对面向对象分析方法进行分析、比较和评估.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号