首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19273篇
  免费   3018篇
  国内免费   1090篇
化学   2545篇
晶体学   96篇
力学   1563篇
综合类   208篇
数学   7359篇
物理学   5130篇
无线电   6480篇
  2024年   33篇
  2023年   182篇
  2022年   313篇
  2021年   432篇
  2020年   550篇
  2019年   540篇
  2018年   529篇
  2017年   695篇
  2016年   769篇
  2015年   733篇
  2014年   1072篇
  2013年   1766篇
  2012年   1210篇
  2011年   1312篇
  2010年   1072篇
  2009年   1121篇
  2008年   1220篇
  2007年   1231篇
  2006年   1091篇
  2005年   966篇
  2004年   832篇
  2003年   833篇
  2002年   730篇
  2001年   633篇
  2000年   573篇
  1999年   505篇
  1998年   380篇
  1997年   345篇
  1996年   298篇
  1995年   224篇
  1994年   185篇
  1993年   140篇
  1992年   124篇
  1991年   127篇
  1990年   83篇
  1989年   63篇
  1988年   44篇
  1987年   50篇
  1986年   41篇
  1985年   71篇
  1984年   48篇
  1983年   28篇
  1982年   37篇
  1981年   38篇
  1980年   10篇
  1979年   23篇
  1978年   18篇
  1977年   17篇
  1976年   14篇
  1974年   9篇
排序方式: 共有10000条查询结果,搜索用时 977 毫秒
1.
《Mendeleev Communications》2022,32(4):534-536
Correlation times and diffusion coefficients of water molecules were measured for the first time by 1H spin relaxation and pulsed field gradient NMR in Li+, Na+ and Cs+ ionic forms of Nafion 117 membrane. Hydration numbers of Li+, Na+ and Cs+ cations were calculated. It was shown that at high humidity macroscopic transfer is controlled by the local translational motion of water molecules.  相似文献   
2.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
3.
We study the existence of a time‐periodic solution with pointwise decay properties to the Navier–Stokes equation in the whole space. We show that if the time‐periodic external force is sufficiently small in an appropriate sense, then there exists a time‐periodic solution { u , p } of the Navier–Stokes equation such that | ? j u ( t , x ) | = O ( | x | 1 ? n ? j ) and | ? j p ( t , x ) | = O ( | x | ? n ? j ) ( j = 0 , 1 , ) uniformly in t R as | x | . Our solution decays faster than the time‐periodic Stokes fundamental solution and the faster decay of its spatial derivatives of higher order is also described.  相似文献   
4.
Various products, including foods and pharmaceuticals, are sensitive to temperature fluctuations. Thus, temperature monitoring during production, transportation, and storage is critical. Facile indicators are required to monitor temperature conditions via color changes in real time. This study aimed to prepare and apply thiol-functionalized covalent organic frameworks (COFs) as a novel indicator for monitoring thermal history and temperature abuse. The COFs underwent obvious color changes from bright yellow to purple after exposure to different temperatures for varying durations. The reaction kinetics are analyzed under isothermal conditions, which reveal that the order of reaction rates is k−20°C < k4°C < k20°C < k35°C < k55°C. The activation energy (Ea) of the COFs is calculated using the Arrhenius equation as 50.71 kJ moL−1. The COFs are capable of sensitive color changes and offer a broad temperature tracking range, thereby demonstrating their application potential for the monitoring of temperature and time exposure history during production, transportation, and storage. This excellent performance thermal history indicator also shows promise for expanding the application field of COFs.  相似文献   
5.
Xueyi Guan 《中国物理 B》2022,31(7):70507-070507
In the light of the visual angle model (VAM), an improved car-following model considering driver's visual angle, anticipated time and stabilizing driving behavior is proposed so as to investigate how the driver's behavior factors affect the stability of the traffic flow. Based on the model, linear stability analysis is performed together with bifurcation analysis, whose corresponding stability condition is highly fit to the results of the linear analysis. Furthermore, the time-dependent Ginzburg-Landau (TDGL) equation and the modified Korteweg-de Vries (mKdV) equation are derived by nonlinear analysis, and we obtain the relationship of the two equations through the comparison. Finally, parameter calibration and numerical simulation are conducted to verify the validity of the theoretical analysis, whose results are highly consistent with the theoretical analysis.  相似文献   
6.
A temperature control unit was implemented to vary the temperature of samples studied on a commercial Mobile Universal Surface Explorer nuclear magnetic resonance (MOUSE-NMR) apparatus. The device was miniaturized to fit the maximum MOUSE sampling depth (25 mm). It was constituted by a sample holder sandwiched between two heat exchangers placed below and above the sample. Air was chosen as the fluid to control the temperature at the bottom of the sample, at the interface between the NMR probe and the sample holder, in order to gain space. The upper surface of the sample was regulated by the circulation of water inside a second heat exchanger placed above the sample holder. The feasibility of using such a device was demonstrated first on pure water and then on several samples of bread dough with different water contents. For this, T1 relaxation times were measured at various temperatures and depths and were then compared with those acquired with a conventional compact closed-magnet spectrometer. Discussion of results was based on biochemical transformations in bread dough (starch gelatinization and gluten heat denaturation). It was demonstrated that, within a certain water level range, and because of the low magnetic field strength of the MOUSE, a linear relationship could be established between T1 relaxation times and the local temperature in the dough sample.  相似文献   
7.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
8.
9.
《Discrete Mathematics》2021,344(12):112589
Let N be the set of positive integers. For a nonempty set A of integers and every integer u, denote by dA(u) the number of (a,a) with a,aA such that u=aa. For a sequence S of positive integers, let S(x) be the counting function of S. The set AN is called a perfect difference set if dA(u)=1 for every positive integer u. In 2008, Cilleruelo and Nathanson (2008) [4] constructed dense perfect difference sets from dense Sidon sets. In this paper, as a main result, we prove that: let f:NN be an increasing function satisfying f(n)2 for any positive integer n, then for every Sidon set B and every function ω(x), there exists a set AN such that dA(u)=f(u) for every positive integer u and B(x/3)ω(x)A(x)B(x/3)+ω(x) for all xCf,B,ω.  相似文献   
10.
We numerically solve the time-dependent Ginzburg–Landau equations for two-gap superconductors using the finite-element technique. The real-time simulation shows that at low magnetic field, the vortices in small-size samples tend to form clusters or other disorder structures. When the sample size is large, stripes appear in the pattern. These results are in good agreement with the previous experimental observations of the intriguing anomalous vortex pattern, providing a reliable theoretical basis for the future applications of multi-gap superconductors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号