首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31600篇
  免费   4565篇
  国内免费   1917篇
化学   2816篇
晶体学   157篇
力学   5437篇
综合类   348篇
数学   13182篇
物理学   6958篇
无线电   9184篇
  2024年   51篇
  2023年   324篇
  2022年   498篇
  2021年   691篇
  2020年   897篇
  2019年   852篇
  2018年   876篇
  2017年   1059篇
  2016年   1191篇
  2015年   1099篇
  2014年   1671篇
  2013年   2754篇
  2012年   1866篇
  2011年   2042篇
  2010年   1657篇
  2009年   1797篇
  2008年   1898篇
  2007年   2009篇
  2006年   1800篇
  2005年   1651篇
  2004年   1425篇
  2003年   1418篇
  2002年   1252篇
  2001年   1097篇
  2000年   985篇
  1999年   896篇
  1998年   738篇
  1997年   640篇
  1996年   541篇
  1995年   405篇
  1994年   337篇
  1993年   238篇
  1992年   251篇
  1991年   220篇
  1990年   155篇
  1989年   106篇
  1988年   80篇
  1987年   83篇
  1986年   67篇
  1985年   105篇
  1984年   66篇
  1983年   51篇
  1982年   51篇
  1981年   46篇
  1980年   16篇
  1979年   31篇
  1978年   20篇
  1977年   20篇
  1976年   14篇
  1974年   10篇
排序方式: 共有10000条查询结果,搜索用时 598 毫秒
1.
《Mendeleev Communications》2022,32(4):534-536
Correlation times and diffusion coefficients of water molecules were measured for the first time by 1H spin relaxation and pulsed field gradient NMR in Li+, Na+ and Cs+ ionic forms of Nafion 117 membrane. Hydration numbers of Li+, Na+ and Cs+ cations were calculated. It was shown that at high humidity macroscopic transfer is controlled by the local translational motion of water molecules.  相似文献   
2.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
3.
We study the existence of a time‐periodic solution with pointwise decay properties to the Navier–Stokes equation in the whole space. We show that if the time‐periodic external force is sufficiently small in an appropriate sense, then there exists a time‐periodic solution { u , p } of the Navier–Stokes equation such that | ? j u ( t , x ) | = O ( | x | 1 ? n ? j ) and | ? j p ( t , x ) | = O ( | x | ? n ? j ) ( j = 0 , 1 , ) uniformly in t R as | x | . Our solution decays faster than the time‐periodic Stokes fundamental solution and the faster decay of its spatial derivatives of higher order is also described.  相似文献   
4.
An efficient edge based data structure has been developed in order to implement an unstructured vertex based finite volume algorithm for the Reynolds-averaged Navier–Stokes equations on hybrid meshes. In the present approach, the data structure is tailored to meet the requirements of the vertex based algorithm by considering data access patterns and cache efficiency. The required data are packed and allocated in a way that they are close to each other in the physical memory. Therefore, the proposed data structure increases cache performance and improves computation time. As a result, the explicit flow solver indicates a significant speed up compared to other open-source solvers in terms of CPU time. A fully implicit version has also been implemented based on the PETSc library in order to improve the robustness of the algorithm. The resulting algebraic equations due to the compressible Navier–Stokes and the one equation Spalart–Allmaras turbulence equations are solved in a monolithic manner using the restricted additive Schwarz preconditioner combined with the FGMRES Krylov subspace algorithm. In order to further improve the computational accuracy, the multiscale metric based anisotropic mesh refinement library PyAMG is used for mesh adaptation. The numerical algorithm is validated for the classical benchmark problems such as the transonic turbulent flow around a supercritical RAE2822 airfoil and DLR-F6 wing-body-nacelle-pylon configuration. The efficiency of the data structure is demonstrated by achieving up to an order of magnitude speed up in CPU times.  相似文献   
5.
Various products, including foods and pharmaceuticals, are sensitive to temperature fluctuations. Thus, temperature monitoring during production, transportation, and storage is critical. Facile indicators are required to monitor temperature conditions via color changes in real time. This study aimed to prepare and apply thiol-functionalized covalent organic frameworks (COFs) as a novel indicator for monitoring thermal history and temperature abuse. The COFs underwent obvious color changes from bright yellow to purple after exposure to different temperatures for varying durations. The reaction kinetics are analyzed under isothermal conditions, which reveal that the order of reaction rates is k−20°C < k4°C < k20°C < k35°C < k55°C. The activation energy (Ea) of the COFs is calculated using the Arrhenius equation as 50.71 kJ moL−1. The COFs are capable of sensitive color changes and offer a broad temperature tracking range, thereby demonstrating their application potential for the monitoring of temperature and time exposure history during production, transportation, and storage. This excellent performance thermal history indicator also shows promise for expanding the application field of COFs.  相似文献   
6.
Xueyi Guan 《中国物理 B》2022,31(7):70507-070507
In the light of the visual angle model (VAM), an improved car-following model considering driver's visual angle, anticipated time and stabilizing driving behavior is proposed so as to investigate how the driver's behavior factors affect the stability of the traffic flow. Based on the model, linear stability analysis is performed together with bifurcation analysis, whose corresponding stability condition is highly fit to the results of the linear analysis. Furthermore, the time-dependent Ginzburg-Landau (TDGL) equation and the modified Korteweg-de Vries (mKdV) equation are derived by nonlinear analysis, and we obtain the relationship of the two equations through the comparison. Finally, parameter calibration and numerical simulation are conducted to verify the validity of the theoretical analysis, whose results are highly consistent with the theoretical analysis.  相似文献   
7.
A temperature control unit was implemented to vary the temperature of samples studied on a commercial Mobile Universal Surface Explorer nuclear magnetic resonance (MOUSE-NMR) apparatus. The device was miniaturized to fit the maximum MOUSE sampling depth (25 mm). It was constituted by a sample holder sandwiched between two heat exchangers placed below and above the sample. Air was chosen as the fluid to control the temperature at the bottom of the sample, at the interface between the NMR probe and the sample holder, in order to gain space. The upper surface of the sample was regulated by the circulation of water inside a second heat exchanger placed above the sample holder. The feasibility of using such a device was demonstrated first on pure water and then on several samples of bread dough with different water contents. For this, T1 relaxation times were measured at various temperatures and depths and were then compared with those acquired with a conventional compact closed-magnet spectrometer. Discussion of results was based on biochemical transformations in bread dough (starch gelatinization and gluten heat denaturation). It was demonstrated that, within a certain water level range, and because of the low magnetic field strength of the MOUSE, a linear relationship could be established between T1 relaxation times and the local temperature in the dough sample.  相似文献   
8.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
9.
In this article, we construct and analyze a residual-based a posteriori error estimator for a quadratic finite volume method (FVM) for solving nonlinear elliptic partial differential equations with homogeneous Dirichlet boundary conditions. We shall prove that the a posteriori error estimator yields the global upper and local lower bounds for the norm error of the FVM. So that the a posteriori error estimator is equivalent to the true error in a certain sense. Numerical experiments are performed to illustrate the theoretical results.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号