首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15447篇
  免费   1849篇
  国内免费   1192篇
化学   1974篇
晶体学   37篇
力学   1651篇
综合类   186篇
数学   7751篇
物理学   3161篇
无线电   3728篇
  2024年   41篇
  2023年   211篇
  2022年   338篇
  2021年   364篇
  2020年   520篇
  2019年   445篇
  2018年   412篇
  2017年   511篇
  2016年   555篇
  2015年   512篇
  2014年   813篇
  2013年   1347篇
  2012年   839篇
  2011年   941篇
  2010年   773篇
  2009年   983篇
  2008年   987篇
  2007年   1001篇
  2006年   1019篇
  2005年   861篇
  2004年   649篇
  2003年   644篇
  2002年   523篇
  2001年   450篇
  2000年   466篇
  1999年   411篇
  1998年   355篇
  1997年   256篇
  1996年   253篇
  1995年   145篇
  1994年   137篇
  1993年   100篇
  1992年   103篇
  1991年   99篇
  1990年   59篇
  1989年   45篇
  1988年   35篇
  1987年   42篇
  1986年   29篇
  1985年   39篇
  1984年   39篇
  1983年   19篇
  1982年   22篇
  1981年   22篇
  1980年   12篇
  1979年   15篇
  1978年   16篇
  1977年   6篇
  1976年   5篇
  1974年   5篇
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
1.
《Mendeleev Communications》2022,32(4):534-536
Correlation times and diffusion coefficients of water molecules were measured for the first time by 1H spin relaxation and pulsed field gradient NMR in Li+, Na+ and Cs+ ionic forms of Nafion 117 membrane. Hydration numbers of Li+, Na+ and Cs+ cations were calculated. It was shown that at high humidity macroscopic transfer is controlled by the local translational motion of water molecules.  相似文献   
2.
3.
4.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
5.
G. Peruginelli 《代数通讯》2018,46(11):4724-4738
We classify the maximal subrings of the ring of n×n matrices over a finite field, and show that these subrings may be divided into three types. We also describe all of the maximal subrings of a finite semisimple ring, and categorize them into two classes. As an application of these results, we calculate the covering number of a finite semisimple ring.  相似文献   
6.
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。  相似文献   
7.
A (di)graph is supereulerian if it contains a spanning eulerian sub(di)graph. This property is a relaxation of hamiltonicity. Inspired by this analogy with hamiltonian cycles and by similar results in supereulerian graph theory, we analyze a number of sufficient Ore type conditions for a digraph to be supereulerian. Furthermore, we study the following conjecture due to Thomassé and the first author: if the arc‐connectivity of a digraph is not smaller than its independence number, then the digraph is supereulerian. As a support for this conjecture we prove it for digraphs that are semicomplete multipartite or quasitransitive and verify the analogous statement for undirected graphs.  相似文献   
8.
9.
10.
《Discrete Mathematics》2021,344(12):112589
Let N be the set of positive integers. For a nonempty set A of integers and every integer u, denote by dA(u) the number of (a,a) with a,aA such that u=aa. For a sequence S of positive integers, let S(x) be the counting function of S. The set AN is called a perfect difference set if dA(u)=1 for every positive integer u. In 2008, Cilleruelo and Nathanson (2008) [4] constructed dense perfect difference sets from dense Sidon sets. In this paper, as a main result, we prove that: let f:NN be an increasing function satisfying f(n)2 for any positive integer n, then for every Sidon set B and every function ω(x), there exists a set AN such that dA(u)=f(u) for every positive integer u and B(x/3)ω(x)A(x)B(x/3)+ω(x) for all xCf,B,ω.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号