首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85篇
  免费   15篇
  国内免费   24篇
化学   40篇
数学   1篇
物理学   83篇
  2022年   2篇
  2020年   3篇
  2019年   5篇
  2018年   1篇
  2016年   3篇
  2015年   4篇
  2014年   4篇
  2013年   9篇
  2012年   8篇
  2011年   10篇
  2010年   3篇
  2009年   11篇
  2008年   9篇
  2007年   3篇
  2006年   7篇
  2005年   12篇
  2004年   5篇
  2003年   4篇
  2002年   6篇
  2001年   4篇
  2000年   6篇
  1999年   1篇
  1998年   3篇
  1993年   1篇
排序方式: 共有124条查询结果,搜索用时 135 毫秒
71.
Two new steroids, named 4α,22-dimethyl-Cholest-22-en-3β-ol (1) and 4α-methyl-Cholest-7,22-dien-3β-ol (2), along with two known steroids, were isolated from the soft coral Sinularia brassica. The structures of the new compounds were determined on the basis of extensive spectroscopic data (MS, (1)H and (13)C NMR, (1)H-(1)H COSY, (13)C-(1)H COSY, HMBC and NOESY) analysis.  相似文献   
72.
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noneloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].  相似文献   
73.
We first convert the angular Teukolsky equation under the special condition of τ ≠ 0, s ≠ 0, m=0 into a confluent Heun differential equation (CHDE) by taking different function transformation and variable substitution. And then according to the characteristics of both CHDE and its analytical solution expressed by a confluent Heun function (CHF), we find two linearly dependent solutions corresponding to the same eigenstate, from which we obtain a precise energy spectrum equation by constructing a Wronskian determinant. After that, we are able to localize the positions of the eigenvalues on the real axis or on the complex plane when τ is a real number, a pure imaginary number, and a complex number, respectively and we notice that the relation between the quantum number l and the spin weight quantum number s satisfies the relation l=∣s∣+ n, n=0, 1, 2···. The exact eigenvalues and the corresponding normalized eigenfunctions given by the CHF are obtained with the aid of Maple. The features of the angular probability distribution (APD) and the linearly dependent characteristics of two eigenfunctions corresponding to the same eigenstate are discussed. We find that for a real number τ, the eigenvalue is a real number and the eigenfunction is a real function, and the eigenfunction system is an orthogonal complete system, and the APD is asymmetric in the northern and southern hemispheres. For a pure imaginary number τ, the eigenvalue is still a real number and the eigenfunction is a complex function, but the APD is symmetric in the northern and southern hemispheres. When τ is a complex number, the eigenvalue is a complex number, the eigenfunction is still a complex function, and the APD in the northern and southern hemispheres is also asymmetric. Finally, an approximate expression of complex eigenvalues is obtained when n is greater than ∣s∣.  相似文献   
74.
The irreducible bases in the icosahedral groupspace are calculated explicitly by reducing the regularrepresentation. The symmetry-adapted bases of the systemwith I or I h symmetry can becalculated easily and generally by applying those irreduciblebases to wavefunctions of the system, if they are notvanishing. As examples, the submatrices of the HuckelHamiltonians for carbon-60 and carbon-240 arerecalculated by the irreducible bases.  相似文献   
75.
以FeCl3为铁源, 葡萄糖为碳源, 钛酸四丁酯为钛源, 采用水热法制备了磁载光催化剂Fe3O4/C/TiO2, 用TEM、EDX、VSM、XRD和IR对Fe3O4/C/TiO2的粒径、形貌和物相等进行了表征。研究了该催化剂对三氯苯酚的降解性能, 探讨了其重复使用的可能性, 用荧光光谱法推测了可能的反应机理。结果表明该材料结合了光催化与可再生的优点, 1 g·L-1 Fe3O4/C/TiO2在18 W紫外灯下, 50 min内可将三氯苯酚降解97.9%以上, 6次循环使用后降解率仍保持在95.1%, 降解过程中有羟基自由基生成。  相似文献   
76.
In this work, we study the position and momentum information entropies of multiple quantum well systems in fractional Schrödinger equations, which, to the best of our knowledge, have not so far been studied. Through a confining potential, their shape and number of wells (NOW) can be controlled by using a few tuning parameters; we present some interesting quantum effects that only appear in the fractional Schrödinger equation systems. One of the parameters denoted by the Ld can affect the position and momentum probability densities if the system is fractional (1 < α < 2). We find that the position (momentum) probability density tends to be more severely localized (delocalized) in more fractional systems (ie, in smaller values of α). Affecting the Ld on the position and momentum probability densities is a quantum effect that only appears in the fractional Schrödinger equations. Finally, we show that the Beckner Bialynicki-Birula-Mycieslki (BBM) inequality in the fractional Schrödinger equation is still satisfied by changing the confining potential amplitude Vconf, the NOW, the fractional parameter α, and the confining potential parameter Ld .  相似文献   
77.
The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.  相似文献   
78.
We apply the finite key analysis to the decoy state quantum key distribution scheme and obtain a practical key rate. By simulating an practical experiment setups and the Vacuum + Weak decoy state method, we show that both the key rate and maximal secure distance are reduced when the finite key analysis is considered.  相似文献   
79.
The controllability of a quantum system for the modified Pöschl-Teller (MPT) potential with the discrete bound states is investigated. The creation and annihilation operators of this potential are constructed directly from the normalized wave function with the factorization method and associated to an su(2) algebra. It is shown that this quantum system with the nondegenerate discrete bound states can, in principle, be strongly completely controllable, i.e., the system eigenstates can be guided by the external field to approach arbitrarily close to a target state, which could be theoretically realized by the actions of the creation and annihilation operators on the ground state.  相似文献   
80.
N-(2-吡咯甲酰基)氨基酸甲酯的合成   总被引:10,自引:0,他引:10  
曾向潮  徐石海  李毅群  施文兵  邓芹英 《有机化学》2004,24(7):802-805,J004
在室温条件下,氨基酸甲酯和2-三氯乙酰基吡咯经酰基化反应,以80.3%~95.6%的产率合成了系列N-(2-吡咯甲酰基)氨基酸甲酯,通过1H NMR,IR,MS和元素分析对其结构进行了表征.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号