首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   415篇
  免费   61篇
  国内免费   7篇
化学   131篇
晶体学   2篇
力学   3篇
综合类   27篇
数学   93篇
物理学   227篇
  2023年   5篇
  2022年   11篇
  2021年   18篇
  2020年   6篇
  2019年   14篇
  2018年   12篇
  2017年   30篇
  2016年   23篇
  2015年   18篇
  2014年   35篇
  2013年   33篇
  2012年   17篇
  2011年   28篇
  2010年   29篇
  2009年   26篇
  2008年   23篇
  2007年   17篇
  2006年   15篇
  2005年   13篇
  2004年   12篇
  2003年   8篇
  2002年   13篇
  2001年   10篇
  2000年   7篇
  1999年   1篇
  1998年   5篇
  1997年   2篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1986年   2篇
  1984年   1篇
  1982年   1篇
  1981年   4篇
  1979年   3篇
  1978年   8篇
  1977年   8篇
  1976年   11篇
  1974年   1篇
排序方式: 共有483条查询结果,搜索用时 15 毫秒
91.
Xiao Li 《中国物理 B》2022,31(6):64212-064212
A quantum key distribution transmitter chip based on hybrid-integration of silica planar light-wave circuit (PLC) and lithium niobates (LN) modulator PLC is presented. The silica part consists of a tunable directional coupler and 400-ps delay line, and the LN part is made up of a Y-branch, with electro-optic modulators on both arms. The two parts are facet-coupled to form an asymmetric Mach-Zehnder interferometer. We successfully encode and decode four BB84 states at 156.25-MHz repetition rate. Fast phase-encoding of 0 or $\pi $ is achieved, with interference fringe visibilities 78.53% and 82.68% for states $|+\rangle$ and $|-\rangle$, respectively. With the aid of an extra off-chip LN intensity modulator, two time-bin states are prepared and the extinction ratios are 18.65 dB and 15.46 dB for states $|0\rangle$ and $|1\rangle$, respectively.  相似文献   
92.
In this paper, we show how one of the Kyoto Protocol mechanisms, the so-called joint implementation in environmental projects, can be transformed into and studied as an infinite-dimensional quasi-variational inequality. Specifically, we examine the situation in which different countries attempt to fulfill Kyoto commitments by investing in emission reduction or emission removal projects in countries where the abatement costs are lower. We derive the equilibrium conditions and prove their characterization in terms of an infinite-dimensional quasi-variational inequality problem. Finally, we discuss the existence of solutions.  相似文献   
93.
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.  相似文献   
94.
异构IP网络中的拓扑自动搜索算法   总被引:3,自引:2,他引:1  
针对异构IP网络的拓扑结构建立了网络管理的对象模型,并在此基础上提出了在管理域中实现拓扑逻辑连接和物理连接自动搜索的算法,其中对交换域内物理连接的搜索算法弥补了当前网络管理平台仅提供逻辑连接拓扑图的不足,算法以定理及伪码的形式阐述,并给出了关键的数据结构,试验结果表明,该算法参高效,准确地生成异构IP网络的拓扑图,为智能化的网络故障和性能管理奠定了基础。  相似文献   
95.
WDM环形网络保护时间评估与优化分析   总被引:2,自引:0,他引:2  
本文用逻辑等效方法分析了使用1:1保护配置的WDM环行网络的保护倒换规程,并且对需要信令协调的WDM环行网络的保护时间进行了分析,得到了保护时间的表达式.在分析各种因素对保护时间影响的基础上,提出了优化的思路.最后还给出了环行网络的保护倒换时序和实例.  相似文献   
96.
Intracellular transport of chloride by members of the CLC transporter family involves a coupled exchange between a Cl anion and a proton (H+), which makes the transport function dependent on ambient pH. Transport activity peaks at pH 4.5 and stalls at neutral pH. However, a structure of the WT protein at acidic pH is not available, making it difficult to assess the global conformational rearrangements that support a pH-dependent gating mechanism. To enable modeling of the CLC-ec1 dimer at acidic pH, we have applied molecular dynamics simulations (MD) featuring a new force field modification scheme—termed an Equilibrium constant pH approach (ECpH). The ECpH method utilizes linear interpolation between the force field parameters of protonated and deprotonated states of titratable residues to achieve a representation of pH-dependence in a narrow range of physiological pH values. Simulations of the CLC-ec1 dimer at neutral and acidic pH comparing ECpH-MD to canonical MD, in which the pH-dependent protonation is represented by a binary scheme, substantiates the better agreement of the conformational changes and the final model with experimental data from NMR, cross-link and AFM studies, and reveals structural elements that support the gate-opening at pH 4.5, including the key glutamates Gluin and Gluex.  相似文献   
97.
Enantioselective and a highly concise total synthesis of Ambrisentan are described. The chiral auxiliary controlled enantioselective epoxidation (Azerad protocol), photochemical regioselective epoxide opening, and base mediated ester hydrolysis reactions are the key reactions.  相似文献   
98.
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.  相似文献   
99.
Analysis of a discrete-time queueing system with time-limited service   总被引:3,自引:0,他引:3  
We analyze a discrete-time, single-server queueing system in which the length of each service period is limited. The server takes a vacation when the limit expires or the queue empties, whichever occurs first. In the former case, the preempted service is resumed after the vacation without loss or creation of any work. This system models the transmission of message frames from a station on timed-token local-area networks (for example, FDDI and IEEE 802.4 token bus). We study the process of the unfinished work and the joint process of the queue size and the remaining service time. By using the technique of discrete Fourier transforms to determine some unknown functions in the governing equations, we numerically obtain exact mean waiting times.A part of the work of H. Takagi was done while he was with IBM Research, Tokyo Research Laboratory.  相似文献   
100.
In this paper, we disclose the synthesis of the dioxabicyclo[3.2.1]octane subunit of the potent antibiotic sorangicin A. The synthesis was achieved in a convergent manner in 8 steps. Regio- and stereoselective intermolecular epoxide opening, ring-closing metathesis and iodo-etherification are key steps. cis-2-Butene diol has been employed as a common staring material.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号