首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   559篇
  免费   8篇
  国内免费   4篇
化学   423篇
晶体学   3篇
力学   7篇
数学   44篇
物理学   94篇
  2023年   4篇
  2021年   6篇
  2019年   5篇
  2018年   8篇
  2017年   4篇
  2016年   7篇
  2015年   5篇
  2014年   7篇
  2013年   16篇
  2012年   28篇
  2011年   25篇
  2010年   20篇
  2009年   21篇
  2008年   31篇
  2007年   27篇
  2006年   49篇
  2005年   39篇
  2004年   27篇
  2003年   26篇
  2002年   16篇
  2001年   7篇
  2000年   5篇
  1999年   4篇
  1998年   11篇
  1997年   8篇
  1996年   6篇
  1995年   9篇
  1992年   5篇
  1991年   4篇
  1989年   3篇
  1988年   4篇
  1987年   5篇
  1986年   12篇
  1985年   15篇
  1984年   11篇
  1983年   3篇
  1982年   9篇
  1981年   8篇
  1980年   5篇
  1979年   10篇
  1978年   9篇
  1977年   6篇
  1974年   6篇
  1972年   2篇
  1970年   4篇
  1967年   3篇
  1965年   2篇
  1964年   5篇
  1962年   4篇
  1961年   2篇
排序方式: 共有571条查询结果,搜索用时 15 毫秒
1.
The crystallization of a complex having electron transfer properties in a polar space group can induce the polarization switching of a crystal in a specific direction, which is attractive for the development of sensors, memory devices, and capacitors. Unfortunately, the probability of crystallization in a polar space group is usually low. Noticing that enantiopure compounds crystallize in Sohncke space groups, this paper reports a strategy for the molecular design of non-ferroelectric polarization switching crystals based on the use of intramolecular electron transfer and chirality. In addition, this paper describes the synthesis of a mononuclear valence tautomeric (VT) cobalt complex bearing an enantiopure ligand. The introduction of enantiomer enables the crystallization of the complex in the polar space group (P21). The polarization of the crystals along the b-axis direction is not canceled out and the VT transition is accompanied by a change in the macroscopic polarization of the polar crystal. Polarization switching via electron transfer is realized at around room temperature.  相似文献   
2.
A linear network code is called k-secure if it is secure even if an adversary eavesdrops at most k edges. In this paper, we show an efficient deterministic construction algorithm of a linear transformation T that transforms an (insecure) linear network code to a k-secure one for any k, and extend this algorithm to strong k-security for any k . Our algorithms run in polynomial time if k is a constant, and these time complexities are explicitly presented. We also present a concrete size of \(|\mathsf{F}|\) for strong k-security, where \(\mathsf{F}\) is the underling finite field.  相似文献   
3.
We construct identity-based encryption and inner product encryption schemes under the decision linear assumption. Their private user keys are leakage-resilient in several scenarios. In particular,
  • In the bounded memory leakage model (Akavia et al., TCC, vol. 5444, pp. 474–495, 2009), our basic schemes reach the maximum-possible leakage rate \(1-o(1)\).
  • In the continual memory leakage model (Brakerski et al., Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage, 2010; Dodis et al., Cryptography against continuous memory attacks, 2010), variants of the above schemes enjoy leakage rate at least \(\frac{1}{2} -o(1)\). Among the results, we improve upon the work of Brakerski et al. by presenting adaptively secure IBE schemes.
In addition, we prove that our IBE schemes are anonymous under the DLIN assumption, so that ciphertexts leaks no information on the corresponding identities. Similarly, attributes in IPE are proved computationally hidden in the corresponding ciphertexts.
  相似文献   
4.
Nitrogen‐doped carbon materials (NDCs) play an important role in various fields. A great deal of effort has been devoted to obtaining carbon materials with a high nitrogen content; however, much is still unknown about the structure of the nitrogen‐doped materials and the maximum nitrogen content possible for such compounds. Here, we demonstrate an interesting relationship between the N/C molar ratio and the N content of NDCs. The upper limit for the nitrogen content of NDCs that might be achieved was estimated and found to strongly depend on the carbonization temperature (14.32 wt % at 1000 °C and 21.66 wt % at 900 °C), irrespective of the precursor or preparation conditions. Simulations suggest that, especially in the carbon architectures obtained at high temperatures, nitrogen atoms are always located on separate hexagon moieties in a graphitic configuration, thereby yielding a critical N/C molar ratio very close to the value estimated from the experimental results.  相似文献   
5.
It has been well recognized that to thoroughly evaluate a firm’s performance, the evaluator must assess not only its past and present records but also future potential. However, to the best of our knowledge, there are no data envelopment analysis (DEA)-type models proposed in the literature that simultaneously take past, present and, especially, future performance indicators into account. Hence, this research aims at developing a new type of DEA model referred to as Intertemporal DEA models that can be used to fully measure a firm’s efficiency by explicitly considering its key inputs and outputs involving the past-present-future time span. In this research, the proposed Intertemporal DEA models are applied to the performance evaluation of high-tech Integrated Circuit design companies in Taiwan to demonstrate their advantages over other DEA models that ignore intertemporal efficiency.  相似文献   
6.
Chiral Lewis acid-catalyzed asymmetric alcohol addition reactions to cyclic carbonyl ylides generated from N-(α-diazocarbonyl)-2-oxazolidinones featuring a dual catalytic system are reported. Construction of a chiral quaternary heteroatom-substituted carbon center was accomplished in which the unique heterobicycles were obtained in good yields with high stereoselection. The alcohol adducts were successfully converted to optically active oxazolidine-2,4-diones by hydrolysis. Mechanistic studies by DFT calculations revealed that alcohols could be activated by Lewis acids, enabling enantioselective protonation of the carbonyl ylides.  相似文献   
7.
8.
Journal of Solid State Electrochemistry - The stress variations during polarization of iron thin film electrode in pH 8.4 borate buffer solution have been measured by a cantilever bending...  相似文献   
9.
对丙烷/空气在内径2 mm的圆管内的预混燃烧进行了实验研究,借助于高速数码摄像机发现了分裂火焰现象,其中一个为向上游传播的较亮的常规火焰,另一个为向下游传播的较暗的微弱火焰。这些火焰先后熄灭,经过一段时间后又重复发生自着火、分裂、反向传播、灭火过程。这种现象在富燃、化学恰当比以及贫燃火焰中都有存在。一维非稳态计算表明化...  相似文献   
10.
This paper briefly reviews the existing methods of capacity utilization in nonparametric framework from economic perspectives, and then suggests an alternative in the light of limitations therein. In the spirit of work by Coelli et al. [Coelli, T.J., Grifell-Tatje, E., Perelman, S., 2002. Capacity utilisation and profitability: A decomposition of short run profit efficiency. International Journal of Production Economics 79, 261–278], we propose two methods, radial and non-radial, to decompose the input-based physical (technological) capacity utilization into various meaningful components viz., technical inefficiency, ray economic capacity utilization and optimal capacity idleness. A case study of Indian banking industry is taken as an example to illustrate the potential application of these two methods of decomposition. Our two broad empirical findings are that first, competition created after financial sector reforms generates high efficiency growth, and reduces excess capacity; second, the cost gap of the short-run cost from the actual cost is higher for the nationalized banks over the private banks indicating that the former banks, though old, do not reflect their learning experience in their cost minimizing behavior.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号