首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   175篇
  免费   5篇
  国内免费   3篇
化学   50篇
力学   7篇
综合类   3篇
数学   74篇
物理学   49篇
  2023年   9篇
  2022年   3篇
  2021年   3篇
  2020年   4篇
  2019年   3篇
  2018年   4篇
  2017年   6篇
  2016年   6篇
  2015年   5篇
  2014年   7篇
  2013年   10篇
  2012年   7篇
  2011年   9篇
  2010年   7篇
  2009年   11篇
  2008年   11篇
  2007年   13篇
  2006年   19篇
  2005年   4篇
  2004年   7篇
  2003年   3篇
  2002年   3篇
  2001年   6篇
  2000年   3篇
  1999年   5篇
  1998年   2篇
  1997年   2篇
  1996年   4篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1982年   1篇
  1968年   1篇
排序方式: 共有183条查询结果,搜索用时 31 毫秒
1.
2.
Lysine acetylation is a charge-neutralizing post-translational modification of proteins bound by bromodomains (Brds). A 1,2,4-triazole amino acid (ApmTri) was established as acetyllysine (Kac) mimic recruiting Brds of the BET family in contrast to glutamine commonly used for simulating this modification. Optimization of triazole substituents and side chain spacing allowed BET Brd recruitment to ApmTri-containing peptides with affinities similar to native substrates. Crystal structures of ApmTri-containing peptides in complex with two BET Brds revealed the binding mode which mirrored that of Kac ligands. ApmTri was genetically encoded and recombinant ApmTri-containing proteins co-enriched BRD3(2) from cellular lysates. This interaction was blocked by BET inhibitor JQ1. With genetically encoded ApmTri, biochemistry is now provided with a stable Kac mimic reflecting charge neutralization and Brd recruitment, allowing new investigations into BET proteins in vitro and in vivo.  相似文献   
3.
Demand for peptide-based pharmaceuticals has been steadily increasing, but only limited success has been achieved to date. To expedite peptide-based drug discovery, we developed a general scheme for cell-based screening of cyclic peptide inhibitors armed with a user-designed warhead. We combined unnatural amino acid incorporation and split intein-mediated peptide cyclization techniques and integrated a yeast-based colorimetric screening assay to generate a new scheme that we call the custom-designed warhead-armed cyclic peptide screening platform (CWCPS). This strategy successfully discovered a potent inhibitor, CY5-6Q, that targets human histone deacetylase 8 (HDAC8) with a KD value of 15 nM. This approach can be a versatile and general platform for discovering cyclic peptide inhibitors.  相似文献   
4.
The ever increasing interest of consumers for safety, authenticity and quality of food commodities has driven the attention towards the analytical techniques used for analyzing these commodities. In recent years, rapid and reliable sensor, spectroscopic and chromatographic techniques have emerged that, together with multivariate and multiway chemometrics, have improved the whole control process by reducing the time of analysis and providing more informative results. In this progression of more and better information, the combination (fusion) of outputs of different instrumental techniques has emerged as a means for increasing the reliability of classification or prediction of foodstuff specifications as compared to using a single analytical technique. Although promising results have been obtained in food and beverage authentication and quality assessment, the combination of data from several techniques is not straightforward and represents an important challenge for chemometricians. This review provides a general overview of data fusion strategies that have been used in the field of food and beverage authentication and quality assessment.  相似文献   
5.
This paper presents the theoretical analysis of adaptive multiuser RAKE receiver scheme in frequency selective fading channel for direct-sequence code division multiple access (DS-CDMA) system. Least mean square (LMS) algorithm is used to estimate the channel coefficients. Chaotic sequences are used as spreading sequence and corresponding bit error rate (BER) in closed form is derived for imperfect channel estimation conditions. Performances of chaotic sequences are compared with pseudorandom noise (PN) sequences. Under perfect synchronization assumption, various simulation results are shown to investigate the performance of the proposed system.  相似文献   
6.
The Extended Euclidean algorithm provides a fast solution to the problem of finding the greatest common divisor of two numbers. In this paper, we present three applications of the algorithm to the security and privacy field. The first one allows one to privately distribute a secret to a set of recipients with only one multicast communication. It can be used for rekeying purposes in a Secure Multicast scenario. The second one is an authentication mechanism to be used in environments in which a public-key infrastructure is not available. Finally, the third application of the Extended Euclidean algorithm is a zero-knowledge proof that reduces the number of messages between the two parts involved, with the aid of a central server.  相似文献   
7.
8.
9.
For quaternary Preparata and Kerdock codes of length N=2 m ,m odd, we prove that the split complete weight enumerator for a coordinate partition into 3 and N-3 coordinates is independent of the chosen partition. The result implies that the words of a given complete weight in either a Preparata code or Kerdock code define a 3-design.  相似文献   
10.
We complete A. Klapper's work on the invariant of a one-term trace form over a finite field of odd characteristic. We apply this to computing the probability of a successful impersonation attack on an authentication code proposed by C. Ding et al. (2005).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号