全文获取类型
收费全文 | 175篇 |
免费 | 5篇 |
国内免费 | 3篇 |
专业分类
化学 | 50篇 |
力学 | 7篇 |
综合类 | 3篇 |
数学 | 74篇 |
物理学 | 49篇 |
出版年
2023年 | 9篇 |
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 6篇 |
2015年 | 5篇 |
2014年 | 7篇 |
2013年 | 10篇 |
2012年 | 7篇 |
2011年 | 9篇 |
2010年 | 7篇 |
2009年 | 11篇 |
2008年 | 11篇 |
2007年 | 13篇 |
2006年 | 19篇 |
2005年 | 4篇 |
2004年 | 7篇 |
2003年 | 3篇 |
2002年 | 3篇 |
2001年 | 6篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1982年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有183条查询结果,搜索用时 31 毫秒
1.
2.
Dr. Sören Kirchgäßner Dr. Michael B. Braun Natascha Bartlick Dr. Cengiz Koç Dr. Christopher D. Reinkemeier Prof. Dr. Edward A. Lemke Prof. Dr. Thilo Stehle Prof. Dr. Dirk Schwarzer 《Angewandte Chemie (International ed. in English)》2023,62(12):e202215460
Lysine acetylation is a charge-neutralizing post-translational modification of proteins bound by bromodomains (Brds). A 1,2,4-triazole amino acid (ApmTri) was established as acetyllysine (Kac) mimic recruiting Brds of the BET family in contrast to glutamine commonly used for simulating this modification. Optimization of triazole substituents and side chain spacing allowed BET Brd recruitment to ApmTri-containing peptides with affinities similar to native substrates. Crystal structures of ApmTri-containing peptides in complex with two BET Brds revealed the binding mode which mirrored that of Kac ligands. ApmTri was genetically encoded and recombinant ApmTri-containing proteins co-enriched BRD3(2) from cellular lysates. This interaction was blocked by BET inhibitor JQ1. With genetically encoded ApmTri, biochemistry is now provided with a stable Kac mimic reflecting charge neutralization and Brd recruitment, allowing new investigations into BET proteins in vitro and in vivo. 相似文献
3.
Deokhee Kang Do-Wook Kim Joo-Chan Kim Prof. Hee-Sung Park 《Angewandte Chemie (International ed. in English)》2023,62(7):e202214815
Demand for peptide-based pharmaceuticals has been steadily increasing, but only limited success has been achieved to date. To expedite peptide-based drug discovery, we developed a general scheme for cell-based screening of cyclic peptide inhibitors armed with a user-designed warhead. We combined unnatural amino acid incorporation and split intein-mediated peptide cyclization techniques and integrated a yeast-based colorimetric screening assay to generate a new scheme that we call the custom-designed warhead-armed cyclic peptide screening platform (CWCPS). This strategy successfully discovered a potent inhibitor, CY5-6Q, that targets human histone deacetylase 8 (HDAC8) with a KD value of 15 nM. This approach can be a versatile and general platform for discovering cyclic peptide inhibitors. 相似文献
4.
Eva Borràs Joan Ferré Ricard Boqué Montserrat Mestres Laura Aceña Olga Busto 《Analytica chimica acta》2015
The ever increasing interest of consumers for safety, authenticity and quality of food commodities has driven the attention towards the analytical techniques used for analyzing these commodities. In recent years, rapid and reliable sensor, spectroscopic and chromatographic techniques have emerged that, together with multivariate and multiway chemometrics, have improved the whole control process by reducing the time of analysis and providing more informative results. In this progression of more and better information, the combination (fusion) of outputs of different instrumental techniques has emerged as a means for increasing the reliability of classification or prediction of foodstuff specifications as compared to using a single analytical technique. Although promising results have been obtained in food and beverage authentication and quality assessment, the combination of data from several techniques is not straightforward and represents an important challenge for chemometricians. This review provides a general overview of data fusion strategies that have been used in the field of food and beverage authentication and quality assessment. 相似文献
5.
This paper presents the theoretical analysis of adaptive multiuser RAKE receiver scheme in frequency selective fading channel for direct-sequence code division multiple access (DS-CDMA) system. Least mean square (LMS) algorithm is used to estimate the channel coefficients. Chaotic sequences are used as spreading sequence and corresponding bit error rate (BER) in closed form is derived for imperfect channel estimation conditions. Performances of chaotic sequences are compared with pseudorandom noise (PN) sequences. Under perfect synchronization assumption, various simulation results are shown to investigate the performance of the proposed system. 相似文献
6.
J.A.M. Naranjo N. Antequera L.G. Casado J.A. López-Ramos 《Journal of Computational and Applied Mathematics》2012
The Extended Euclidean algorithm provides a fast solution to the problem of finding the greatest common divisor of two numbers. In this paper, we present three applications of the algorithm to the security and privacy field. The first one allows one to privately distribute a secret to a set of recipients with only one multicast communication. It can be used for rekeying purposes in a Secure Multicast scenario. The second one is an authentication mechanism to be used in environments in which a public-key infrastructure is not available. Finally, the third application of the Extended Euclidean algorithm is a zero-knowledge proof that reduces the number of messages between the two parts involved, with the aid of a central server. 相似文献
7.
8.
9.
Iwan Duursma Tor Helleseth Chunming Rong Kyeongcheol Yang 《Designs, Codes and Cryptography》1999,18(1-3):103-124
For quaternary Preparata and Kerdock codes of length N=2
m
,m odd, we prove that the split complete weight enumerator for a coordinate partition into 3 and N-3 coordinates is independent of the chosen partition. The result implies that the words of a given complete weight in either a Preparata code or Kerdock code define a 3-design. 相似文献
10.
We complete A. Klapper's work on the invariant of a one-term trace form over a finite field of odd characteristic. We apply this to computing the probability of a successful impersonation attack on an authentication code proposed by C. Ding et al. (2005). 相似文献