全文获取类型
收费全文 | 352篇 |
免费 | 32篇 |
国内免费 | 5篇 |
专业分类
化学 | 17篇 |
力学 | 4篇 |
综合类 | 4篇 |
数学 | 2篇 |
物理学 | 362篇 |
出版年
2022年 | 3篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2018年 | 2篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 4篇 |
2014年 | 17篇 |
2013年 | 12篇 |
2012年 | 8篇 |
2011年 | 10篇 |
2010年 | 11篇 |
2009年 | 8篇 |
2008年 | 26篇 |
2007年 | 31篇 |
2006年 | 20篇 |
2005年 | 18篇 |
2004年 | 13篇 |
2003年 | 15篇 |
2002年 | 19篇 |
2001年 | 17篇 |
2000年 | 7篇 |
1999年 | 17篇 |
1998年 | 16篇 |
1997年 | 16篇 |
1996年 | 12篇 |
1995年 | 17篇 |
1994年 | 12篇 |
1993年 | 14篇 |
1992年 | 8篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有389条查询结果,搜索用时 31 毫秒
1.
为实现对卡塞格林光学系统中的非球面主镜表面面形的高精度检测,设计了一种二元位相型计算全息图(CGH)。介绍了工作原理,对CGH的相位模型参数的优化设计、衍射次级分离以及台阶位置与深度计算等关键问题进行了讨论。通过引入虚拟玻璃的概念快速建立非球面检测模型,针对卡塞格林系统主镜中心开孔的特点,通过加入同轴载波实现了衍射次级的完全分离,相比目前常用的倾斜载波方法简化了相位量化复杂度,数值仿真计算出了最优的台阶深度,降低了加工难度。给出了相应的设计方法及实例,研制投产了CGH。测试得到主镜面形的均方根误差为0.018λ,并与传统补偿器结果(RMS=0.019λ)进行对比,两者测试结果吻合,验证了该设计与检测方法的正确性,该设计方法简单快捷,适用于卡塞格林光学系统主镜面形检测。 相似文献
2.
3.
4.
全息声压外推是Patch近场声全息技术的关键步骤.本文提出了全息声压的加权范数外推方法,该方法首先通过实测声压数据的功率谱信息构造频域加权范数,然后通过极小化频域加权范数实现全息声压外推.由于外推过程中同时利用了声压信号的波数域带宽和波数谱形状信息,因此其外推结果优于传统带限外推方法.数值仿真结果表明,该方法无论在外推精度还是计算效率上都明显优于经典的全息声压波数域外推方法.刚性箱体上的声激励固支板声压外推实验进一步验证了该方法的有效性和实用性.
关键词:
近场声全息
全息声压外推
加权范数 相似文献
5.
6.
Quantitative structure–activity relationship (QSAR) studies were conducted on an in-house database of cytochrome P450 enzyme 1A2 inhibitors using the comparative molecular field analysis (CoMFA), comparative molecular similarity analysis (CoMSIA) and hologram QSAR (HQSAR) approaches. The database consisted of 36 active molecules featuring varied core structures. The model based on the naphthalene substructure alignment incorporating 19 molecules yielded the best model with a CoMFA cross validation value q2 of 0.667 and a Pearson correlation coefficient r2 of 0.976; a CoMSIA q2 value of 0.616 and r2 value of 0.985; and a HQSAR q2 value of 0.652 and r2 value of 0.917. A second model incorporating 34 molecules aligned using the benzene substructure yielded an acceptable CoMFA model with q2 value of 0.5 and r2 value of 0.991. Depending on the core structure of the molecule under consideration, new CYP1A2 inhibitors will be designed based on the results from these models. 相似文献
7.
This paper is devoted to the study of the photochemical processes occurring during hologram formation in a biopolymer, agar doped by chromium(VI). The evolution of both the absorbing chromium species and the polymer allowed elucidating the reactions taking place during irradiation in conditions representative of hologram formation. As previously observed with dichromated poly(vinyl alcohol) (PVA), polymer containing hydroxyl groups as agar, irradiation of dichromated agar provoked a two step reduction of chromium species and the crosslinking of the host polymer. But agar has a rather complex chemical structure and the photoproducts formed along the polymeric chains throughout the photoredox process were different in agar and in PVA. The photostability of the matrix, that has been proven, coupled with the possibility to record good quality holograms, allowed us to propose dichromated agar as a new natural photosensitive biomaterial. 相似文献
8.
描述用单光束激光复活制银盐白光显示反射全息图的技术,本技术的关键:1)母全息图的颜色必须恢复到满足其布拉格条件;2)复制所用的光波与记录母全息图时的参考的相同;(3)复制所用的激光采用平行偏振,以减少界面反射;94)采用白糖溶液作为折射率匹配液,取得极佳效果。 相似文献
9.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique. 相似文献
10.