首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   191篇
  免费   8篇
  国内免费   2篇
化学   139篇
晶体学   2篇
力学   6篇
数学   15篇
物理学   39篇
  2023年   6篇
  2022年   33篇
  2021年   19篇
  2020年   16篇
  2019年   16篇
  2018年   5篇
  2017年   3篇
  2016年   11篇
  2015年   10篇
  2014年   4篇
  2013年   8篇
  2012年   9篇
  2011年   10篇
  2010年   7篇
  2009年   1篇
  2008年   9篇
  2007年   4篇
  2006年   6篇
  2005年   7篇
  2004年   4篇
  2003年   3篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1994年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1982年   1篇
排序方式: 共有201条查询结果,搜索用时 15 毫秒
11.
We chose to understand the cyclic instability and rate instability issues in the promising class of Na+ conversion and alloying anodes with Sb2Se3 as a typical example. We employ a synthetic strategy that ensures efficient rGO (reduced graphene oxide) wrapping over Sb2Se3 material. By utilization of the minimum weight of additive (5 wt.% of rGO), we achieved a commendable performance with a reversible capacity of 550 mAh g−1 at a specific current of 100 mA g−1 and an impressive rate performance with 100 % capacity retention after high current cycling involving a 2 Ag−1 intermediate current step. The electrochemical galvanostatic intermittent titration technique (GITT) has been employed for the first time to draw a rationale between the enhanced performance and the increased mobility in the rGO wrapped composite (Sb2Se3-rGO) compared to bare Sb2Se3. GITT analysis reveals higher Na+ diffusion coefficients (approx. 30 fold higher) in the case of Sb2Se3-rGO as compared to bare Sb2Se3 throughout the operating voltage window. For Sb2Se3-rGO the diffusion coefficients in the range of 8.0×10−15 cm2 s−1 to 2.2×10−12 cm2 s−1 were observed, while in case of bare Sb2Se3 the diffusion coefficients in the range of 1.6×10−15 cm2 s−1 to 9.4×10−15 cm2 s−1 were observed.  相似文献   
12.
13.
The petroleum ether extract of dried ground seeds of Piper nigrum Linn. and some column fractions of this extract were subjected to GC and GC-MS analysis, resulting in the identification of fourteen compounds (1-14) by using NIST Mass spectral search program 1998 and the Kovat's retention indices. Ten of the compounds (1, 2, 4-12) are reported for the first time from this plant. All the fractions showed insecticidal activity against the fourth instar larvae of Aedes aegypti and against the fourth instar larvae of Anopheles stephensi Liston, determined by the WHO method.  相似文献   
14.
The petroleum ether extract of dried ground whole fruits of Piper nigrum L. afforded 20 compounds (1-20) including two new insecticidal amides named as pipnoohine (1), and pipyahyine (2), seven reported for the first time from this plant (12, 13, 15-17, 19, 20), and eleven known compounds (3-11, 14, 18). The structure of 1 has been elucidated as (2E,4E,12Z)-N-(4-methylpentyl)octadeca-2,4,12-trienamide and that of 2 as (2E,4E,11E)-12-(benzo[1,3]dioxol-5-yl)-N-(3-methylbutyl)dodeca-2,4,11-trien-amide through extensive ID-, 2D-NMR spectral studies and chemical reactions. The known compounds have been identified through comparison of their spectral data with those reported in literature. 1 and 2 exhibited toxicity at 35.0 and 30.0 ppm respectively against fourth instar larvae of Aedes aegypti L. by WHO method.  相似文献   
15.
The leaves of Morinda citrifolia, Linn. afforded a new benzofuran and a bis-nor-isoprenoid, blumenol C, hitherto unreported from this source. The structures of these have been elucidated as 5-benzofuran carboxylic acid-6-formyl methyl ester (1) and 4-(3'(R)-hydroxybutyl)-3,5,5, trimethyl-cyclohex-2-en-1-one (2) respectively through spectroscopic studies. The NMR data (including 1D, 2D techniques) and stereochemistry at C-3' of Compound 2 is also being reported for the first time.  相似文献   
16.
A graph G is stratified if its vertex set is partitioned into classes, called strata. If there are k strata, then G is k-stratified. These graphs were introduced to study problems in VLSI design. The strata in a stratified graph are also referred to as color classes. For a color X in a stratified graph G, the X-eccentricity e X(v) of a vertex v of G is the distance between v and an X-colored vertex furthest from v. The minimum X-eccentricity among the vertices of G is the X-radius radX G of G and the maximum X-eccentricity is the X-diameter diamX G. It is shown that for every three positive integers a, b and k with ab, there exist a k-stratified graph G with radX G = a and diamX G = b. The number s X denotes the minimum X-eccetricity among the X-colored vertices of G. It is shown that for every integer t with radX G t diamX G, there exist at least one vertex v with e X(v) = t; while if radX G t s X, then there are at least two such vertices. The X-center C X(G) is the subgraph induced by those vertices v with e X(v) = radX G and the X-periphery P X (G) is the subgraph induced by those vertices v with e X(G) = diamX G. It is shown that for k-stratified graphs H 1, H 2,..., H k with colors X 1, X 2,..., X k and a positive integer n, there exists a k-stratified graph G such that C X i(G) H i (1 ; i ; k1) and for i j. Those k-stratified graphs that are peripheries of k-stratified graphs are characterized. Other distance-related topics in stratified graphs are also discussed.  相似文献   
17.
The present investigation deals with the study of mechanical behavior of proton beam irradiated nitinol at room temperature. The specimens in austenitic phase were irradiated over periods of 15, 30, 45 and 60 min at room temperature using 2 MeV proton beam obtained from Pelletron accelerator. The stress-strain curves of both unirradiated and irradiated specimens were obtained using a universal testing machine at room temperature. The results of the experiment show that an intermediate rhombohedral (R) phase has been introduced between austenite and martensite phase, which resulted in the suppression of direct transformation from austenite to martensite (A-M). Stresses required to start R-phase (σRS) and martensitic phase (σMS) were observed to decrease with increase in exposure time. The hardness tests of samples before and after irradiation were also carried out using Vickers hardness tester. The comparison reveals that the hardness is higher in irradiated specimens than that of the unirradiated one. The increase in hardness is quite sharp in specimens irradiated for 15 min, which then increases linearly as the exposure time is increased up to 60 min. The generation of R-phase, variations in the transformation stresses σRS and σMS and increase in hardness of irradiated nitinol may be attributed to lattice disorder and associated changes in crystal structure induced by proton beam irradiation.  相似文献   
18.
Application of homomorphism to secure image sharing   总被引:1,自引:0,他引:1  
In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images (l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.  相似文献   
19.
Using an observational study of the operation of a cement kiln and a set of operational rules published by Peray and Waddell, five knowledge-based advisory systems have been developed encapsulating the supervisory expertise of the process operators. The advisory systems were developed in the logic language PROLOG. Each expert adviser was applied to a set of plant data previously logged from the kiln, and the advice offered was compared with the actions taken by the operators. Statistical tests have been applied to the outcome of the comparisons in order to determine which expert adviser emulated the operator performance most successfully. The results demonstrate the value of such tests in quantitatively validating expert systems. In addition, the supervisory techniques that the operators were using in practice were identified.  相似文献   
20.
Phytochemical investigations on a marine green alga Ulva lactuca led to the isolation of two new compounds (E)-6-heptacosen-5-one (1) and (E)-6-octadecen-5-ol (2), along with four known compounds, (Z)-10-hexacosene (3), docosanoic acid (4), palmitic acid (5), and isofucosterol (6). Compounds 3 and 4 were isolated for the first time from this species. The structures of the compounds were deduced with the help of modern spectroscopic techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号