首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   196篇
  免费   1篇
  国内免费   2篇
化学   87篇
晶体学   15篇
力学   9篇
数学   44篇
物理学   44篇
  2023年   2篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   2篇
  2018年   4篇
  2017年   3篇
  2016年   3篇
  2015年   3篇
  2014年   3篇
  2013年   10篇
  2012年   12篇
  2011年   11篇
  2010年   9篇
  2009年   9篇
  2008年   9篇
  2007年   13篇
  2006年   11篇
  2005年   10篇
  2004年   9篇
  2003年   6篇
  2002年   8篇
  2001年   3篇
  2000年   4篇
  1999年   6篇
  1998年   2篇
  1996年   3篇
  1995年   4篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1989年   3篇
  1988年   2篇
  1987年   4篇
  1986年   11篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1981年   2篇
  1978年   2篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1970年   1篇
排序方式: 共有199条查询结果,搜索用时 0 毫秒
61.
In the paper which is divided into three parts the liquid phase epitaxy of SiC by temperature gradient zone melting with the solvent Si Tb is discussed. In the first part the solubility of SiC at different initial compositions of the Si Tb solvent is studied in the temperature range 2000–2500 K.  相似文献   
62.
63.
Integral identities for particular Bloch functions in finite periodic systems are derived. All following statements are proven for a finite domain consisting of an integer number of unit cells. It is shown that matrix elements of particular Bloch functions with respect to periodic differential operators vanish identically. The real valuedness, the time-independence and a summation property of the expectation values of periodic differential operators applied to superpositions of specific Bloch functions are derived.  相似文献   
64.
Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not previously known).  相似文献   
65.
In an exclusive measurement of the reaction gammad-->K(+)K(-)pn, a narrow peak that can be attributed to an exotic baryon with strangeness S=+1 is seen in the K(+)n invariant mass spectrum. The peak is at 1.542+/-0.005 GeV/c(2) with a measured width of 0.021 GeV/c(2) FWHM, which is largely determined by experimental mass resolution. The statistical significance of the peak is (5.2+/-0.6)sigma. The mass and width of the observed peak are consistent with recent reports of a narrow S=+1 baryon by other experimental groups.  相似文献   
66.
67.
68.
The missing linking: BCNU is a chemotherapy drug that generates an ethylene bridge between N(1) of deoxyguanosine and N(3) of deoxycytidine. No synthesis of a DNA containing this moiety has been reported until now. A new strategy uses a photocaged nucleobase that, when released, generates a highly reactive intermediate which cross-links the opposing DNA strand in a manner analogous to BCNU (see scheme, NBOC=ortho-nitrobenzyloxycarbonyl).  相似文献   
69.
The E. coli siderophore enterobactin, one of the strongest FeIII chelators known to date, is also capable of binding SiIV under physiological conditions. We report on the synthesis and structural characterization of the tris(catecholate) SiIV–enterobactin complex and its GeIV and TiIV analogues. Comparative structural analysis, supported by quantum‐chemical calculations, reveals the correlation between the ionic radius and the structural changes in enterobactin upon complexation.  相似文献   
70.
Kurilić  Miloš S.  Todorčević  Stevo 《Order》2020,37(1):59-72
Order - We show that the poset of copies $\mathbb {P} (\mathbb {Q}_{n} )=\langle \{ f[X]: f\in \text {Emb} (\mathbb {Q}_{n} ) \},\subset \rangle $ of the countable homogeneous universal n-labeled...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号