首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   272篇
  免费   13篇
  国内免费   4篇
化学   229篇
晶体学   6篇
数学   23篇
物理学   31篇
  2023年   5篇
  2022年   8篇
  2021年   7篇
  2020年   5篇
  2019年   8篇
  2018年   8篇
  2017年   2篇
  2016年   9篇
  2015年   6篇
  2014年   7篇
  2013年   21篇
  2012年   39篇
  2011年   23篇
  2010年   13篇
  2009年   7篇
  2008年   18篇
  2007年   21篇
  2006年   12篇
  2005年   15篇
  2004年   13篇
  2003年   9篇
  2002年   10篇
  2001年   2篇
  1998年   2篇
  1997年   4篇
  1995年   1篇
  1993年   2篇
  1992年   1篇
  1990年   1篇
  1986年   1篇
  1985年   1篇
  1983年   2篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1977年   2篇
排序方式: 共有289条查询结果,搜索用时 12 毫秒
31.
The regio– and stereoselective synthesis of the keto-esters 20 and 22 are described, the latter being a potential intermediate to several diterpenes. The key steps involve the Diels-Alder cycloaddition between the benzocycloheptenone 5 and cyclopentadiene followed by a regioselective functionalisation of the adduct 6. A remarkable reversal of regioselectivity was observed during oxymercuration of the unsymmetric double bond in 6 and its reduced product 11 leading to 8 and 12 which were subsequently transformed to 20 and 22 respectively.  相似文献   
32.
Two N-methylpyridinium compounds and analogous N-protonated salts of 2- and 2,7-substituted 4-pyridyl-pyrene compounds were synthesised and their crystal structures, photophysical properties both in solution and in the solid state, electrochemical and spectroelectrochemical properties were studied. Upon methylation or protonation, the emission maxima are significantly bathochromically shifted compared to the neutral compounds, although the absorption maxima remain almost unchanged. As a result, the cationic compounds show very large apparent Stokes shifts of up to 7200 cm−1. The N-methylpyridinium compounds have a single reduction at ca. −1.5 V vs. Fc/Fc+ in MeCN. While the reduction process was reversible for the 2,7-disubstituted compound, it was irreversible for the mono-substituted one. Experimental findings are complemented by DFT and TD-DFT calculations. Furthermore, the N-methylpyridinium compounds show strong interactions with calf thymus (ct)-DNA, presumably by intercalation, which paves the way for further applications of these multi-functional compounds as potential DNA-bioactive agents.  相似文献   
33.
The reaction of RuII(PPh3)3X2 (X = Cl, Br) with o-(OH)C6H4C(H)=N-CH2C6H5 (HL) under aerobic conditions affords RuII(L)2(PPh3)2, 1, in which both the ligands (L) are bound to the metal center at the phenolic oxygen (deprotonated) and azomethine nitrogen and RuIII(L1)(L2)(PPh3), 2, in which one L is in bidentate N,O form like in complex 1 and the other ligand is in tridentate C,N,O mode where cyclometallation takes place from the ortho carbon atom (deprotonated) of the benzyl amine fragment. The complex 1 is unstable in solution, and undergoes spontaneous oxidative internal transformation to complex 2. In solid state upon heating, 1 initially converts to 2 quantitatively and further heating causes the rearrangement of complex 2 to the stable RuL3 complex. The presence of symmetry in the diamagnetic, electrically neutral complex 1 is confirmed by 1H and 31P NMR spectroscopy. It exhibits an RuII → L, MLCT transition at 460 nm and a ligand based transition at 340 nm. The complex 1 undergoes quasi-reversible ruthenium(II)—ruthenium(III) oxidation at 1.27V vs. SCE. The one-electron paramagnetic cyclometallated ruthenium(III) complex 2 displays an L → RuIII, LMCT transition at 658 nm. The ligand based transition is observed to take place at 343 nm. The complex 2 shows reversible ruthenium(III)—ruthenium(IV) oxidation at 0.875V and irreversible ruthenium(III)—ruthenium(II) reduction at −0.68V vs. SCE. It exhibits a rhombic EPR spectrum, that has been analysed to furnish values of axial (6560 cm−1) and rhombic (5630 cm−1) distortion parameters as well as the energies of the two expected ligand field transitions (3877 cm−1 and 9540 cm−1) within the t2 shell. One of the transitions has been experimentally observed in the predicted region (9090 cm−1). The first order rate constants at different temperatures and the activation parameter ΔH#S# values of the conversion process of 1 → 2 have been determined spectrophotometrically in chloroform solution.  相似文献   
34.
Let \({\mathcal{P}}\) be an ideal of closed quotients of a completely regular frame L and \({\mathcal{R}_{\mathcal{P}}(L)}\) the collection of all functions in the ring \({\mathcal{R}(L)}\) whose support belong to \({\mathcal{P}}\) . We show that \({\mathcal{R}(L)}\) is a Noetherian ring if and only if \({\mathcal{R}(L)}\) is an Artinian ring if and only if L is a finite frame. Using this result, we next show that if \({\mathcal{P}}\) is the ideal of all compact closed quotients of L and L is \({\mathcal{P}}\) -continuous, then \({\mathcal{R}_{\mathcal{P}}(L)}\) is a Noetherian ring if and only if L is finite. Moreover, we show that L is a P-frame if and only if each ideal of \({\mathcal{R}(L)}\) is of the form \({\mathcal{R}_{\mathcal{P}}(L)}\) for some choice of \({\mathcal{P}}\) . We furnish equivalent conditions for \({\mathcal{R}_{\mathcal{P}}(L)}\) to be a prime ideal, a free ideal, and an essential ideal of \({\mathcal{R}(L)}\) separately in terms of the cozero elements of L. Finally, we show that L is basically disconnected if and only if \({\mathcal{R}(L)}\) is a coherent ring.  相似文献   
35.
This paper considers security implications of k-normal Boolean functions when they are employed in certain stream ciphers. A generic algorithm is proposed for cryptanalysis of the considered class of stream ciphers based on a security weakness of k-normal Boolean functions. The proposed algorithm yields a framework for mounting cryptanalysis against particular stream ciphers within the considered class. Also, the proposed algorithm for cryptanalysis implies certain design guidelines for avoiding certain weak stream cipher constructions. A particular objective of this paper is security evaluation of stream cipher Grain-128 employing the developed generic algorithm. Contrary to the best known attacks against Grain-128 which provide complexity of a secret key recovery lower than exhaustive search only over a subset of secret keys which is just a fraction (up to 5%) of all possible secret keys, the cryptanalysis proposed in this paper provides significantly lower complexity than exhaustive search for any secret key. The proposed approach for cryptanalysis primarily depends on the order of normality of the employed Boolean function in Grain-128. Accordingly, in addition to the security evaluation insights of Grain-128, the results of this paper are also an evidence of the cryptographic significance of the normality criteria of Boolean functions.  相似文献   
36.
Revenue management and dynamic pricing are concepts that have immense possibilities for application in the energy sector. Both can be considered as demand-side management tools that can facilitate the offering of different prices at different demand levels. This paper studies literature on various topics related to the dynamic pricing of electricity and lists future research avenues in pricing policies, consumers’ willingness to pay and market segmentation in this field. Demand and price forecasting play an important role in determining prices and scheduling load in dynamic pricing environments. This allows different forms of dynamic pricing policies to different markets and customers depending on customers’ willingness to pay. Consumers’ willingness to pay for electricity services is also necessary in setting price limits depending on the demand and demand response curve. Market segmentation can enhance the effects of such pricing schemes. Appropriate scheduling of electrical load enhances the consumer response to dynamic tariffs.  相似文献   
37.
38.
It is well known that the Hochschild cohomology of an associative algebra admits a G-algebra structure. In this paper we show that the dialgebra cohomology of an associative dialgebra has a similar structure, which is induced from a homotopy G-algebra structure on the dialgebra cochain complex .

  相似文献   

39.
We consider the class \(\Sigma (p)\) of univalent meromorphic functions f on \({\mathbb D}\) having a simple pole at \(z=p\in [0,1)\) with residue 1. Let \(\Sigma _k(p)\) be the class of functions in \(\Sigma (p)\) which have k-quasiconformal extension to the extended complex plane \({\hat{\mathbb C}}\), where \(0\le k < 1\). We first give a representation formula for functions in this class and using this formula, we derive an asymptotic estimate of the Laurent coefficients for the functions in the class \(\Sigma _k(p)\). Thereafter, we give a sufficient condition for functions in \(\Sigma (p)\) to belong to the class \(\Sigma _k(p).\) Finally, we obtain a sharp distortion result for functions in \(\Sigma (p)\) and as a consequence, we obtain a distortion estimate for functions in \(\Sigma _k(p).\)  相似文献   
40.
In this paper, we study HC-128 in detail from cryptanalytic point of view. First, we use linear approximation of the addition modulo 2 n of three n-bit integers to identify linear approximations of g 1, g 2, the feedback functions of HC-128. This, in turn, shows that the process of keystream output generation of HC-128 can be well approximated by linear functions. In this direction, we show that the ??least significant bit?? based distinguisher (presented by the designer himself) of HC-128 works for the complete 32-bit word. Using the above linear approximations of g 1, g 2, we present a new distinguisher for HC-128 which is slightly weaker than Wu??s distinguisher. Finally, in the line of Dunkelman??s observation, we also study how HC-128 keystream words leak secret state information of the cipher due to the properties of the functions h 1, h 2 and present improved results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号