首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   628篇
  免费   5篇
  国内免费   2篇
化学   245篇
晶体学   8篇
力学   32篇
数学   169篇
物理学   181篇
  2022年   3篇
  2021年   3篇
  2020年   5篇
  2019年   2篇
  2018年   39篇
  2017年   53篇
  2016年   17篇
  2015年   12篇
  2014年   9篇
  2013年   20篇
  2012年   72篇
  2011年   80篇
  2010年   43篇
  2009年   39篇
  2008年   9篇
  2007年   6篇
  2006年   7篇
  2005年   72篇
  2004年   45篇
  2003年   34篇
  2002年   9篇
  2001年   1篇
  2000年   2篇
  1999年   4篇
  1998年   3篇
  1997年   1篇
  1996年   7篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1991年   3篇
  1990年   3篇
  1989年   2篇
  1987年   3篇
  1986年   2篇
  1985年   1篇
  1984年   4篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   2篇
  1971年   1篇
  1968年   1篇
  1967年   1篇
  1937年   1篇
排序方式: 共有635条查询结果,搜索用时 171 毫秒
11.
12.
13.
14.
Letters in Mathematical Physics - We address some usually overlooked issues concerning the use of $$*$$-algebras in quantum theory and their physical interpretation. If $${\mathfrak {A}}$$ is a...  相似文献   
15.
The ligand 1,2-dimorpholinoethane (DME) was used to prepare Zn(II) and Ni(II) complexes of the general formulation MLX2 (L = DME, X = Cl or NO3). Zinc(II) complex exhibits spectral properties indicative of a distorted tetrahedral geometry, with DME coordinating through two nitrogen atoms and two chlorides completing the tetrahedron. This is in contrast to the six-coordinated, distorted octahedral geometry exhibited by nickel(II) complex of DME when NO3 was used as counter ions. The X-ray diffraction confirms the structures of two complexes and shows that the ligand coordinates through two nitrogen atoms while the two ether linkages are not involved in complexation, which would have been the case if the morpholine rings were in the boat form. The ligand and related complexes have antibacterial activity against the five Gram-positive bacteria: Bacillus subtilis ATCC 6633, Staphylococcus aureus ATCC 6538, Bacillus cereus NRRL-B-3711, Enterococcus faecalis ATCC 29212 and Streptococcus pyogenes and also against the three Gram-negative bacteria: Escherichia coli ATCC 11230, Pseudomonas aeruginosa ATCC 15442 and Klebsiella pneumonia ATCC 70063. The results showed that in some cases the antibacterial activity of the complexes exceeded the one of sulfisoxazole used as a standard.  相似文献   
16.
An indirect laser-induced method for selective removal of large copper areas from a printed circuit board is theoretically and experimentally investigated. The results show that the threshold condition for the process involves phase transition of the epoxy-based substrate resin. Optimal parameters for maximizing process speed are found and discussed.  相似文献   
17.
18.
19.
Although there exist a number of methods, such as NMR, X-ray, e.g., which explore the hydration of phospholipid bilayers, the solvent relaxation (SR) method has the advantage of simple instrumentation, easy data treatment and possibility of measuring fully hydrated samples. The main information gained from SR by the analysis of recorded “time-resolved emission spectra” (TRES) is micro-viscosity and micro-polarity of the dye microenvironment. Based on these parameters, one can draw conclusions about water structure in the bilayer. In this review, we focus on physical background of this method, on all the procedures that are needed in order to obtain relevant parameters, and on the requirements on the fluorescence dyes. Furthermore, a few recent applications (the effect of curvature, binding of antibacterial peptides and phase transition) illustrating the versatility of this method are mentioned. Moreover, limitations and potential problems are discussed.  相似文献   
20.
There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical distributions. It is our pleasure to dedicate this paper to Asher Peres on the occasion of his seventieth birthday.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号