首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   68篇
  免费   1篇
化学   33篇
数学   31篇
物理学   5篇
  2022年   1篇
  2021年   1篇
  2020年   3篇
  2019年   2篇
  2018年   2篇
  2017年   1篇
  2016年   2篇
  2015年   6篇
  2014年   3篇
  2013年   5篇
  2012年   3篇
  2011年   3篇
  2010年   2篇
  2009年   4篇
  2008年   3篇
  2007年   6篇
  2006年   3篇
  2005年   3篇
  2004年   1篇
  2003年   4篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1998年   2篇
  1996年   1篇
  1989年   3篇
  1982年   1篇
排序方式: 共有69条查询结果,搜索用时 15 毫秒
51.
The ligninolytic enzyme system ofPhanerochaete chrysosporiun is able to decolorize several recalcitrant dyes. Three lignin peroxidase isoenzymes, LiP 3.85, LiP 4.15, and LiP 4.65, were purified by preparative isoelectric focusing from the carbon-limited culture medium ofP. chrysosporium. Based on amino terminal sequences, the purified isoenzymes correspond to the isoenzymes H8, H6, and H2, respectively, from theN-limited culture. The purified isoenzymes were used for decolorization of an azo dye, Crocein Orange G (COG). According to the kinetic data obtained, the oxidation of COG by lignin peroxidase appeared to follow Michaelis-Menten kinetics. Kinetic parameters for each isoenzyme were determined. The inactivating effect of ascending H2O2 concentrations on COG oxidation is shown to be exponential within the used concentration range. The best degree of decolorization of 100 μM COG was obtained when the H2O2 concentration was 150 μM. This was also the lowest H2O2 concentration for maximal decolorization of 100 μM COG, regardless of the amount of lignin peroxidase used in the reaction.  相似文献   
52.
Professionals in neuropsychology usually perform diagnoses of patients’ behaviour in a verbal rather than in a numerical form. This fact generates interest in decision support systems that process verbal data. It also motivates us to develop methods for the classification of such data. In this paper, we describe ways of aiding classification of a discrete set of objects, evaluated on set of criteria that may have verbal estimations, into ordered decision classes. In some situations, there is no explicit additional information available, while in others it is possible to order the criteria lexicographically. We consider both of these cases. The proposed Dichotomic Classification (DC) method is based on the principles of Verbal Decision Analysis (VDA). Verbal Decision Analysis methods are especially helpful when verbal data, in criteria values, are to be handled. When compared to the previously developed Verbal Decision Analysis classification methods, Dichotomic Classification method performs better on the same data sets and is able to cope with larger sizes of the object sets to be classified. We present an interactive classification procedure, estimate the effectiveness and computational complexity of the new method and compare it to one of the previously developed Verbal Decision Analysis methods. The developed and studied methods are implemented in the framework of a decision support system, and the results of testing on artificial sets of data are reported.  相似文献   
53.
Zero-correlation linear attack is a new method developed by Bogdanov et al. (ASIACRYPT 2012. LNCS, Springer, Berlin, 2012) for the cryptanalysis of block ciphers. In this paper we adapt the matrix method to find zero-correlation linear approximations. Then we present several zero-correlation linear approximations for 14 rounds of LBlock and describe a cryptanalysis for a reduced 22-round version of LBlock. After biclique attacks on LBlock revealed weaknesses in its key schedule, its designers presented a new version of the cipher with a revised key schedule. The attack presented in this paper does not exploit the structure of the key schedule or S-boxes used in the cipher. As a result, it is applicable to both variants of the LBlock as well as the block ciphers with analogous structures like TWINE. Moreover, we performed simulations on a small variant LBlock and present the first experimental results on the theoretical model of the multidimensional zero-correlation linear cryptanalysis method.  相似文献   
54.
Hydrolytic reactions of cyclic bis(3′‐5′)diadenylic acid (c‐di‐AMP) have been followed by Reversed phase high performance liquid chromatography (RP‐HPLC) over a wide pH range at 90 °C. Under neutral and basic conditions (pH ≥ 7), disappearance of the starting material (first‐order in [OH?]) was accompanied by formation of a mixture of adenosine 2′‐monophosphate and 3′‐monophosphate (2′‐AMP and 3′‐AMP). Under very acidic conditions (from H0 = ?0.7 to 0.2), c‐di‐AMP undergoes two parallel reactions (first‐order in [H+]): the starting material is cleaved to 2′‐AMP and 3′‐AMP and depurinated to adenine (i.e., cleavage of the N‐glycosidic bond), the former reaction being slightly faster than the latter one. At pH 1–3, isomerization to cyclic bis(2′‐5′)diadenylic acid competes with the depurination. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
55.
An enantioselective synthesis of the C(33)-C(37) tripropionate fragment of Amphotericin B has been developed in only 6 steps.  相似文献   
56.
57.
58.
Efficient, weakly and properly Pareto optimal solutions of multiobjective optimization problems can be characterized with the help of different cones. Here, contingent, tangent and normal cones as well as cones of feasible directions are used in the characterizations. The results are first presented in convex cases and then generalized to nonconvex cases by employing local concepts.  相似文献   
59.
The new signature scheme presented by the authors in [13] is the first signature scheme based on the discrete logarithm problem that gives message recovery. The purpose of this paper is to show that the message recovery feature is independent of the choice of the signature equation and that all ElGamal-type schemes have variants giving message recovery. For each of the six basic ElGamal-type signature equations five variants are presented with different properties regarding message recovery, length of commitment and strong equivalence. Moreover, the six basic signature schemes have different properties regarding security and implementation. It turns out that the scheme proposed in [13] is the only inversionless scheme whereas the message recovery variant of the DSA requires computing of inverses in both generation and verification of signatures. In general, message recovery variants can be given for ElGamal-type signature schemes over any group with large cyclic subgroup as the multiplicative group of GF(2n) or elliptic curve over a finite field.The present paper also shows how to integrate the DLP-based message recovery schemes with secret session key establishment and ElGamal encryption. In particular, it is shown that with DLP-based schemes the same functionality as with RSA can be obtained. However, the schemes are not as elegant as RSA in the sense that the signature (verification) function cannot at the same time be used as the decipherment (encipherment) function.  相似文献   
60.
Abstract

The aim of this study was to compare three different test methods for assaying the biodegradability of starch-based materials. The materials tested included some commercial starch-based materials and thermoplastic starch film prepared by extrusion from native potato starch and glycerol. Enzymatic hydrolysis was performed using excess Bacillus licheniformis α-amylase and Aspergillus niger glucoamylase at 37°C. The degree of degradation was assayed by measuring the dissolved carbohydrates and the weight loss of the samples. The head-space test was based on carbon dioxide evolution using sewage sludge as an inoculum. The composting experiments were carried out in an insulated commercial composter bin. The degradation was evaluated visually at weekly intervals, and the weight loss of the samples was measured after composting. Good correlation was found among the three different test methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号