首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   553篇
  免费   10篇
  国内免费   60篇
化学   10篇
力学   4篇
数学   141篇
物理学   468篇
  2016年   2篇
  2015年   2篇
  2014年   1篇
  2013年   9篇
  2012年   10篇
  2011年   102篇
  2010年   79篇
  2009年   21篇
  2008年   3篇
  2007年   10篇
  2006年   14篇
  2005年   23篇
  2004年   73篇
  2003年   103篇
  2002年   71篇
  2001年   42篇
  2000年   8篇
  1999年   7篇
  1998年   19篇
  1997年   5篇
  1996年   5篇
  1995年   1篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1990年   1篇
  1989年   1篇
  1972年   1篇
  1964年   2篇
排序方式: 共有623条查询结果,搜索用时 15 毫秒
141.
虞虹  徐庆锋  纪顺俊  郎建平  孙真荣 《中国化学》2003,21(12):1591-1595
IntroductionTetrathiometallateanions [MS4 ]2 - (M =Mo ,W )andtheirclusterswithvarioustransitionmetalsarewell knownfortheirrichcoordinationchemistry ,1 7andtheirrelationtoindustrialcatalysisprocess ,8biologicalsystems ,9andNLOmaterials .10 12 However,thechemistryoftheorganometallictrisulfidecomplexes [PPh4 ][(η5 C5Me5) MS3](M =Mo ,13W14 )andtheirrelatedmixed metalclus tershavebeenlessinvestigated .15,16 Inordertoextendourknowledgeaboutthechemistryof [PPh4 ][(η5 C5Me5) MS3]andconti…  相似文献   
142.
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others.  相似文献   
143.
Ionospheric delay is one of the major error sources in GNSS navigation and positioning.Nowadays,the dual-frequency technique is the most widely used in ionospheric refraction correction.However,dual-frequency measurements can only eliminate the first-order term of ionospheric delay,while the effect of the second-order term on GNSS observations may be several centimeters.In this paper,two models,the International Reference Ionosphere (IRI) 2007 and International Geomagnetic Reference Field (IGRF) 11 are used...  相似文献   
144.
In this paper, a 2 nth-order nonlinear difference equation is considered.Using the critical point theory, we establish various sets of sufficient conditions of the nonexistence and existence of periodic solutions.Results obtained complement or improve the existing ones.  相似文献   
145.
Water-soluble light-emitting nanoparticles were prepared from hydroxyl group functionalized oligos(p-phenyleneethynylene) (OHOPEL) and water-soluble polymers(PEG,PAA,and PG) by non-covalent bond self-assembly.Their structure and optoelectronic properties were investigated through dynamic light scattering(DLS) ,UV and PL spectroscopy.The optical properties of OHOPEL-based water-soluble nanoparticles exhibited the same properties as that found in OHOPEL films,indicating the existence of interchain-aggregation...  相似文献   
146.
<正>We introduce a novel network-coding scheme that can be implemented in all-optical multicast networks.A simple and successful module based on the all-optical XOR gate is designed to realize the network coding scheme.The module is a key hardware component in realizing the proposed scheme.The working principle and the experimental results of the module are also presented.Experimental results show that the function of the module is sufficient in satisfying the requirements of the proposed network coding scheme.  相似文献   
147.
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.  相似文献   
148.
We study the optimal order of approximation for |x|α (0 < α < 1) by Lagrange interpolation polynomials based on Chebyshev nodes of the first kind. It is proved that the Jackson order of approximation is attained.  相似文献   
149.
Spectra and tilings play an important role in analysis and geometry respectively.The relations between spectra and tilings have bafied the mathematicians for a long time.Many conjectures,such as the Fuglede conjecture,are placed on the establishment of relations between spectra and tilings,although there are no desired results.In the present paper we derive some characteristic properties of spectra and tilings which highlight certain duality properties between them.  相似文献   
150.
In this article, we consider the eigenvalue problem for the bi-Kohn Laplacian and obtain universal bounds on the (k + 1)-th eigenvalue in terms of the first k eigenvalues independent of the domains.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号