全文获取类型
收费全文 | 232篇 |
免费 | 9篇 |
国内免费 | 9篇 |
专业分类
化学 | 143篇 |
力学 | 5篇 |
数学 | 48篇 |
物理学 | 24篇 |
无线电 | 30篇 |
出版年
2023年 | 3篇 |
2022年 | 3篇 |
2021年 | 6篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2017年 | 2篇 |
2016年 | 8篇 |
2015年 | 7篇 |
2014年 | 7篇 |
2013年 | 8篇 |
2012年 | 9篇 |
2011年 | 12篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2008年 | 15篇 |
2007年 | 17篇 |
2006年 | 9篇 |
2005年 | 11篇 |
2004年 | 11篇 |
2003年 | 8篇 |
2002年 | 12篇 |
2001年 | 3篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 3篇 |
1997年 | 7篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 5篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1988年 | 3篇 |
1987年 | 7篇 |
1982年 | 3篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1967年 | 1篇 |
1965年 | 1篇 |
1964年 | 1篇 |
1963年 | 1篇 |
排序方式: 共有250条查询结果,搜索用时 31 毫秒
21.
22.
Noor-ul Hasan Khan Mohd. Bismillah AnsariEko Adi Prasetyanto Hailian JinSang-Eon Park 《Tetrahedron: Asymmetry》2011,22(1):117-123
(1S,2S)-N1,N2-Bis(3-chlorobenzyl)cyclohexane-1,2-diamine 1a′ and (1S,2S)-N1,N2-bis(4-chlorobenzyl)cyclohexane-1,2-diamine 1b′ were used to prepare chiral Cu(II) complexes Cu-Y-1a, Cu-Y-1b, Cu-mZSM5-1a, and Cu-mZSM5-1b by a flexible ligand method using copper exchanged zeolite Y and mesoporous ZSM-5. The characterization of zeolite supported complexes was performed by microanalysis, IR-, diffuse reflectance spectroscopy (DRS), EPR spectroscopy, specific rotation and thermogravimetric analysis (TGA). The catalytic activity of these supported complexes was explored for the asymmetric nitroaldol reaction of various aldehydes with nitromethane at 0 °C. Excellent yields (up to 99%) of β-hydroxy nitroalkane with an ee of up to 94% were achieved in the case of benzaldehyde as substrate. Significantly, the performance of the supported catalyst was better in terms of enantioselectivity than the complex under homogenous conditions. The supported catalysts were recycled four times with no observable loss in performance and no leaching of the catalytically active complex during the nitroaldol reaction. 相似文献
23.
Adi Ben-Israel 《Israel Journal of Mathematics》1965,3(2):94-98
An implicit function theorem and a resulting modified Newton-Raphson method for roots of functions between finite dimensional
spaces, without assuming non-singularity of the Jacobian at the initial approximation.
Research supported by the Swope Foundation. 相似文献
24.
25.
The degree of diastereoselectivity in the wrapping of four new chiral Salan ligands to form chiral-at-metal titanium complexes ranged from mild to perfect as a function of the ligands' N substituents; the enantiomerically pure complexes catalyzed the addition of diethyl zinc to benzaldehyde in 73-76% enantiomeric excess. 相似文献
26.
Cadmium sulfide (CdS) quantum dots (QDs) are formed within poly(ethylene oxide)-block-polystyrene-block-poly (acrylic acid) (PEO-b-PS-b-PAA) triblock copolymer aggregates of different architectures. These structures are obtained starting with the same ionically cross-linked primary micelles consisting of a cadmium acrylate core, a PS shell, and a PEO corona. One morphology is a worm-shaped micelle prepared in tetrahydrofuran (THF) in which the CdS QDs are surrounded by the PAA and aligned as a loose necklace in the PS matrix. The PEO serves as a corona around the PS rod. Another structure is a multicore spherical (ca. 50 nm) water soluble PS micelle, surrounded by PEO chains. The CdS particles within these two latter structures are formed by the reaction of cadmium ions present in the acrylate cores with hydrogen sulfide. In a third structure, the CdS QDs are located on the surface of PS micelles. A fourth spherical single-core micelle structure is postulated to exist in dilute THF solutions. The dimensions in all the aggregates can be controlled by the block length. 相似文献
27.
We have combined the techniques of statistical and harmonic linearization to develop a linearized approximation theory for the calculation of the second-order statistics (i.e., autocorrelation functions and spectral densities) of nonlinear systems driven by both random and periodic forces. For the special case of a Duffing oscillator (a damped anharmonic oscillator with a cubic nonlinearity) driven by Gaussian white noise and by a sinusoidal force, explicit expressions for the renormalized (linearized) frequency, the autocorrelation function, and the spectral density of the oscillator displacement in terms of all the system parameters have been derived. We have determined the region of the parameter space in which the applied periodic force has a significant influence on the second-order statistics of the oscillator.This research was supported by the Office of Naval Research, by the National Science Foundation under grant No. CHE78-21460 and by a grant from Charles and Reneé Taubman. 相似文献
28.
An iterative method is proposed for the K facilities location problem. The problem is relaxed using probabilistic assignments, depending on the distances to the facilities. The probabilities, that decompose the problem into K single-facility location problems, are updated at each iteration together with the facility locations. The proposed method is a natural generalization of the Weiszfeld method to several facilities. 相似文献
29.
With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, which is often referred to as container infrastructures. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally, discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that Docker Swarm is currently not secured against misbehaving manager nodes. This allows a high impact, high probability privilege escalation attack, which we refer to as leadership hijacking, the possibility of which is neglected by the current cloud security literature. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the Docker Swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and, in particular, incorporate adversary immune leader election algorithms. 相似文献
30.