首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   481篇
  免费   27篇
化学   282篇
晶体学   3篇
力学   14篇
数学   39篇
物理学   117篇
无线电   53篇
  2022年   19篇
  2021年   18篇
  2020年   16篇
  2019年   22篇
  2018年   20篇
  2017年   19篇
  2016年   20篇
  2015年   17篇
  2014年   24篇
  2013年   36篇
  2012年   33篇
  2011年   35篇
  2010年   26篇
  2009年   23篇
  2008年   26篇
  2007年   19篇
  2006年   17篇
  2005年   15篇
  2004年   12篇
  2003年   3篇
  2002年   6篇
  2001年   8篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1997年   5篇
  1995年   7篇
  1994年   5篇
  1993年   2篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1986年   3篇
  1985年   5篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   3篇
  1979年   2篇
  1978年   3篇
  1977年   4篇
  1976年   2篇
  1975年   3篇
  1974年   1篇
  1973年   2篇
  1972年   1篇
  1971年   2篇
  1968年   1篇
  1961年   1篇
排序方式: 共有508条查询结果,搜索用时 15 毫秒
41.
We consider the model of the one-dimensional cookie random walk when the initial cookie distribution is spatially uniform and the number of cookies per site is finite. We give a criterion to decide whether the limiting speed of the walk is non-zero. In particular, we show that a positive speed may be obtained for just three cookies per site. We also prove a result on the continuity of the speed with respect to the initial cookie distribution.   相似文献   
42.
Arvind  Kavita Dorai  Anil Kumar 《Pramana》2001,56(5):L705-L713
A scheme to execute an n-bit Deutsch-Jozsa (DJ) algorithm using n qubits has been implemented for up to three qubits on an NMR quantum computer. For the one- and the two-bit Deutsch problem, the qubits do not get entangled, and the NMR implementation is achieved without using spin-spin interactions. It is for the three-bit case, that the manipulation of entangled states becomes essential. The interactions through scalar J-couplings in NMR spin systems have been exploited to implement entangling transformations required for the three bit DJ algorithm.  相似文献   
43.
This paper deals with the reliability and mean time to failure (MTTF) evaluation of a complex system under waiting incorporating the concept of hardware failure and human error. Failure rates of the complex system follow exponential time distributions, whereas repair follows a general repair time distribution. Laplace transforms of various state probabilities have been evaluated and then reliability is obtained by the inversion process. A formula for variance of time to failure has also been developed. A particular case is also given to highlight some important results. Moreover, various plots have been sketched at the end.  相似文献   
44.
An efficient [4+2] cyclization of N-methylanilines with maleimides to afford tetrahydroquinolines using N-hydroxyphthalimide as a metal-free and cheap organophotoredox catalyst is reported. The protocol involves C(sp3)H activation of N-methylanilines for the formation of α-amino radical without an oxidant at room temperature. The present method describes an easy preparation of tricyclic heterocycles in good to excellent yields under mild reaction conditions.  相似文献   
45.
A practical copper-catalyzed I-substitutions of alkyl-2-iodobenzoates with alkynes have been developed using Cu powder as a catalyst under solvent, cocatalyst, and base-free conditions. This reaction system is new, facile, efficient, and economical that gives Sonogashira coupling products in excellent yields (up to 97%). The coupled products (A–J) were characterized by CHNS, 1H NMR, and 13C NMR and are found soluble in ethyl acetate and dichloromethane. In addition, simulation studies of A–J were performed with aspulvinone dimethylallyltransferase enzyme and observe good binding affinity. The reported compounds may act as anti-cizmatics, anti-fobic in future and also have the inhibition of aspulvinone dimethylallyltransferase properties to control Alzheimer’s, Schizophrenia, etc. diseases.  相似文献   
46.
Here, we show that quorum sensing (QS) modulates the current generation of the anode-respiring bacterium Pseudomonas aeruginosa because it controls the production of phenazines, which mediate the electron transfer to the anode. The current generation by a wildtype (WT) strain P. aeruginosa PA14 and the GacS/GacA protein-regulatory mutant retS was investigated under different environmental conditions. The retS mutant generated significantly higher current (45-fold) than the WT under anaerobic conditions. Anaerobic current generation by the WT was 28-fold higher with extraneously supplied lactones (a QS-signaling molecule). Compared to anaerobic conditions, the WT with some oxygen (microaerobic conditions) exhibited enhanced phenazine production (39-fold) and current levels (48-fold). Iron-rich medium and microaerobic conditions had a negative impact on current generation by retS. All these results were directly linked to QS activity in P. aeruginosa, thus, demonstrating the importance of this bacterial communication system for current generation in BESs. We also show that BESs represent a new tool for real-time investigation of phenazine-related QS activity.  相似文献   
47.
We consider generalizations of Schützenberger’s promotion operator on the set $\mathcal{L}$ of linear extensions of a finite poset of size n. This gives rise to a strongly connected graph on $\mathcal{L}$ . By assigning weights to the edges of the graph in two different ways, we study two Markov chains, both of which are irreducible. The stationary state of one gives rise to the uniform distribution, whereas the weights of the stationary state of the other have a nice product formula. This generalizes results by Hendricks on the Tsetlin library, which corresponds to the case when the poset is the anti-chain and hence $\mathcal{L}=S_{n}$ is the full symmetric group. We also provide explicit eigenvalues of the transition matrix in general when the poset is a rooted forest. This is shown by proving that the associated monoid is $\mathcal {R}$ -trivial and then using Steinberg’s extension of Brown’s theory for Markov chains on left regular bands to $\mathcal {R}$ -trivial monoids.  相似文献   
48.
This paper presents a protocol called Software Attestation for Key Establishment (SAKE), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret cryptographic information in either node. In other words, the attacker can read and modify the entire memory contents of both nodes before SAKE executes. Further, to the best of our knowledge, SAKE is the only protocol that can perform key re-establishment after sensor nodes are compromised, because the presence of the attacker’s code in the memory of either protocol participant does not compromise the security of SAKE. Also, the attacker can perform any active or passive attack using an arbitrary number of malicious, colluding nodes. SAKE does not require any hardware modification to the sensor nodes, human mediation, or secure side channels. However, we do assume the setting of a computationally-limited attacker that does not introduce its own computationally-powerful nodes into the sensor network.SAKE is based on Indisputable Code Execution (ICE), a primitive we introduce in previous work to dynamically establish a trusted execution environment on a remote, untrusted sensor node.  相似文献   
49.
JPC – Journal of Planar Chromatography – Modern TLC - Piperine, an alkaloid with diverse biological activity commonly occurring in fruits of Piper sp., has high commercial, economical,...  相似文献   
50.
This paper deals with MTTF and availability analysis of a two-state complex general repairable system consisting of two units arranged in parallel. Single service facility is available for the service of unit failure. The failure and repair times for the system follow exponential and general distributions respectively. Laplace-transforms of the various state probabilities have been derived and steady state behaviour of the system has also been examined. Availability at any time is obtained by the inversion process. To make the system more compatible with the physical situation, MTTF for the system has also been evaluated and various graphs have been plotted to highlight the utility of the model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号