全文获取类型
收费全文 | 481篇 |
免费 | 27篇 |
专业分类
化学 | 282篇 |
晶体学 | 3篇 |
力学 | 14篇 |
数学 | 39篇 |
物理学 | 117篇 |
无线电 | 53篇 |
出版年
2022年 | 19篇 |
2021年 | 18篇 |
2020年 | 16篇 |
2019年 | 22篇 |
2018年 | 20篇 |
2017年 | 19篇 |
2016年 | 20篇 |
2015年 | 17篇 |
2014年 | 24篇 |
2013年 | 36篇 |
2012年 | 33篇 |
2011年 | 35篇 |
2010年 | 26篇 |
2009年 | 23篇 |
2008年 | 26篇 |
2007年 | 19篇 |
2006年 | 17篇 |
2005年 | 15篇 |
2004年 | 12篇 |
2003年 | 3篇 |
2002年 | 6篇 |
2001年 | 8篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 5篇 |
1995年 | 7篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 3篇 |
1977年 | 4篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1968年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有508条查询结果,搜索用时 15 毫秒
41.
We consider the model of the one-dimensional cookie random walk when the initial cookie distribution is spatially uniform
and the number of cookies per site is finite. We give a criterion to decide whether the limiting speed of the walk is non-zero.
In particular, we show that a positive speed may be obtained for just three cookies per site. We also prove a result on the
continuity of the speed with respect to the initial cookie distribution.
相似文献
42.
A scheme to execute an n-bit Deutsch-Jozsa (DJ) algorithm using n qubits has been implemented for up to three qubits on an NMR quantum computer. For the one- and the two-bit Deutsch problem,
the qubits do not get entangled, and the NMR implementation is achieved without using spin-spin interactions. It is for the
three-bit case, that the manipulation of entangled states becomes essential. The interactions through scalar J-couplings in NMR spin systems have been exploited to implement entangling transformations required for the three bit DJ algorithm. 相似文献
43.
This paper deals with the reliability and mean time to failure (MTTF) evaluation of a complex system under waiting incorporating the concept of hardware failure and human error. Failure rates of the complex system follow exponential time distributions, whereas repair follows a general repair time distribution. Laplace transforms of various state probabilities have been evaluated and then reliability is obtained by the inversion process. A formula for variance of time to failure has also been developed. A particular case is also given to highlight some important results. Moreover, various plots have been sketched at the end. 相似文献
44.
An efficient [4+2] cyclization of N-methylanilines with maleimides to afford tetrahydroquinolines using N-hydroxyphthalimide as a metal-free and cheap organophotoredox catalyst is reported. The protocol involves C(sp3)H activation of N-methylanilines for the formation of α-amino radical without an oxidant at room temperature. The present method describes an easy preparation of tricyclic heterocycles in good to excellent yields under mild reaction conditions. 相似文献
45.
A practical copper-catalyzed I-substitutions of alkyl-2-iodobenzoates with alkynes have been developed using Cu powder as a catalyst under solvent, cocatalyst, and base-free conditions. This reaction system is new, facile, efficient, and economical that gives Sonogashira coupling products in excellent yields (up to 97%). The coupled products (A–J) were characterized by CHNS, 1H NMR, and 13C NMR and are found soluble in ethyl acetate and dichloromethane. In addition, simulation studies of A–J were performed with aspulvinone dimethylallyltransferase enzyme and observe good binding affinity. The reported compounds may act as anti-cizmatics, anti-fobic in future and also have the inhibition of aspulvinone dimethylallyltransferase properties to control Alzheimer’s, Schizophrenia, etc. diseases. 相似文献
46.
Arvind Venkataraman Miriam Rosenbaum Jan B.A. Arends Rayko Halitschke Largus T. Angenent 《Electrochemistry communications》2010,12(3):459-462
Here, we show that quorum sensing (QS) modulates the current generation of the anode-respiring bacterium Pseudomonas aeruginosa because it controls the production of phenazines, which mediate the electron transfer to the anode. The current generation by a wildtype (WT) strain P. aeruginosa PA14 and the GacS/GacA protein-regulatory mutant retS was investigated under different environmental conditions. The retS mutant generated significantly higher current (45-fold) than the WT under anaerobic conditions. Anaerobic current generation by the WT was 28-fold higher with extraneously supplied lactones (a QS-signaling molecule). Compared to anaerobic conditions, the WT with some oxygen (microaerobic conditions) exhibited enhanced phenazine production (39-fold) and current levels (48-fold). Iron-rich medium and microaerobic conditions had a negative impact on current generation by retS. All these results were directly linked to QS activity in P. aeruginosa, thus, demonstrating the importance of this bacterial communication system for current generation in BESs. We also show that BESs represent a new tool for real-time investigation of phenazine-related QS activity. 相似文献
47.
We consider generalizations of Schützenberger’s promotion operator on the set $\mathcal{L}$ of linear extensions of a finite poset of size n. This gives rise to a strongly connected graph on $\mathcal{L}$ . By assigning weights to the edges of the graph in two different ways, we study two Markov chains, both of which are irreducible. The stationary state of one gives rise to the uniform distribution, whereas the weights of the stationary state of the other have a nice product formula. This generalizes results by Hendricks on the Tsetlin library, which corresponds to the case when the poset is the anti-chain and hence $\mathcal{L}=S_{n}$ is the full symmetric group. We also provide explicit eigenvalues of the transition matrix in general when the poset is a rooted forest. This is shown by proving that the associated monoid is $\mathcal {R}$ -trivial and then using Steinberg’s extension of Brown’s theory for Markov chains on left regular bands to $\mathcal {R}$ -trivial monoids. 相似文献
48.
This paper presents a protocol called Software Attestation for Key Establishment (SAKE), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret cryptographic information in either node. In other words, the attacker can read and modify the entire memory contents of both nodes before SAKE executes. Further, to the best of our knowledge, SAKE is the only protocol that can perform key re-establishment after sensor nodes are compromised, because the presence of the attacker’s code in the memory of either protocol participant does not compromise the security of SAKE. Also, the attacker can perform any active or passive attack using an arbitrary number of malicious, colluding nodes. SAKE does not require any hardware modification to the sensor nodes, human mediation, or secure side channels. However, we do assume the setting of a computationally-limited attacker that does not introduce its own computationally-powerful nodes into the sensor network.SAKE is based on Indisputable Code Execution (ICE), a primitive we introduce in previous work to dynamically establish a trusted execution environment on a remote, untrusted sensor node. 相似文献
49.
JPC – Journal of Planar Chromatography – Modern TLC - Piperine, an alkaloid with diverse biological activity commonly occurring in fruits of Piper sp., has high commercial, economical,... 相似文献
50.
This paper deals with MTTF and availability analysis of a two-state complex general repairable system consisting of two units arranged in parallel. Single service facility is available for the service of unit failure. The failure and repair times for the system follow exponential and general distributions respectively. Laplace-transforms of the various state probabilities have been derived and steady state behaviour of the system has also been examined. Availability at any time is obtained by the inversion process. To make the system more compatible with the physical situation, MTTF for the system has also been evaluated and various graphs have been plotted to highlight the utility of the model. 相似文献