首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   299篇
  免费   77篇
  国内免费   5篇
化学   87篇
力学   2篇
综合类   27篇
数学   43篇
物理学   222篇
  2023年   5篇
  2022年   18篇
  2021年   17篇
  2020年   3篇
  2019年   13篇
  2018年   5篇
  2017年   29篇
  2016年   20篇
  2015年   17篇
  2014年   30篇
  2013年   31篇
  2012年   17篇
  2011年   19篇
  2010年   24篇
  2009年   16篇
  2008年   12篇
  2007年   16篇
  2006年   10篇
  2005年   10篇
  2004年   9篇
  2003年   5篇
  2002年   13篇
  2001年   13篇
  2000年   7篇
  1999年   2篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   3篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1978年   1篇
排序方式: 共有381条查询结果,搜索用时 15 毫秒
71.
Benzyl protecting protocol was first employed in two routes for the concise synthesis of dopexamine dihydrochloride.This protecting group could be cleanly removed under mild condition and no unacceptable ion was brought to the final product.The total yield of route I was 43.8% from phenylacetic acid,while it was 54.1% of route II from 2-(3,4-bis(benzyloxy)phenyl)acetic acid.The titration purity of the final product was more than 99.5%,while any single or total impurities met the known standard of the drug by HPLC analysis.The measured residual palladium met an acceptable limit(<1 ppm) as an API for injection.  相似文献   
72.
将自卫机制加入OOP成为AOP以提高CORBA中软件的强健性和防卫能力,在CORBA这个异构环境中,一个对象申请服务之后就需等待,如果应答迟迟不到则有可能永远等待下去,为避免这种现象的产生和蔓延,在客户和服务方的行为中加入超时机制(timeout mecha-nism)并采用利己或利他策略,使得对象可独立地根据当前环境和时间决定下一步骤,将这种在协作者失败的情况下仍能生存的对象称为自卫智能体,加入白卫智能体的CORBA称为CORBA~( ),由于智能体可在任何条件下生存,CORBA~( )可为用户提供可靠的服务,也就能实现CORBA~( )中软件构成的强健性。  相似文献   
73.
An analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be driven to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycle are connected with the probability amplitudes of target states via trigonometrical functions and can be determined analytically.  相似文献   
74.
针对Epson-G6和Staubli-TX90工业机器人,研究一种基于Socket通信的工业机器人监控系统。系统分为本地监控端和Web远程监控端。基于TCP协议和Socket通信技术,编写了机器人控制器服务端程序和MFC类库开发的客户端程序,客户端分为通讯功能模块,末端坐标轨迹存储模块和基于OpenGL类库的运动姿态展现模块。在此基础上, 基于J2EE架构和WebSocket通信协议编写了Web远程监控端程序,分为用户管理模块和实时监控模块。系统实现了机器人末端坐标轨迹的采集并远程存储至PostgreSQL数据库,同时通过逆运动学计算展现了机器人三维运动姿态,并在Web页面以动态曲线方式监控机器人的末端坐标轨迹。  相似文献   
75.
段新华 《应用声学》2014,22(6):1812-1814
传统水下通信声压异常监控网络存在无法自主完成节点的投放和回收,存储监控盲区并且无法进行动态组网,不能对异常声压进行准确的监控等较大的缺陷;为此,设计并实现了一种新的水下异常声压监控系统,系统中的通信协议基于节点间的深度信息完成数据的转发,给出了系统中监控器、CC2430 处理器、终端节点以及协调器节点的硬件设计原理并给出了系统采集数据的软件流程;系统中实现了对链路层的AODV 路由协议进行改进,增强系统对异常声压的监控性能;测试结果说明,该系统获取的声压监测星座图明显优于传统系统,在不同的干扰类型下,发射信号使用PSK调制,载波中心频率是10 kHz,采样率是50 kHz,码率是2 000 bit/s;实验结果表明:该种系统具有较低异常声压信号监控误差率,可对异常声压信道的传输特性进行较好的校正和补偿,具有较强稳定性。  相似文献   
76.
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.  相似文献   
77.
In this paper, we disclose the synthesis of the dioxabicyclo[3.2.1]octane subunit of the potent antibiotic sorangicin A. The synthesis was achieved in a convergent manner in 8 steps. Regio- and stereoselective intermolecular epoxide opening, ring-closing metathesis and iodo-etherification are key steps. cis-2-Butene diol has been employed as a common staring material.  相似文献   
78.
A rapid method for the extraction and determination of 90Sr in natural water, plant and sediment samples was developed using extraction chromatography and dynamic reaction cell ICP–MS, with O2 as a reaction gas. While isobaric interference from the stable isotope 90Zr was efficiently removed by this method, interferences produced from in-cell reactions with Fe+ and Ni+ required suppression by tuneable bandpass, and in sediments, additional chromatographic separation. Method detection limits were 0.1 pg g−1 (0.5 Bq g−1), 0.04 pg g−1(0.2 Bq g−1), and 3 pg L−1 (5 Bq L−1) for sediments, plant and water samples, respectively, and 90Sr concentrations determined by ICP–MS were in good agreement with activities determined by Cerenkov counting and with certified reference values. While mass spectrometric determination does not rival detection limits achievable by radiometric counting, radiometric determination of 90Sr, a pure beta-emitter, is hindered by long analysis times (several weeks); the comparatively fast analysis achieved via ICP–MS enables same-day preparation and analysis of samples, making this an important technique for the environmental monitoring of areas contaminated by radioactivity.  相似文献   
79.
李玉梅  关新平 《中国物理 B》2009,18(8):3355-3366
Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonlinear consensus protocols are presented. We prove that a group of agents can reach a β-consensus, the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents. Moreover, we derive the conditions to guarantee that all the agents reach a β--consensus on a desired group decision value. Finally, a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed. Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols.  相似文献   
80.
In [J.S. Shaari, M. Lucamarini, M.R.B. Wahiddin, Phys. Lett. A 358 (2006) 85] the deterministic six states protocol (6DP) for quantum communication has been developed. This protocol is based on three mutually unbiased bases and four encoding operators. Information is transmitted between the users via two qubits from different bases. Three attacks have been studied; namely intercept-resend attack (IRA), double-CNOT attack (2CNOTA) and quantum man-in-the-middle attack. In this Letter, we show that the IRA and 2CNOTA are not properly addressed. For instance, we show that the probability of detecting Eve in the control mode of the IRA is 70% instead of 50% in the previous study. Moreover, in the 2CNOTA, Eve can only obtain 50% of the data not all of it as argued earlier.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号