全文获取类型
收费全文 | 299篇 |
免费 | 77篇 |
国内免费 | 5篇 |
专业分类
化学 | 87篇 |
力学 | 2篇 |
综合类 | 27篇 |
数学 | 43篇 |
物理学 | 222篇 |
出版年
2023年 | 5篇 |
2022年 | 18篇 |
2021年 | 17篇 |
2020年 | 3篇 |
2019年 | 13篇 |
2018年 | 5篇 |
2017年 | 29篇 |
2016年 | 20篇 |
2015年 | 17篇 |
2014年 | 30篇 |
2013年 | 31篇 |
2012年 | 17篇 |
2011年 | 19篇 |
2010年 | 24篇 |
2009年 | 16篇 |
2008年 | 12篇 |
2007年 | 16篇 |
2006年 | 10篇 |
2005年 | 10篇 |
2004年 | 9篇 |
2003年 | 5篇 |
2002年 | 13篇 |
2001年 | 13篇 |
2000年 | 7篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有381条查询结果,搜索用时 15 毫秒
71.
Benzyl protecting protocol was first employed in two routes for the concise synthesis of dopexamine dihydrochloride.This protecting group could be cleanly removed under mild condition and no unacceptable ion was brought to the final product.The total yield of route I was 43.8% from phenylacetic acid,while it was 54.1% of route II from 2-(3,4-bis(benzyloxy)phenyl)acetic acid.The titration purity of the final product was more than 99.5%,while any single or total impurities met the known standard of the drug by HPLC analysis.The measured residual palladium met an acceptable limit(<1 ppm) as an API for injection. 相似文献
72.
将自卫机制加入OOP成为AOP以提高CORBA中软件的强健性和防卫能力,在CORBA这个异构环境中,一个对象申请服务之后就需等待,如果应答迟迟不到则有可能永远等待下去,为避免这种现象的产生和蔓延,在客户和服务方的行为中加入超时机制(timeout mecha-nism)并采用利己或利他策略,使得对象可独立地根据当前环境和时间决定下一步骤,将这种在协作者失败的情况下仍能生存的对象称为自卫智能体,加入白卫智能体的CORBA称为CORBA~( ),由于智能体可在任何条件下生存,CORBA~( )可为用户提供可靠的服务,也就能实现CORBA~( )中软件构成的强健性。 相似文献
73.
An analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be driven to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycle are connected with the probability amplitudes of target states via trigonometrical functions and can be determined analytically. 相似文献
74.
针对Epson-G6和Staubli-TX90工业机器人,研究一种基于Socket通信的工业机器人监控系统。系统分为本地监控端和Web远程监控端。基于TCP协议和Socket通信技术,编写了机器人控制器服务端程序和MFC类库开发的客户端程序,客户端分为通讯功能模块,末端坐标轨迹存储模块和基于OpenGL类库的运动姿态展现模块。在此基础上, 基于J2EE架构和WebSocket通信协议编写了Web远程监控端程序,分为用户管理模块和实时监控模块。系统实现了机器人末端坐标轨迹的采集并远程存储至PostgreSQL数据库,同时通过逆运动学计算展现了机器人三维运动姿态,并在Web页面以动态曲线方式监控机器人的末端坐标轨迹。 相似文献
75.
传统水下通信声压异常监控网络存在无法自主完成节点的投放和回收,存储监控盲区并且无法进行动态组网,不能对异常声压进行准确的监控等较大的缺陷;为此,设计并实现了一种新的水下异常声压监控系统,系统中的通信协议基于节点间的深度信息完成数据的转发,给出了系统中监控器、CC2430 处理器、终端节点以及协调器节点的硬件设计原理并给出了系统采集数据的软件流程;系统中实现了对链路层的AODV 路由协议进行改进,增强系统对异常声压的监控性能;测试结果说明,该系统获取的声压监测星座图明显优于传统系统,在不同的干扰类型下,发射信号使用PSK调制,载波中心频率是10 kHz,采样率是50 kHz,码率是2 000 bit/s;实验结果表明:该种系统具有较低异常声压信号监控误差率,可对异常声压信道的传输特性进行较好的校正和补偿,具有较强稳定性。 相似文献
76.
Subhash Kak 《Foundations of Physics Letters》2006,19(3):293-296
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own
secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged
thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution
is also described. 相似文献
77.
In this paper, we disclose the synthesis of the dioxabicyclo[3.2.1]octane subunit of the potent antibiotic sorangicin A. The synthesis was achieved in a convergent manner in 8 steps. Regio- and stereoselective intermolecular epoxide opening, ring-closing metathesis and iodo-etherification are key steps. cis-2-Butene diol has been employed as a common staring material. 相似文献
78.
A rapid method for the extraction and determination of 90Sr in natural water, plant and sediment samples was developed using extraction chromatography and dynamic reaction cell ICP–MS,
with O2 as a reaction gas. While isobaric interference from the stable isotope 90Zr was efficiently removed by this method, interferences produced from in-cell reactions with Fe+ and Ni+ required suppression by tuneable bandpass, and in sediments, additional chromatographic separation. Method detection limits
were 0.1 pg g−1 (0.5 Bq g−1), 0.04 pg g−1(0.2 Bq g−1), and 3 pg L−1 (5 Bq L−1) for sediments, plant and water samples, respectively, and 90Sr concentrations determined by ICP–MS were in good agreement with activities determined by Cerenkov counting and with certified
reference values. While mass spectrometric determination does not rival detection limits achievable by radiometric counting,
radiometric determination of 90Sr, a pure beta-emitter, is hindered by long analysis times (several weeks); the comparatively fast analysis achieved via
ICP–MS enables same-day preparation and analysis of samples, making this an important technique for the environmental monitoring
of areas contaminated by radioactivity. 相似文献
79.
Nonlinear consensus protocols for dynamic directed networks of
multi-agent systems with fixed and switching topologies are
investigated separately in this paper. Based on the centre manifold
reduction technique, nonlinear consensus protocols are presented. We
prove that a group of agents can reach a β-consensus, the
value of which is the group decision value varying from the minimum and
the maximum values of the initial states of the agents. Moreover, we
derive the conditions to guarantee that all the agents reach a
β--consensus on a desired group decision value. Finally, a
simulation study concerning the vertical alignment manoeuvere of a
team of unmanned air vehicles is performed. Simulation results show
that the nonlinear consensus protocols proposed are more effective than
the linear protocols for the formation control of the agents and
they are an improvement over existing protocols. 相似文献
80.
Faisal A.A. El-Orany 《Physics letters. A》2010,374(8):1097-1100
In [J.S. Shaari, M. Lucamarini, M.R.B. Wahiddin, Phys. Lett. A 358 (2006) 85] the deterministic six states protocol (6DP) for quantum communication has been developed. This protocol is based on three mutually unbiased bases and four encoding operators. Information is transmitted between the users via two qubits from different bases. Three attacks have been studied; namely intercept-resend attack (IRA), double-CNOT attack (2CNOTA) and quantum man-in-the-middle attack. In this Letter, we show that the IRA and 2CNOTA are not properly addressed. For instance, we show that the probability of detecting Eve in the control mode of the IRA is 70% instead of 50% in the previous study. Moreover, in the 2CNOTA, Eve can only obtain 50% of the data not all of it as argued earlier. 相似文献