首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1180篇
  免费   205篇
  国内免费   17篇
化学   70篇
晶体学   2篇
力学   61篇
综合类   16篇
数学   44篇
物理学   120篇
无线电   1089篇
  2024年   2篇
  2023年   16篇
  2022年   33篇
  2021年   42篇
  2020年   54篇
  2019年   34篇
  2018年   41篇
  2017年   57篇
  2016年   54篇
  2015年   70篇
  2014年   116篇
  2013年   89篇
  2012年   90篇
  2011年   98篇
  2010年   79篇
  2009年   66篇
  2008年   98篇
  2007年   76篇
  2006年   57篇
  2005年   48篇
  2004年   48篇
  2003年   31篇
  2002年   22篇
  2001年   11篇
  2000年   22篇
  1999年   12篇
  1998年   3篇
  1997年   6篇
  1996年   7篇
  1995年   4篇
  1994年   2篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   1篇
  1984年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有1402条查询结果,搜索用时 437 毫秒
11.
It is usually reported that reaction between carbonyl and P2S5 produce thiono group compound. The Products from carbonyl after ammonolysis and hydrazinolysis have the very import applied value in the synthesize of heterocyclic compound. Sulfuration reation if a nucleophilic attack, SPS2 anionsid obtained from P2S5 in the organic sovent, rather easier than thereationsof scheeren’s reagent. The reation mechanism is as follows: The reation speed has something todo with the electronegative of…  相似文献   
12.
13.
The reaction of different epoxides with commercially available imidazole at 60 °C leads to the formation of the corresponding 1-(β-hydroxyalkyl)imidazoles in a regioselective manner. When the reaction is applied to a chiral epoxide [(R)-styrene oxide], the expected chiral alcohol is isolated with the same enantiomeric excess. The use of benzimidazole as the heterocyclic component in the same process also allows the simple preparation of the corresponding 1-(β-hydroxyalkyl)benzimidazoles.  相似文献   
14.
Density functional theory calculations were carried out for the title reactions. Ethylene oxide and methylamine were adopted as reactants. Amine clusters (dimer, trimer, tetramer, and pentamer) were considered, because the combination of one oxide and one amine molecule gave a large activation energy. An amine tetramer was found to react favorably with the oxide via various zwitterionic intermediates. A back-side S(N)2 nucleophilic attack of one amine and the subsequent proton relay up to the front side provide a stabilized reaction field. The amine-alcohol mixed reactant may react readily with the oxide, because the alcoholic O-H group is in contact with the oxide oxygen with the strong hydrogen-bond stabilization.  相似文献   
15.
Metalation of (HSiMe2)3CH with lithium diisopropylamide (LDA) in THF gives (HSiMe2)3CLi, which reacts with ethylene oxide, propylene oxide, 1,2-epoxy butane, 1,2-epoxy pentane, 1,2-epoxy hexane, and epichlorohydrin to give the corresponding 1-oxa-2-silacyclopentane derivatives. Then, glycidylmethacrylate (GM) random copolymers with styrene (St) (in a 1:1 and 1:3 mol ratio) were synthesized by solution free radical polymerization at 70(±1) °C using α,α′-azobis(isobutyronitrile) (AIBN) as an initiator. Both types of copolymers were treated with (HSiMe2)3CLi to give new modified copolymers. The reaction of (HSiMe2)3CLi with epoxides on the side chains of the copolymers does not lead to intramolecular nucleophilic attack contrary to simple epoxides. All the products have been characterized by spectroscopic techniques.  相似文献   
16.
Surprising Reactions on O-Methyl-1,1-dithiooxalates The O-methyl-1,1-dithiooxalate ligand (i-dtoMe) reacts with metalII-acetylacetonates of d8 metal centers (NiII, PdII) forming mononuclear mixed ligand complexes with two remarkable aspects: The formation of a perthioligand, first time described for thiooxalates, and the first example of a nucleophilic attack of a CH-acidic compound (acetylacetonate) on dithiocarbon of coordinated dithiocompounds (here i-dtoMe). X-ray structure is shown for Ph4P[(ptoMe)Ni(i-dtoMeacac)].  相似文献   
17.
强口令认证协议的组合攻击   总被引:7,自引:0,他引:7  
秦小龙  杨义先 《电子学报》2003,31(7):1043-1045
基于强口令的身份认证机制是目前身份认证技术发展的一个重要方向.本文对IEICE上新近提出的一个优化强口令身份认证协议OSPA(Optimal Strong-Password Authentication)进行了分析,并利用本文首次提出的组合攻击方法对其进行了有效攻击.攻击结果表明该协议对凭证被窃问题、中间人攻击、重放攻击和拒绝服务攻击是脆弱的.  相似文献   
18.
Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.  相似文献   
19.
A mathematical model has been developed to analyze the spread of a distributed attack on critical targeted resources in a network. The model provides an epidemic framework with two sub-frameworks to consider the difference between the overall behavior of the attacking hosts and the targeted resources. The analysis focuses on obtaining threshold conditions that determine the success or failure of such attacks. Considering the criticality of the systems involved and the strength of the defence mechanism involved, a measure has been suggested that highlights the level of success that has been achieved by the attacker. To understand the overall dynamics of the system in the long run, its equilibrium points have been obtained and their stability has been analyzed, and conditions for their stability have been outlined.  相似文献   
20.
HTML5 application cache (AppCache) allowed Web browser to access Web offline.But it also brought a new method of cache poisoning attack that was more persisting.As for websites which used the AppCache,a novel poisoning method RFTM (replace file twice method),in which the attacker replaced the manifest file twice to poison the client’s AppCache,was proposed.Compared with the original attack,the legal server would not receive abnormal HTTP requests from the client in the attack.Therefore,changing the server configuration could not prevent the client from the RFTM AppCache poisoning.To avoid the attack mentioned above,a lightweight signature defense scheme Sec-Cache in application layer was designed.Furthermore,experiments show that it has good performance and compatibility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号