首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   50篇
  免费   2篇
化学   33篇
力学   1篇
数学   4篇
物理学   14篇
  2023年   1篇
  2022年   1篇
  2021年   4篇
  2020年   5篇
  2019年   1篇
  2018年   6篇
  2017年   2篇
  2016年   5篇
  2015年   2篇
  2014年   4篇
  2013年   3篇
  2012年   5篇
  2011年   2篇
  2010年   2篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1974年   1篇
排序方式: 共有52条查询结果,搜索用时 31 毫秒
1.
The time delay experiment proposed by I.I. Shapiro in 1964 and conducted in the seventies was the most precise experiment of general relativity until that time. Further experimentation has improved the accuracy level of both the time delay and the light deflection experiments. A simulation model is proposed that involves only a simple mass and time transformation factor involving velocity of light. The light deflection and the time delay experiments are numerically simulated using this model that does not use the general relativistic equations. The computed values presented in this paper compare well with recent levels of accuracy of their respective experimental results.  相似文献   
2.
3.
A picolinaldehyde–melamine copper complex was loaded on a magnetic Fe3O4 core, so that it contained 0.33 mmol of Cu per gram, and was used as an efficient catalyst. The as‐synthesized catalyst was characterized using various techniques, including Fourier transform infrared spectroscopy, X‐ray diffraction, energy‐dispersive X‐ray spectroscopy, field emission scanning electron microscopy, transmission electron microscopy, vibrating sample magnetometry and thermogravimetric analysis. The catalyst was used to activate the raw materials in the synthesis of hexahydroquinoline derivatives in one‐pot four‐component reactions. Low reaction time (minutes versus half an hour), solvent‐free condition and magnetically separable catalyst are some salient features of the developed catalyst. Also, the optimum amount of catalyst and temperature were determined as 0.07 g and 87.6 °C, respectively, which were obtained using response surface methodology and optimization techniques.  相似文献   
4.
5.
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. In this article a secure quantum watermarking using entanglement swapping is proposed. Here the entanglement swapping is employed to build up a hidden layer of secure message under the conventional first layer of secure information sequence. In this protocol by insuring the security of transmission of the first layer of information sequence the security of the hidden secret messages is also proved to be reliable regardless of whether the hidden channel has been detected or not.  相似文献   
6.
Monatshefte für Chemie - Chemical Monthly - A triple four-component Ugi reaction of isocyanide, amine, aldehyde, and trimesic acid as the acid component with three acidic functional groups in...  相似文献   
7.
8.

We demonstrate the application of an ionic liquid-based ferrofluid to the dispersive solid phase extraction of lead(II) using PAN as the chelator. The ionic liquid contains silica nanoparticles with a magnetic core as the dispersion medium, and its use results in improved stability of the colloidal dispersion and a complete extraction of lead(II) within a few seconds. In addition, there is no need for centrifugation. Specifically, the effect of different variables on the extraction of lead(II) was studied using an experimental design. Lead(II) was quantified by AAS. Under optimized conditions, the calibration graph for lead(II) is linear in the range from 5 to 372 μg L−1, the relative standard deviation is 1.34 % (for n = 7), the limit of detection is 1.66 μg L−1, and the enrichment factor is 200. The maximum adsorption capacity of sorbent was calculated to be 10.7 mg g−1, and adsorption follows a Langmuir isotherm.

A schematic view of D-SPE experimental set up. We demonstrate the application of an ionic liquid-based ferrofluid to the dispersive solid phase extraction of lead(II) using PAN as the chelator. The ionic liquid contains silica nanoparticles with a magnetic core as the dispersion medium

  相似文献   
9.
This paper presents a more detailed interaction of an electromagnetics light with a metallic surface-relief subwavelength grating utilizing the rigorous coupled-wave analysis. The focus of this work is the accurate modeling of undetermined aspects of diffraction patterns produced by binary metallic grating structures, specially gold grating. First-order diffraction efficiency for rectangular-groove gold grating with equal groove and ridge widths are presented for various wavelengths as a function of period, groove depth, polarization and angle of incidence. We also studied diffraction efficiency of both of TE and TM polarization modes against increasing of incident angle as well as TE polarization against increment of grating period. As a result, very low reflectivity at zero-order was found out for TE and TM polarizations at the pitch of Λ = 2λ. Having been studied diffraction efficiency of metallic surface-relief gratings, we also examined polarization-dependent efficiency of diffraction orders, for different groove depths. Simulation results have been completely presented.  相似文献   
10.
In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the original one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号