首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   366篇
  免费   2篇
  国内免费   3篇
化学   181篇
晶体学   6篇
力学   6篇
数学   56篇
物理学   71篇
无线电   51篇
  2023年   8篇
  2022年   8篇
  2021年   13篇
  2020年   9篇
  2019年   9篇
  2018年   4篇
  2017年   5篇
  2016年   8篇
  2015年   5篇
  2014年   12篇
  2013年   16篇
  2012年   19篇
  2011年   22篇
  2010年   12篇
  2009年   8篇
  2008年   14篇
  2007年   14篇
  2006年   14篇
  2005年   9篇
  2004年   15篇
  2003年   8篇
  2002年   13篇
  2001年   7篇
  2000年   10篇
  1999年   8篇
  1998年   11篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1993年   4篇
  1992年   2篇
  1991年   9篇
  1990年   5篇
  1989年   2篇
  1988年   2篇
  1987年   8篇
  1986年   4篇
  1983年   2篇
  1981年   6篇
  1980年   3篇
  1979年   5篇
  1978年   4篇
  1977年   4篇
  1976年   5篇
  1973年   2篇
  1971年   2篇
  1967年   1篇
  1965年   2篇
  1962年   1篇
  1961年   1篇
排序方式: 共有371条查询结果,搜索用时 171 毫秒
1.
2.
3.
4.
Summary The enzymes a-amylase, invertase and glucoamylase were immobilized on acid activated montmorillonite using two techniques, viz. adsorption and covalent binding, and their activities were tested in a batch and packed-bed reactor and were compared. The packed-bed reactor showed an improved performance for all immobilized enzymes, which was attributed to lowering of diffusional restrictions to mass transfer. Lower activity in case of batch reactor for immobilized invertase was due to a combined effect of loss of native conformation of enzyme on account of immobilization and mass transfer resistances due to improper diffusion of substrate to the active site of enzyme. For immobilized glucoamylase, the packed-bed reactor demonstrated exceptionally high activity that was very close to the free enzyme. Covalently bound glucoamylase showed higher activity than the free enzyme.  相似文献   
5.
Kohlberg (1972) has shown how the nucleolus for ann-person game with side-payments may be found by solving a single minimization LP in case the imputation space is a polytope. However the coefficients in the LP have a very wide range even for problems with 3 or 4 players. Therefore the method is computationally viable only for small problems on machines with finite precision. Maschler et al. (1979) find the nucleolus by solving a sequence of minimization LPs with constraint coefficients of either –1, 0 or 1. However the number of LPs to be solved is o(4 n ). In this paper, we show how to find the nucleolus by solving a sequence of o(2 n ) LPs whose constraint coefficients are –1, 0 or 1.  相似文献   
6.
7.
We compute the homotopy groups 0 and 1 of the classical configuration space of anO(3) invariant field theory on ×, where is a compact two dimensional manifold for arbitrary genusg and- denotes the time coordinate. We also present the finite dimensional, unitary, irreducible, inequivalent representations of the appropriate fundamental groups and comment on some of their implications.  相似文献   
8.
The application of Bacillus subtilis as a flocculant for fine coal has been reported here. Zeta-potential measurements showed that both the coal and bacteria had similar surface charge as a function of pH. Surface free energy calculations showed that the coal was hydrophobic while the bacterium was hydrophilic. The adhesion of the bacteria to coal and subsequent settling was studied in detail. Adhesion of bacteria to coal surface and subsequent settling of coal was found to be quick. Both adhesion and settling were found to be independent of pH, which makes the process very attractive for field applications. The presence of an electrolyte along with the bacterium was found to not only enhance adhesion of bacteria, but also produce a clear supernatant. Further, the settled fraction was more compact than with bacteria alone. Interaction energy calculations using the extended DLVO theory showed that the electrical forces along with the acid–base interaction energy play a dominant role in the lower pH range. Above pH 7, the acid–base interaction energy is the predominant attractive force and is sufficient enough to overcome the repulsive forces due to electrical charges to bring about adhesion and thus settling of fine coal. With increase in electrolyte concentration, the change in total interaction energy with pH is minimal which probably leads to better adhesion and hence settling.  相似文献   
9.
In this work, a digital differential transmitter based on low-power wireless compensation transceiver for body channel communication (BCC) is proposed. Further, the proposed transceiver is composed of Touch Status Detection Unit (TSDU), Wireless Status Compensation Unit (WSCU), and a reconfigurable preamplifier. Initially, the human body channel environment for wireless communication is investigated based on properties from 1 to 100 MHz. Further, the turbo code-based encoding scheme is used to encode the data before transferring the data on the transmitter side. Also, the proposed error-correcting parallel turbo decoder using a modified step-by-step algorithm is presented. The turbo code-based decoding scheme is used to recover the error-free transmitted data at the receiver side. Results demonstrate that the proposed BCC transceiver is designed using 90 nm CMOS technology and it is observed that the proposed BCC transceiver has utilized an area of 600mm2. Also, the maximum data rate achieved by a proposed BCC transceiver was 100 Mbps, and the overall transceiver power consumption is 0.42 mW, and energy for communication is 0.02 nj/b.  相似文献   
10.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号