全文获取类型
收费全文 | 164篇 |
免费 | 20篇 |
国内免费 | 7篇 |
专业分类
化学 | 47篇 |
综合类 | 20篇 |
数学 | 61篇 |
物理学 | 63篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 6篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 4篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 10篇 |
2013年 | 10篇 |
2012年 | 10篇 |
2011年 | 9篇 |
2010年 | 8篇 |
2009年 | 14篇 |
2008年 | 10篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 5篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 10篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 2篇 |
排序方式: 共有191条查询结果,搜索用时 15 毫秒
1.
2.
Abdul Rohman Mohd AlIkhsan B. Ghazali Anjar Windarsih Irnawati Sugeng Riyanto Farahwahida Mohd Yusof Shuhaimi Mustafa 《Molecules (Basel, Switzerland)》2020,25(22)
Currently, the authentication analysis of edible fats and oils is an emerging issue not only by producers but also by food industries, regulators, and consumers. The adulteration of high quality and expensive edible fats and oils as well as food products containing fats and oils with lower ones are typically motivated by economic reasons. Some analytical methods have been used for authentication analysis of food products, but some of them are complex in sampling preparation and involving sophisticated instruments. Therefore, simple and reliable methods are proposed and developed for these authentication purposes. This review highlighted the comprehensive reports on the application of infrared spectroscopy combined with chemometrics for authentication of fats and oils. New findings of this review included (1) FTIR spectroscopy combined with chemometrics, which has been used to authenticate fats and oils; (2) due to as fingerprint analytical tools, FTIR spectra have emerged as the most reported analytical techniques applied for authentication analysis of fats and oils; (3) the use of chemometrics as analytical data treatment is a must to extract the information from FTIR spectra to be understandable data. Next, the combination of FTIR spectroscopy with chemometrics must be proposed, developed, and standardized for authentication and assuring the quality of fats and oils. 相似文献
3.
Junia O. Alves Bruno G. Botelho Marcelo M. Sena Rodinei Augusti 《Journal of mass spectrometry : JMS》2013,48(10):1109-1115
Direct infusion electrospray ionization mass spectrometry in the positive ion mode [ESI(+)‐MS] is used to obtain fingerprints of aqueous–methanolic extracts of two types of olive oils, extra virgin (EV) and ordinary (OR), as well as of samples of EV olive oil adulterated by the addition of OR olive oil and other edible oils: corn (CO), sunflower (SF), soybean (SO) and canola (CA). The MS data is treated by the partial least squares discriminant analysis (PLS‐DA) protocol aiming at discriminating the above‐mentioned classes formed by the genuine olive oils, EV (1) and OR (2), as well as the EV adulterated samples, i.e. EV/SO (3), EV/CO (4), EV/SF (5), EV/CA (6) and EV/OR (7). The PLS‐DA model employed is built with 190 and 70 samples for the training and test sets, respectively. For all classes (1–7), EV and OR olive oils as well as the adulterated samples (in a proportion varying from 0.5 to 20.0% w/w) are properly classified. The developed methodology required no ions identification and demonstrated to be fast, as each measurement lasted about 3 min including the extraction step and MS analysis, and reliable, because high sensitivities (rate of true positives) and specificities (rate of true negatives) were achieved. Finally, it can be envisaged that this approach has potential to be applied in quality control of EV olive oils. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
4.
Zhong-hua Shen 《高校应用数学学报(英文版)》2008,23(3):371-376
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented. 相似文献
5.
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
A novel efficient deterministic secure quantum communication scheme
based on four-qubit cluster states and single-photon identity
authentication is proposed. In this scheme, the two authenticated
users can transmit two bits of classical information per cluster
state, and its efficiency of the quantum communication is 1/3, which
is approximately 1.67 times that of the previous protocol presented
by Wang et al [Chin. Phys. Lett. 23 (2006) 2658].
Security analysis shows the present scheme is secure against
intercept-resend attack and the impersonator's attack. Furthermore,
it is more economic with present-day techniques and easily processed
by a one-way quantum computer. 相似文献
6.
Holographic watermarking for authentication of cut images 总被引:3,自引:0,他引:3
Giuseppe Schirripa Spagnolo Michele De Santis 《Optics and Lasers in Engineering》2011,49(12):1447-1455
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property). 相似文献
7.
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed. 相似文献
8.
2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击. 相似文献
9.
Cheating in Visual Cryptography 总被引:3,自引:0,他引:3
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset cannot recover the secret. In 1995, Naor and Shamir proposed a variant
of secret sharing, called visual cryptography, where the shares given to participants are xeroxed onto transparencies. If
X is an authorized subset of P, then the participants in X can visually recover the secret image by stacking their transparencies together without performing any computation. In this
paper, we address the issue of cheating by dishonest participants, called cheaters, in visual cryptography. The experimental
results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants.
We also propose two simple cheating prevention visual cryptographic schemes. 相似文献
10.
Review: Authentication and traceability of foods from animal origin by polymerase chain reaction-based capillary electrophoresis 总被引:2,自引:0,他引:2
This work presents an overview of the applicability of PCR-based capillary electrophoresis (CE) in food authentication and traceability of foods from animal origin. Analytical approaches for authenticating and tracing meat and meat products and fish and seafood products are discussed. Particular emphasis will be given to the usefulness of genotyping in food tracing by using CE-based genetic analyzers. 相似文献