全文获取类型
收费全文 | 160篇 |
免费 | 20篇 |
国内免费 | 7篇 |
专业分类
化学 | 43篇 |
综合类 | 20篇 |
数学 | 61篇 |
物理学 | 63篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 9篇 |
2021年 | 6篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 4篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 10篇 |
2013年 | 10篇 |
2012年 | 10篇 |
2011年 | 9篇 |
2010年 | 8篇 |
2009年 | 14篇 |
2008年 | 10篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 5篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 10篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 2篇 |
排序方式: 共有187条查询结果,搜索用时 15 毫秒
1.
2.
Rocío Fonseca-Aguiaga Walter M. Warren-Vega Floriberto Miguel-Cruz Luis A. Romero-Cano 《Molecules (Basel, Switzerland)》2021,26(6)
Isotopic ratios of δ13CVPDB and δ18OVSMOW have been used as an additional parameter to ensure the authenticity of the aging time of 100% agave tequila. For this purpose, 120 samples were isotopically analyzed (40 silver class, 40 aged class, and 40 extra-aged classes). The samples were obtained through a stratified sampling by proportional allocation, considering tequila producers from the main different regions of Jalisco, Mexico (Valles 41%, Altos Sur 31%, Cienega 16%, and Centro 12%). The results showed that the δ13CVPDB was found in an average of −12.85 ‰ for all the analyzed beverages, with no significant difference between them. Since for all the tested samples the Agave tequilana Weber blue variety was used as source of sugar to obtain alcohol, those results were foreseeable, and confirm the origin of the sugar source. Instead, the results for δ18OVSMOW showed a positive slope linear trend for the aging time (silver class 19.52‰, aged class 20.54‰, extra-aged class 21.45‰), which is associated with the maturation process, there are oxidation reactions that add congeneric compounds to the beverage, these can be used as tracers for the authenticity of the aging time. Additionally, the experimental data showed homogeneity in the beverages regardless of the production region, evidencing the tequila industry’s high-quality standards. However, a particular case occurs with the δ18OVSMOW data for the silver class samples, in which a clear trend is noted with the altitude of the region of origin; therefore, this information suggests that this analytical parameter could be useful to authenticate the regional origin of beverage. 相似文献
3.
Abdul Rohman Mohd AlIkhsan B. Ghazali Anjar Windarsih Irnawati Sugeng Riyanto Farahwahida Mohd Yusof Shuhaimi Mustafa 《Molecules (Basel, Switzerland)》2020,25(22)
Currently, the authentication analysis of edible fats and oils is an emerging issue not only by producers but also by food industries, regulators, and consumers. The adulteration of high quality and expensive edible fats and oils as well as food products containing fats and oils with lower ones are typically motivated by economic reasons. Some analytical methods have been used for authentication analysis of food products, but some of them are complex in sampling preparation and involving sophisticated instruments. Therefore, simple and reliable methods are proposed and developed for these authentication purposes. This review highlighted the comprehensive reports on the application of infrared spectroscopy combined with chemometrics for authentication of fats and oils. New findings of this review included (1) FTIR spectroscopy combined with chemometrics, which has been used to authenticate fats and oils; (2) due to as fingerprint analytical tools, FTIR spectra have emerged as the most reported analytical techniques applied for authentication analysis of fats and oils; (3) the use of chemometrics as analytical data treatment is a must to extract the information from FTIR spectra to be understandable data. Next, the combination of FTIR spectroscopy with chemometrics must be proposed, developed, and standardized for authentication and assuring the quality of fats and oils. 相似文献
4.
5.
Junia O. Alves Bruno G. Botelho Marcelo M. Sena Rodinei Augusti 《Journal of mass spectrometry : JMS》2013,48(10):1109-1115
Direct infusion electrospray ionization mass spectrometry in the positive ion mode [ESI(+)‐MS] is used to obtain fingerprints of aqueous–methanolic extracts of two types of olive oils, extra virgin (EV) and ordinary (OR), as well as of samples of EV olive oil adulterated by the addition of OR olive oil and other edible oils: corn (CO), sunflower (SF), soybean (SO) and canola (CA). The MS data is treated by the partial least squares discriminant analysis (PLS‐DA) protocol aiming at discriminating the above‐mentioned classes formed by the genuine olive oils, EV (1) and OR (2), as well as the EV adulterated samples, i.e. EV/SO (3), EV/CO (4), EV/SF (5), EV/CA (6) and EV/OR (7). The PLS‐DA model employed is built with 190 and 70 samples for the training and test sets, respectively. For all classes (1–7), EV and OR olive oils as well as the adulterated samples (in a proportion varying from 0.5 to 20.0% w/w) are properly classified. The developed methodology required no ions identification and demonstrated to be fast, as each measurement lasted about 3 min including the extraction step and MS analysis, and reliable, because high sensitivities (rate of true positives) and specificities (rate of true negatives) were achieved. Finally, it can be envisaged that this approach has potential to be applied in quality control of EV olive oils. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
6.
Zhong-hua Shen 《高校应用数学学报(英文版)》2008,23(3):371-376
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented. 相似文献
7.
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
A novel efficient deterministic secure quantum communication scheme
based on four-qubit cluster states and single-photon identity
authentication is proposed. In this scheme, the two authenticated
users can transmit two bits of classical information per cluster
state, and its efficiency of the quantum communication is 1/3, which
is approximately 1.67 times that of the previous protocol presented
by Wang et al [Chin. Phys. Lett. 23 (2006) 2658].
Security analysis shows the present scheme is secure against
intercept-resend attack and the impersonator's attack. Furthermore,
it is more economic with present-day techniques and easily processed
by a one-way quantum computer. 相似文献
8.
Holographic watermarking for authentication of cut images 总被引:3,自引:0,他引:3
Giuseppe Schirripa Spagnolo Michele De Santis 《Optics and Lasers in Engineering》2011,49(12):1447-1455
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property). 相似文献
9.
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed. 相似文献
10.
2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击. 相似文献