首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   501篇
  免费   61篇
  国内免费   35篇
化学   192篇
晶体学   1篇
力学   10篇
综合类   6篇
数学   90篇
物理学   58篇
无线电   240篇
  2024年   6篇
  2023年   19篇
  2022年   42篇
  2021年   58篇
  2020年   37篇
  2019年   16篇
  2018年   10篇
  2017年   12篇
  2016年   24篇
  2015年   19篇
  2014年   38篇
  2013年   30篇
  2012年   38篇
  2011年   29篇
  2010年   28篇
  2009年   24篇
  2008年   18篇
  2007年   23篇
  2006年   22篇
  2005年   17篇
  2004年   14篇
  2003年   14篇
  2002年   10篇
  2001年   17篇
  2000年   4篇
  1999年   7篇
  1998年   4篇
  1997年   6篇
  1996年   1篇
  1995年   4篇
  1994年   1篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有597条查询结果,搜索用时 31 毫秒
1.
Ying Tsung Lu  Sien Chi 《Optik》2003,114(4):161-167
This study presents a compact optical configuration that can generate a multiplex dot-matrix hologram with complex interlaced images for anti-counterfeiting applications on valuable paper. Varying the orientation of the interference plane can enable the multiplex hologram to be recorded without changing the interference angle of two laser beams. With its simple asymmetric optical setup, a multiplex hologram with many interlaced images can be efficiently fabricated, increasing the cost of imitation. Experimental details of the asymmetric optical setup are also described.  相似文献   
2.
Designing peptide inhibitors of the p53-MDM2 interaction against cancer is of wide interest. Computational modeling and virtual screening are a well established step in the rational design of small molecules. But they face challenges for binding flexible peptide molecules that fold upon binding. We look at the ability of five different peptides, three of which are intrinsically disordered, to bind to MDM2 with a new Bayesian inference approach (MELD × MD). The method is able to capture the folding upon binding mechanism and differentiate binding preferences between the five peptides. Processing the ensembles with statistical mechanics tools depicts the most likely bound conformations and hints at differences in the binding mechanism. Finally, the study shows the importance of capturing two driving forces to binding in this system: the ability of peptides to adopt bound conformations (ΔGconformation) and the interaction between interface residues (ΔGinteraction).  相似文献   
3.
Precise adjustment of the pore size, damage repair, and efficient cleaning is all challenges for the wider application of inorganic membranes. This study reports a simple strategy of combining dry-wet spinning and electrosynthesis to fabricate stainless-steel metal–organic framework composite membranes characterized by customizable pore sizes, targeted reparability, and high catalytic activity for membrane cleaning. The membrane pore size can be precisely customized in the range of 14–212 nm at nanoscale, and damaged membranes can be repaired by targeted treatment in 120 s. In addition, advanced oxidation processes can be used to quickly clean the membrane and achieve 98% flux recovery. The synergistic actions of the membrane matrix and the selective layer increase the adsorption energy of active sites to oxidant, shorten the electron transfer cycle, and enhance the overall catalytic performance. This study can provide a new direction for the development of advanced membranes for water purification and high-efficiency membrane cleaning methods.  相似文献   
4.
毫米波雷达的安装角度校准是雷达正常使用并与摄像头进行数据融合的重要前提,雷达安装角度偏 转过大会导致雷达数据与摄像头数据融合失败,影响高级驾驶辅助系统(Advanced Driving Assistance System,ADAS) 的正常使用。文中提出一种基于曲线拟合的毫米波雷达安装角度校准方法,当车辆在道路上行驶时辅以车辆输入 的车速和偏航角信息,通过2000 个静止点进行曲线拟合得到雷达需要补偿的角度。相较于选择有护栏的道路进行 绕行和在标定场地部署角反射器进行安装角度校准的方法,这种方法适用的场景种类更多并且校准时间从15 分钟 以上缩短为5 分钟以下。经过实验验证,在花费更短时间完成校准后,校准精度与其它自校准方法相同为±5°。  相似文献   
5.
A new procedure was developed to determine in urine the concentrations of N(epsilon)-(carboxymethyl)lysine (CML) and N(epsilon)-(carboxyethyl)lysine (CEL), the major products of oxidative modification of glycated proteins, to assess levels of oxidative stress in physiological systems. The urine samples were acetonitrile-deproteinized, then derivatized by ethylchloroformate, and N(O,S)-ethoxycarbonyl ethyl esters of amino acids were analysed by isotope dilution gas chromatography/mass spectrometry. Recovery averaged 89%. Linearity was excellent (r = 0.998-0.999) in the 0.5-25 micromol/L range for CML and CEL. The limit of detection of this assay was 0.1 micromol/L (corresponding to 0.20 pmol of CML or CEL on column). Intra-day and inter-day precisions were likewise excellent, with relative standard deviations <4.63 and <6.15%, respectively. Accuracy of CML and CEL determination (15 micromol/L) was 2.9 and 5.9% of the estimated theoretical value. The time from obtaining the urine sample to determination of the concentration from the chromatographic peak was 80 min or less. This method is sensitive, reproducible, accurate, relatively cheap and very simple. It can be useful for laboratories involved in the diagnosis and monitoring of age-related chronic diseases.  相似文献   
6.
A design of a combined ozone/electron beam irradiation process for treating a 50 m3/h waste water stream from a molasses processing is discussed. Moreover, a cost evaluation of such a process in comparison to a conventional ozonation/biology treatment process has been performed to assess the potential of the irradiation process for technical use. Although the result of this comparison is not bad for the irradiation process an implementation into a full scale plant would not seem to be the thing to do in the present case.  相似文献   
7.
Advanced metering infrastructure (AMI) provides 2‐way communications between the utility and the smart meters. Developing authenticated key exchange (AKE) and broadcast authentication (BA) protocols is essential to provide secure communications in AMI. The security of all existing cryptographic protocols is based on the assumption that secret information is stored in the nonvolatile memories. In the AMI, the attackers can obtain some or all of the stored secret information from memories by a great variety of inexpensive and fast side‐channel attacks. Thus, all existing AKE and BA protocols are no longer secure. In this paper, we investigate how to develop secure AKE and BA protocols in the presence of memory attacks. As a solution, we propose to embed a physical unclonable function (PUF) in each party, which generates the secret values as required without the need to store them. By combining PUFs and 2 well‐known and secure protocols, we propose PUF‐based AKE and BA protocols. We show that our proposed protocols are memory leakage resilient. In addition, we prove their security in the standard model. Performance analysis of both protocols shows their efficiency for AMI applications. The proposed protocols can be easily implemented.  相似文献   
8.
Poly(silylene arylacetylene) (PSA) is a kind of poly(arylacetylene) silicon‐containing resins with excellent heat resistance and good mechanical performances. In this article, the sulfur atom is introduced into the main chain of the PSA molecule to obtain a sulfur‐containing poly(silylene arylacetylene), named S‐PSA. By Williamson and Sonogashira reactions, bis(4‐ethynylphenyl)sulfide and bis(4‐ethynylphenyl)sulfone were synthesized. Thereafter, through Grignard reagent way, the poly(silylene ethynylene phenylene sulfide phenylene ethynylene) (PSESE) and poly(silylene ethynylene phenylene sulfone phenylene ethynylene) (PSESO2E) were synthesized from bis(4‐ethynylphenyl)sulfide, bis(4‐ethynylphenyl)sulfone, and methylphenyl dichlorosilane. Poly(silylene ethynylene phenylene sulfoxide phenylene ethynylene) (PSESOE) was synthesized by the oxidation of PSESE. The structures and properties of these resins were characterized and the mechanical properties of the T300 reinforced composites were tested. The results show that the novel S‐PSA resins have excellent heat resistance and good mechanical properties, and could be used as resin matrices for high‐performance composites in high‐tech fields. © 2019 Wiley Periodicals, Inc. J. Polym. Sci., Part A: Polym. Chem. 2019, 57, 2324–2332  相似文献   
9.
为了能有效打击各种干扰目标,根据现代战场中各种干扰样式及其干扰途径,本文分析了经典制导律在对付干扰目标时的缺点;根据俯冲能规避干扰目标的方案和先进制导律的优点,分析了先进制导律在对付干扰目标的优点;最终,实现运用先进制导律有效攻击干扰目标的目的.  相似文献   
10.
高等数学的很多内容比较抽象,学生不易理解.通过几个例子说明如何将抽象的数学概念和结论与几何图形有机的结合起来,加深对这些概念结论的理解,激发学生的学习兴趣.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号