全文获取类型
收费全文 | 197篇 |
免费 | 16篇 |
国内免费 | 27篇 |
专业分类
系统科学 | 60篇 |
丛书文集 | 3篇 |
教育与普及 | 1篇 |
理论与方法论 | 4篇 |
现状及发展 | 5篇 |
研究方法 | 2篇 |
综合类 | 165篇 |
出版年
2023年 | 6篇 |
2022年 | 4篇 |
2020年 | 2篇 |
2019年 | 1篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 2篇 |
2014年 | 9篇 |
2013年 | 6篇 |
2012年 | 8篇 |
2011年 | 11篇 |
2010年 | 32篇 |
2009年 | 11篇 |
2008年 | 10篇 |
2007年 | 8篇 |
2006年 | 30篇 |
2005年 | 10篇 |
2004年 | 8篇 |
2003年 | 15篇 |
2002年 | 13篇 |
2001年 | 3篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
排序方式: 共有240条查询结果,搜索用时 0 毫秒
1.
2.
XI Zengzhe LI Zhenrong XU Zhuo ZHANG Liangying & YAO Xi . Functional Materials Research Laboratory Tongji University Shanghai China . Key Laboratory of the Ministry of Education Xi抋n Jiaotong University Xi抋n China 《科学通报(英文版)》2003,48(19):2038-2040
It has been reported that the single crystal of relaxor ferroelectrics (1-x)Pb(Mg1/3Nb2/3)O3-xPbTiO3 (PMN-xPT) with the compositions near the morphotropic phase boundary (MPB, 0.28相似文献
3.
Modal logics are good candidates for a formal theory of agents. The efficiency of reasoning method in modal logics is very important, because it determines whether or not the reasoning method can be widely used in systems based on agent. In this paper, we modify the extension rule theorem proving method we presented before, and then apply it to P-logic that is translated from modal logic by functional transformation. At last, we give the proof of its soundness and completeness. 相似文献
4.
在单壁碳纳米管(SWCNT)表面修饰[Cu(sal-β-Ala)(3,5-DMP_2)]玻碳电极(GCE),该修饰电极不仅对多巴胺(DA)和尿酸(UA)具有很好的电化学催化效果,而且对它们有很强的检测能力.[Cu(sal-β-Ala)(3,5-DMP_2)]修饰电极对DA的检测线性范围为10~210 mmol/L,检测极限为7.29μmol/L;而对UA的检测线性范围为从1~86mmol/L,检测极限为1.5μmol/L.同时,利用微分脉冲伏安法(DPV)来测定DA和UA,相比之下,[Cu(sal-β-Ala)(3,5-DMP_2)]与单壁碳纳米管及修饰玻碳电极结合具有良好的灵敏度和分辨率. 相似文献
5.
6.
HE Gang~ HUANG Kang~ GUO SongTao~* JI WeiHong~ QI XiaoGuang~ REN Yi~ JIN XueLin~ & LI BaoGuo~ * Key Laboratory of Resource Biology Biotechnology in Western China of Ministry of Education College of Life Sciences Northwest Univer- sity Xi’an China Ecology & Conservation Group Institute for Natural Sciences Massey University Auckl New Zeal Institute of Zoology Shaanxi Academy of Sciences Xi’an Shaanxi Wild Animal Rescue Research Center... 《科学通报(英文版)》2011,56(24):2523-2530
Molecular studies using trace DNA, such as from museum specimens, ancient or forensic samples and samples obtained noninvasively, often have a common problem of low quality of DNA templates. Amplification errors, such as allelic dropout and false allele, may arise during polymerase chain reaction (PCR) using such samples. A mathematical model which treats homozygotes and heterozygotes discriminately has been developed to measure sample quality and compute the confidence level of using multipletube approaches. We use plucked hair samples collected from 26 individual Sichuan snub-nosed monkeys (Rhinopithecus roxel- lana) to test the model. In this case, a confidence level of 99% can be achieved by three positive PCRs. If the sample quality is very poor and requires many PCR replicates, an alternative multiplestep genotyping method is recommended. This model enables researchers to optimize experimental protocols through pilot studies and obtain reliable genetic information using noninvasive sampling method. 相似文献
7.
Kharchenko PV Alekseyenko AA Schwartz YB Minoda A Riddle NC Ernst J Sabo PJ Larschan E Gorchakov AA Gu T Linder-Basso D Plachetka A Shanower G Tolstorukov MY Luquette LJ Xi R Jung YL Park RW Bishop EP Canfield TK Sandstrom R Thurman RE MacAlpine DM Stamatoyannopoulos JA Kellis M Elgin SC Kuroda MI Pirrotta V Karpen GH Park PJ 《Nature》2011,471(7339):480-485
Chromatin is composed of DNA and a variety of modified histones and non-histone proteins, which have an impact on cell differentiation, gene regulation and other key cellular processes. Here we present a genome-wide chromatin landscape for Drosophila melanogaster based on eighteen histone modifications, summarized by nine prevalent combinatorial patterns. Integrative analysis with other data (non-histone chromatin proteins, DNase I hypersensitivity, GRO-Seq reads produced by engaged polymerase, short/long RNA products) reveals discrete characteristics of chromosomes, genes, regulatory elements and other functional domains. We find that active genes display distinct chromatin signatures that are correlated with disparate gene lengths, exon patterns, regulatory functions and genomic contexts. We also demonstrate a diversity of signatures among Polycomb targets that include a subset with paused polymerase. This systematic profiling and integrative analysis of chromatin signatures provides insights into how genomic elements are regulated, and will serve as a resource for future experimental investigations of genome structure and function. 相似文献
8.
SHOU Ji-lin YUAN Ying Dept. of Applied Mathematics Xi′an Jiaotong University Xi′an China 《系统科学与系统工程学报(英文版)》1999,(4)
1 IntroductionWilliamA.ByrdhasstudiedtheexistenceofequilibriuminasimplemodelwithdistinctiveChineseeconomy(seeByrd,1989).Industrialgoodsaresubjecttomultipleallocationmechanism,includingvariousadministrativechannels,termedplanningsystemandcom-modityma... 相似文献
9.
Huiling Zhang Min Hao Hao Wu Hing-Fung Ting Yihong Tang Wenhui Xi Yanjie Wei 《清华大学学报》2022,(5):843-854
Sequence-based protein tertiary structure prediction is of fundamental importance because the function of a protein ultimately depends on its 3 D structure.An accurate residue-residue contact map is one of the essential elements for current ab initio prediction protocols of 3 D structure prediction.Recently,with the combination of deep learning and direct coupling techniques,the performance of residue contact prediction has achieved significant progress.However,a considerable number of current D... 相似文献
10.
LI Fagen HU Yupu~ CHEN Jie Key Laboratory of Computer Networks Information Security Ministry of Education Xidian University Xi’an Shaanxi China 《武汉大学学报:自然科学英文版》2006,11(6):1653-1656
0 IntroductionIdentity-based (ID-based) cryptography[1]is rapidly emer-gingin recent years .The concept of the proxy signature scheme was first in-troduced by Mamboet al[2]in 1996 .The concept of thresholdproxy signature was proposed[3 ,4]. Apractical and secure (t,n) threshold proxy signature scheme should satisfy the secre-cy,the proxy protected,the unforgeability,the non-repudia-tion,the ti me constraint ,andthe known signers[5].In 2006 , Baoet al[6]proposed an ID-based thresholdproxy si… 相似文献