首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41篇
  免费   12篇
  国内免费   4篇
化学   12篇
综合类   1篇
数学   26篇
物理学   18篇
  2021年   1篇
  2020年   2篇
  2019年   3篇
  2018年   1篇
  2017年   2篇
  2016年   1篇
  2015年   1篇
  2014年   7篇
  2013年   4篇
  2012年   6篇
  2011年   2篇
  2010年   1篇
  2009年   4篇
  2008年   1篇
  2007年   2篇
  2006年   2篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   1篇
  1999年   2篇
  1997年   1篇
  1992年   1篇
  1988年   2篇
  1986年   1篇
  1984年   1篇
排序方式: 共有57条查询结果,搜索用时 15 毫秒
1.
Fundamental processes in long air gap discharges   总被引:2,自引:0,他引:2  
The development of atmospheric lightning is initiated and sustained by the formation in virgin air of ‘streamer corona’ and ‘leader’ discharges, very similar to those observed in laboratory long sparks. Therefore, the experimental and theoretical investigations of these laboratory discharges have become of large interest to improve the physical knowledge of the lightning process and to develop self-consistent models that could be applied to new protection concepts.In the present paper the fundamental processes of the subsequent phases of long air gap discharges are analyzed, from the first corona inception and development to the leader channel formation and propagation. For all these processes simulations models are discussed that have been essentially derived and simplified by the authors, in order to develop sequential time-dependent simulation of the laboratory breakdown, with both positive and negative voltages. The possibility of extending these models to the case of natural lightning is discussed in the companion paper, presented in this same volume. To cite this article: I. Gallimberti et al., C. R. Physique 3 (2002) 1335–1359.  相似文献   
2.
Noninferior Nash Strategies for Multi-Team Systems   总被引:1,自引:0,他引:1  
This paper is concerned with the optimization of systems that are controlled by several teams of decision makers. The decision makers within each team cooperate for the benefit of their team. On the other hand, the teams compete among themselves in order to achieve an objective that relates to the overall performance of the system. An approach that merges concepts from team theory and game theory for dealing with such systems and a solution called the noninferior Nash strategy are introduced. This multi-team solution provides a new framework for analyzing hierarchically controlled systems so as to address complicated coordination problems among the decision makers. The properties of the noninferior Nash solution in static multi-team systems are investigated and necessary conditions for its existence are derived. Analytical expressions for the noninferior Nash strategies are derived for a class of linear-quadratic static multi-team games. In order to deal with the issue of nonuniqueness of the solution, the concept of a noninferior Nash strategy with a team leader is introduced. Several examples are presented to illustrate the results.  相似文献   
3.
用离子动能谱探讨了9个苯环上不同取代基的4-氯-4′-取代-苯丁酮EI断裂的主要途径是:分子离子先进行Mclafferty重排,而后α-断裂。将电子能量降低至20e v,对Mclafferty重排的产物离子的α-断裂反应用Hammett方程处理,得回归线性方程lgZ/Z_0=-0.37σp-0.008,线性相关系数为0.9949。由此可明显地看出质谱中单分子断裂反应的取代基效应。  相似文献   
4.
This paper addresses the bipartite flock control problem where a multi-agent system splits into two clusters upon internal or external excitations. Using structurally balanced signed graph theory, LaSalle’s invariance principle and Barbalat’s Lemma, we prove that the proposed algorithm guarantees a bipartite flocking behavior. In each of the two disjoint clusters, all individuals move with the same direction. Meanwhile, every pair of agents in different clusters moves with opposite directions. Moreover, all agents in the two separated clusters approach a common velocity magnitude, and collision avoidance among all agents is ensured as well. Finally, the proposed bipartite flock control method is examined by numerical simulations. The bipartite flocking motion addressed by this paper has its references in both natural collective motions and human group behaviors such as predator–prey and panic escaping scenarios.  相似文献   
5.
We show that the covering radius R of an [n,k,d] code over Fq is bounded above by R n-n q(k, d/q). We strengthen this bound when R d and find conditions under which equality holds.As applications of this and other bounds, we show that all binary linear codes of lengths up to 15, or codimension up to 9, are normal. We also establish the normality of most codes of length 16 and many of codimension 10. These results have applications in the construction of codes that attain t[n,k,/it>], the smallest covering radius of any binary linear [n,k].We also prove some new results on the amalgamated direct sum (ADS) construction of Graham and Sloane. We find new conditions assuring normality of the ADS; covering radius 1 less than previously guaranteed for ADS of codes with even norms; good covering codes as ADS without the hypothesis of normality, from concepts p- stable and s- stable; codes with best known covering radii as ADS of two, often cyclic, codes (thus retaining structure so as to be suitable for practical applications).  相似文献   
6.
7.
This article considers the leader‐following consensus problem of heterogeneous multi‐agent systems. The proposed multi‐agent system is consisted of heterogeneous agents where each agents have their own nonlinear dynamic behavior. To overcome difficulty from heterogeneous nonlinear intrinsic dynamics of agents, a fuzzy disturbance observer is adopted. In addition, based on the Lyapunov stability theory, an adaptive control method is used to compensate the observation error caused by the difference between the unknown factor and estimated values. Two numerical examples are given to illustrate the effectiveness of the proposed method. © 2013 Wiley Periodicals, Inc. Complexity 19: 20–31, 2014  相似文献   
8.
高校领导伦理能力测度模型研究   总被引:1,自引:0,他引:1  
提出了高校领导者伦理能力指数的概念,对高校领导者伦理能力的结构体系进行了研究,利用层次分析法和模糊数学建立了一个高校领导者伦理能力多层模糊综合测评模型,最后给出了一个测评实例。  相似文献   
9.
The paper considers a single member district, simple plurality political system with n districts. There are two political parties, each consisting of n candidates. Individual candidates seek to win their district per se, but voters appreciate that final policy outcomes will depend upon: (1) which party wins control of the legislature, and (2) how party policy is derived from the party members' policies. Candidates take account of such voter deliberations in choosing their election strategies. A set of minimal sufficient conditions for an equilibrium to exist in this game is provided and the equilibrium characterized. While party policies are shown to converge in equilibrium, candidate policies in general do not - either across or within parties.  相似文献   
10.
With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, which is often referred to as container infrastructures. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally, discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that Docker Swarm is currently not secured against misbehaving manager nodes. This allows a high impact, high probability privilege escalation attack, which we refer to as leadership hijacking, the possibility of which is neglected by the current cloud security literature. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the Docker Swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and, in particular, incorporate adversary immune leader election algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号