全文获取类型
收费全文 | 273篇 |
免费 | 21篇 |
专业分类
化学 | 182篇 |
晶体学 | 5篇 |
力学 | 5篇 |
数学 | 46篇 |
物理学 | 56篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 7篇 |
2021年 | 9篇 |
2020年 | 14篇 |
2019年 | 17篇 |
2018年 | 9篇 |
2017年 | 12篇 |
2016年 | 19篇 |
2015年 | 15篇 |
2014年 | 14篇 |
2013年 | 31篇 |
2012年 | 21篇 |
2011年 | 30篇 |
2010年 | 16篇 |
2009年 | 10篇 |
2008年 | 18篇 |
2007年 | 13篇 |
2006年 | 13篇 |
2005年 | 4篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 4篇 |
2001年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1982年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有294条查询结果,搜索用时 15 毫秒
81.
82.
The obstacle number of a graph G is the smallest number of polygonal obstacles in the plane with the property that the vertices of G can be represented by distinct points such that two of them see each other if and only if the corresponding vertices are joined by an edge. We list three small graphs that require more than one obstacle. Using extremal graph theoretic tools developed by Pr?mel, Steger, Bollobás, Thomason, and others, we deduce that for any fixed integer h, the total number of graphs on n vertices with obstacle number at most h is at most 2o(n2){2^{o(n^2)}}. This implies that there are bipartite graphs with arbitrarily large obstacle number, which answers a question of Alpert et al. (Discret Comput Geom doi:, 2009). 相似文献
83.
Tetrakis‐(4‐chlorophenylthio)‐butatriene (3a) and tetrakis‐(tert‐butylthio)‐butatriene (3b) were synthesized, and their crystal structures were determined. The compound 3a is monoclinic, space group P21/c, a=6.9785(8), b=8.6803(9), c=22.884(2) Å, β=93.887(6)o, V=1383.0(3) Å3, Z=2. The compound 3b is monoclinic, space group P21/n, a=11.0615(6), b=10.8507(4), c=11.2717(6) Å, β =116.427(2)o, V=1211.5(1) Å3, Z=4. The title compounds 3a and 3b reside on an inversion center so that only half of the molecule is crystallographically unique. Both compounds are not planar. The crystal structures of 3a and 3b have cumulated double bonds. The C7–C8–C8i and C5–C6–C6i angles that show the linearity in both structures, respectively, are 176.4(3)° in 3a and 175.6(2)° in 3b. 相似文献
84.
Spatio-spectral analyses of electromagnetic wave energy absorption and heating effect 总被引:1,自引:0,他引:1
This study presents a theoretical analysis method to calculate electromagnetic (EM) wave power absorption spectrum of materials by using attenuation coefficients. The heating effect of EM waves is modeled to analyze spectral distribution of temperature rises inside material body as a result of EM wave power absorption. These analyses are very useful for the investigation of electromagnetic wave-material interaction on the bases of electro-physical material parameters (permittivity, permeability and conductivity). An illustrative analysis of spatio-spectral distribution of EM wave energy absorption and resulting heating effect were conducted for muscle tissues and the results are discussed. 相似文献
85.
Kaleel Mahmood Deniz Gurevin Marten van Dijk Phuoung Ha Nguyen 《Entropy (Basel, Switzerland)》2021,23(10)
Many defenses have recently been proposed at venues like NIPS, ICML, ICLR and CVPR. These defenses are mainly focused on mitigating white-box attacks. They do not properly examine black-box attacks. In this paper, we expand upon the analyses of these defenses to include adaptive black-box adversaries. Our evaluation is done on nine defenses including Barrage of Random Transforms, ComDefend, Ensemble Diversity, Feature Distillation, The Odds are Odd, Error Correcting Codes, Distribution Classifier Defense, K-Winner Take All and Buffer Zones. Our investigation is done using two black-box adversarial models and six widely studied adversarial attacks for CIFAR-10 and Fashion-MNIST datasets. Our analyses show most recent defenses (7 out of 9) provide only marginal improvements in security (<25%), as compared to undefended networks. For every defense, we also show the relationship between the amount of data the adversary has at their disposal, and the effectiveness of adaptive black-box attacks. Overall, our results paint a clear picture: defenses need both thorough white-box and black-box analyses to be considered secure. We provide this large scale study and analyses to motivate the field to move towards the development of more robust black-box defenses. 相似文献
86.
Husnu Deniz Basdemir 《等离子体物理论文集》2021,61(2):e202000103
An integral theory that is associated with the scattered fields is considered for the solution of H-polarized line source diffraction by a conductive half-plane, which is surrounded by an anisotropic plasma. As the anisotropy does not affect an E-polarized incident wave, only one polarization case is considered. The cold plasma medium is characterized by the dielectric tensor. The constant external magnetic field producing the anisotropy in a cold plasma is applied parallel to the edge of the half-plane. The total, scattered, and diffracted waves are derived in terms of the Fresnel functions. Therefore, finite magnitude values at the transition boundaries are obtained. The wave behaviours are investigated numerically for different quantities of the medium. 相似文献
87.
The bilevel p-median problem for the planning and protection of critical facilities involves a static Stackelberg game between a system planner (defender) and a potential attacker. The system planner determines firstly where to open p critical service facilities, and secondly which of them to protect with a limited protection budget. Following this twofold action, the attacker decides which facilities to interdict simultaneously, where the maximum number of interdictions is fixed. Partial protection or interdiction of a facility is not possible. Both the defender’s and the attacker’s actions have deterministic outcome; i.e., once protected, a facility becomes completely immune to interdiction, and an attack on an unprotected facility destroys it beyond repair. Moreover, the attacker has perfect information about the location and protection status of facilities; hence he would never attack a protected facility. We formulate a bilevel integer program (BIP) for this problem, in which the defender takes on the leader’s role and the attacker acts as the follower. We propose and compare three different methods to solve the BIP. The first method is an optimal exhaustive search algorithm with exponential time complexity. The second one is a two-phase tabu search heuristic developed to overcome the first method’s impracticality on large-sized problem instances. Finally, the third one is a sequential solution method in which the defender’s location and protection decisions are separated. The efficiency of these three methods is extensively tested on 75 randomly generated instances each with two budget levels. The results show that protection budget plays a significant role in maintaining the service accessibility of critical facilities in the worst-case interdiction scenario. 相似文献
88.
“Graph-directed” fractals are collections of metric spaces, each of which can be expressed as a union of several scaled copies of spaces from the collection. They give rise to weighted, directed graphs where the term comes from. We show in this note that any (finite) weighted, directed graph (with weights between 0 and 1) can be realized in a Euclidean space in the sense that, starting from the graph one can define a system of similitudes (with the similarity ratios being the given weights) on an appropriate Euclidean space. The point is that these maps satisfy a certain property (called the open set condition) so that the theory of Mauldin–Williams can be applied to compute the dimension of the emerging fractals. Additionally, we give a novel example of a system of graph-directed fractals. 相似文献
89.
The static conversion from brick-and-mortar retailing to the hybrid click-and-mortar business model is studied from the perspective of distribution logistics. Retailers run warehouses and brick-and-mortar stores to meet the demand of their walk-in customers. When they decide to operate on the Web as an e-tailer, also click-and-mortar stores are needed which can serve both walk-in and online customers. While the distance between home and the nearest open store is used as a proxy measure for walk-in customers, a quality of service (QoS) guarantee for online customers is timely delivery of their orders. We describe and solve a static location-routing based problem for companies that embrace the clicks-and-bricks strategy in their retail operations. An augmented Lagrangian relaxation method embedded in a subgradient optimization procedure generates lower bounds, whereas a heuristic method finds feasible solutions. The performance of the Lagrangian-based solution method is tested on a number of randomly generated test problems. 相似文献
90.
The temperature dependence of the monoclinic lattice constants in the two smectic phases, S1G and S2G, of HxBPA, has been obtained from X-ray diffraction data, in the temperature range 300 K < T < 240 K. The variation of b (unique axis) is consistent with the chain ordering in the S2G phase indicated by Raman and NMR measurements. 相似文献