首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   273篇
  免费   21篇
化学   182篇
晶体学   5篇
力学   5篇
数学   46篇
物理学   56篇
  2024年   1篇
  2023年   1篇
  2022年   7篇
  2021年   9篇
  2020年   14篇
  2019年   17篇
  2018年   9篇
  2017年   12篇
  2016年   19篇
  2015年   15篇
  2014年   14篇
  2013年   31篇
  2012年   21篇
  2011年   30篇
  2010年   16篇
  2009年   10篇
  2008年   18篇
  2007年   13篇
  2006年   13篇
  2005年   4篇
  2004年   6篇
  2003年   2篇
  2002年   4篇
  2001年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1982年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
排序方式: 共有294条查询结果,搜索用时 15 毫秒
81.
82.
The obstacle number of a graph G is the smallest number of polygonal obstacles in the plane with the property that the vertices of G can be represented by distinct points such that two of them see each other if and only if the corresponding vertices are joined by an edge. We list three small graphs that require more than one obstacle. Using extremal graph theoretic tools developed by Pr?mel, Steger, Bollobás, Thomason, and others, we deduce that for any fixed integer h, the total number of graphs on n vertices with obstacle number at most h is at most 2o(n2){2^{o(n^2)}}. This implies that there are bipartite graphs with arbitrarily large obstacle number, which answers a question of Alpert et al. (Discret Comput Geom doi:, 2009).  相似文献   
83.
Tetrakis‐(4‐chlorophenylthio)‐butatriene (3a) and tetrakis‐(tert‐butylthio)‐butatriene (3b) were synthesized, and their crystal structures were determined. The compound 3a is monoclinic, space group P21/c, a=6.9785(8), b=8.6803(9), c=22.884(2) Å, β=93.887(6)o, V=1383.0(3) Å3, Z=2. The compound 3b is monoclinic, space group P21/n, a=11.0615(6), b=10.8507(4), c=11.2717(6) Å, β =116.427(2)o, V=1211.5(1) Å3, Z=4. The title compounds 3a and 3b reside on an inversion center so that only half of the molecule is crystallographically unique. Both compounds are not planar. The crystal structures of 3a and 3b have cumulated double bonds. The C7–C8–C8i and C5–C6–C6i angles that show the linearity in both structures, respectively, are 176.4(3)° in 3a and 175.6(2)° in 3b.  相似文献   
84.
This study presents a theoretical analysis method to calculate electromagnetic (EM) wave power absorption spectrum of materials by using attenuation coefficients. The heating effect of EM waves is modeled to analyze spectral distribution of temperature rises inside material body as a result of EM wave power absorption. These analyses are very useful for the investigation of electromagnetic wave-material interaction on the bases of electro-physical material parameters (permittivity, permeability and conductivity). An illustrative analysis of spatio-spectral distribution of EM wave energy absorption and resulting heating effect were conducted for muscle tissues and the results are discussed.  相似文献   
85.
Many defenses have recently been proposed at venues like NIPS, ICML, ICLR and CVPR. These defenses are mainly focused on mitigating white-box attacks. They do not properly examine black-box attacks. In this paper, we expand upon the analyses of these defenses to include adaptive black-box adversaries. Our evaluation is done on nine defenses including Barrage of Random Transforms, ComDefend, Ensemble Diversity, Feature Distillation, The Odds are Odd, Error Correcting Codes, Distribution Classifier Defense, K-Winner Take All and Buffer Zones. Our investigation is done using two black-box adversarial models and six widely studied adversarial attacks for CIFAR-10 and Fashion-MNIST datasets. Our analyses show most recent defenses (7 out of 9) provide only marginal improvements in security (<25%), as compared to undefended networks. For every defense, we also show the relationship between the amount of data the adversary has at their disposal, and the effectiveness of adaptive black-box attacks. Overall, our results paint a clear picture: defenses need both thorough white-box and black-box analyses to be considered secure. We provide this large scale study and analyses to motivate the field to move towards the development of more robust black-box defenses.  相似文献   
86.
An integral theory that is associated with the scattered fields is considered for the solution of H-polarized line source diffraction by a conductive half-plane, which is surrounded by an anisotropic plasma. As the anisotropy does not affect an E-polarized incident wave, only one polarization case is considered. The cold plasma medium is characterized by the dielectric tensor. The constant external magnetic field producing the anisotropy in a cold plasma is applied parallel to the edge of the half-plane. The total, scattered, and diffracted waves are derived in terms of the Fresnel functions. Therefore, finite magnitude values at the transition boundaries are obtained. The wave behaviours are investigated numerically for different quantities of the medium.  相似文献   
87.
The bilevel p-median problem for the planning and protection of critical facilities involves a static Stackelberg game between a system planner (defender) and a potential attacker. The system planner determines firstly where to open p critical service facilities, and secondly which of them to protect with a limited protection budget. Following this twofold action, the attacker decides which facilities to interdict simultaneously, where the maximum number of interdictions is fixed. Partial protection or interdiction of a facility is not possible. Both the defender’s and the attacker’s actions have deterministic outcome; i.e., once protected, a facility becomes completely immune to interdiction, and an attack on an unprotected facility destroys it beyond repair. Moreover, the attacker has perfect information about the location and protection status of facilities; hence he would never attack a protected facility. We formulate a bilevel integer program (BIP) for this problem, in which the defender takes on the leader’s role and the attacker acts as the follower. We propose and compare three different methods to solve the BIP. The first method is an optimal exhaustive search algorithm with exponential time complexity. The second one is a two-phase tabu search heuristic developed to overcome the first method’s impracticality on large-sized problem instances. Finally, the third one is a sequential solution method in which the defender’s location and protection decisions are separated. The efficiency of these three methods is extensively tested on 75 randomly generated instances each with two budget levels. The results show that protection budget plays a significant role in maintaining the service accessibility of critical facilities in the worst-case interdiction scenario.  相似文献   
88.
“Graph-directed” fractals are collections of metric spaces, each of which can be expressed as a union of several scaled copies of spaces from the collection. They give rise to weighted, directed graphs where the term comes from. We show in this note that any (finite) weighted, directed graph (with weights between 0 and 1) can be realized in a Euclidean space in the sense that, starting from the graph one can define a system of similitudes (with the similarity ratios being the given weights) on an appropriate Euclidean space. The point is that these maps satisfy a certain property (called the open set condition) so that the theory of Mauldin–Williams can be applied to compute the dimension of the emerging fractals. Additionally, we give a novel example of a system of graph-directed fractals.  相似文献   
89.
The static conversion from brick-and-mortar retailing to the hybrid click-and-mortar business model is studied from the perspective of distribution logistics. Retailers run warehouses and brick-and-mortar stores to meet the demand of their walk-in customers. When they decide to operate on the Web as an e-tailer, also click-and-mortar stores are needed which can serve both walk-in and online customers. While the distance between home and the nearest open store is used as a proxy measure for walk-in customers, a quality of service (QoS) guarantee for online customers is timely delivery of their orders. We describe and solve a static location-routing based problem for companies that embrace the clicks-and-bricks strategy in their retail operations. An augmented Lagrangian relaxation method embedded in a subgradient optimization procedure generates lower bounds, whereas a heuristic method finds feasible solutions. The performance of the Lagrangian-based solution method is tested on a number of randomly generated test problems.  相似文献   
90.
The temperature dependence of the monoclinic lattice constants in the two smectic phases, S1G and S2G, of HxBPA, has been obtained from X-ray diffraction data, in the temperature range 300 K < T < 240 K. The variation of b (unique axis) is consistent with the chain ordering in the S2G phase indicated by Raman and NMR measurements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号