首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   235篇
  免费   10篇
化学   67篇
力学   13篇
数学   92篇
物理学   44篇
无线电   29篇
  2022年   8篇
  2021年   6篇
  2020年   8篇
  2019年   14篇
  2018年   13篇
  2017年   15篇
  2016年   17篇
  2015年   11篇
  2014年   18篇
  2013年   16篇
  2012年   14篇
  2011年   12篇
  2010年   16篇
  2009年   12篇
  2008年   10篇
  2007年   11篇
  2006年   6篇
  2005年   5篇
  2004年   4篇
  2003年   5篇
  2002年   3篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   4篇
  1988年   1篇
  1980年   2篇
  1978年   4篇
排序方式: 共有245条查询结果,搜索用时 15 毫秒
31.
This paper gives a survey on some recent results on the spectral theory of block operator matrices. We study the closeness in the product space and we give some conditions to characterize the essential spectra in the Browder resolvent set case. Furthermore, we apply the obtained results to several models such as delay equations, Sturm–Liouville problem and transport equations.  相似文献   
32.
The main results in this paper are, the characterization of all the σfinite positive measures μ and v, for which K(L1(μ, L1(v)) proximinal in K(L1(μ, L1(v)) all the a-finite positive measures fi and v, for which K(L(μ), L(v)) is proximinal in L(Lμ)), Lv(v)) and all the compact Hausdorff spaces Q, for which K(C(Q), L(μ)) is proximinal in L(C(Q), :(μ))  相似文献   
33.
A composition of GaAs-polymer tiny particles was pressed at a temperature of 130 °C and a pressure of 60 MPa and its current–voltage characteristic was studied. The result shows that the prepared disk has varistor behavior and can therefore be used to protect circuits from low overvoltage transients higher than 62 V. Temperature dependence of current-voltage characteristic and the electrical conductivity of the sample were investigated in the temperature range of 25–100 °C. It has been found that increase in temperature results in lower breakdown voltage and nonlinearity coefficient. At high temperatures, nonlinearity in the IV characteristic of sample disappears and the conductivity becomes Ohmic in nature. The sample has hysteresis which decreases through increase in temperature. Annealing effect on leakage current and breakdown voltage was both investigated and analyzed using SEM micrographs. Finally, the electrical bandgap of the sample was measured.  相似文献   
34.

Purpose

The purpose of this study was to compare histologically determined cellularity and extracellular space to dynamic contrast-enhanced magnetic resonance imaging (DCE MRI)-based maps of a two-compartment model's parameters describing tumor contrast agent extravasation, specifically tumor extravascular extracellular space (EES) volume fraction (ve), tumor plasma volume fraction (vp) and volume-normalized contrast agent transfer rate between tumor plasma and interstitium (KTRANS/VT).

Materials and Methods

Obtained ve, vp and KTRANS/VT maps were estimated from gadolinium diethylenetriamine penta-acetic acid DCE T1-weighted gradient-echo images at resolutions of 469, 938 and 2500 μm. These parameter maps were compared at each resolution to histologically determined tumor type, and the high-resolution 469-μm maps were compared with automated cell counting using Otsu's method and a color-thresholding method for estimated intracellular (Vintracellular) and extracellular (Vextracellular) space fractions.

Results

The top five KTRANS/VT values obtained from each tumor at 469 and 938 μm resolutions are significantly different from those obtained at 2500 μm (P<.0001) and from one another (P=.0014). Using these top five KTRANS/VT values and the corresponding tumor EES volume fractions ve, we can statistically differentiate invasive ductal carcinomas from noninvasive papillary carcinomas for the 469- and 938-μm resolutions (P=.0017 and P=.0047, respectively), but not for the 2500-μm resolution (P=.9008). The color-thresholding method demonstrated that ve measured by DCE MRI is statistically similar to histologically determined EES. The Vextracellular obtained from the color-thresholding method was statistically similar to the ve measured with DCE MRI for the top 10 KTRANS/VT values (P>.05). DCE MRI-based KTRANS/VT estimates are not statistically correlated with histologically determined cellularity.

Conclusion

DCE MRI estimates of tumor physiology are a limited representation of tumor histological features. Extracellular spaces measured by both DCE MRI and microscopic analysis are statistically similar. Tumor typing by DCE MRI is spatial resolution dependent, as lower resolutions average out contributions to voxel-based estimates of KTRANS/VT. Thus, an appropriate resolution window is essential for DCE MRI tumor diagnosis. Within this resolution window, the top KTRANS/VT values with corresponding ve are diagnostic for the tumor types analyzed in this study.  相似文献   
35.
36.
HIGHT is a lightweight block cipher introduced in CHES 2006 by Hong et al as a block cipher suitable for low‐resource applications. In this paper, we propose improved impossible differential and biclique attacks on HIGHT block cipher both exploiting the permutation‐based property of the cipher's key schedule algorithm as well as its low diffusion. For impossible differential attack, we found a new 17‐round impossible differential characteristic that enables us to propose a new 27‐round impossible differential attack. The total time complexity of the attack is 2120.4 where an amount of 259.3 chosen plaintext‐ciphertext pairs and 2107.4 memory are required. We also instantiate a new biclique cryptanalysis of HIGHT, which is based on the new idea of splitting each of the forward and backward keys into 2 parts where the computations associated to each one are performed independently. The time complexity and data complexity of this attack are 2125.7 and 242, respectively. To the best of our knowledge, this is the fastest biclique attack on full‐round HIGHT.  相似文献   
37.
McEliece and Goldreich–Goldwasser–Halevi (GGH) cryptosystems are two instances of code and lattice-based cryptosystems whose security are based on the hardness of coding theoretic and lattice problems, respectively. However, such cryptosystems have a number of drawbacks which make them inefficient in practice. On the other hand, low density lattice codes (LDLCs) are practical lattice codes which can achieve capacity over additive white Gaussian noise channel and also can be encoded and decoded efficiently. This paper introduces a public key cryptosystem based on Latin square LDLCs, by which a relationship can be attained between code and lattice-based cryptography. In this way, we can exploit the efficient properties of codes and lattices, simultaneously to improve the security and efficiency of the proposed scheme. For instance, the security of this scheme is based on the hard problems related to lattices, i.e., closest vector problem and shortest basis problem, which in turn lead to increase the security level. On the other hand, we exploit the low complexity decoding algorithm of LDLCs to reduce the computational complexity. Moreover, this property allows using the larger values of the codeword length. Also, we use the special Gaussian vector, whose variance is upper bounded by Poltyrev bound, as the perturbation (error) vector. These strategies make the proposed scheme to be secure against the conventional cryptanalytic attacks.  相似文献   
38.
The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing \((\hbox {L-PDS}^2)\) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two specific algorithms as implementations of \(\hbox {L-PDS}^2\) protocol. Our analytical results for the privacy protection capability of \(\hbox {L-PDS}^2\) protocol prove that it provides location privacy preservation with very high probability for users of both networks. Moreover, the simulation results show that the proposed algorithms are efficient in terms of run time.  相似文献   
39.
Following our quest for silylenes and germylenes, we have reached at W shaped novel triplet disilyleno- and digermylenocarbenes
through optimization of 2,3-di(X)disilacyclopropenylidenes and 2,3-di(X)digermacyclopropenylidenes, respectively, at five ab initio and DFT levels (M = Si, Ge; X = H, F, Cl, Br). Also, we have met the challenge of confining SiSi double bonds in singlet cyclopropenylidene ground states by optimizing singlet 2,3-di(X)disilacyclopropenylidenes, at the same levels of theory. Results are compared and contrasted to the corresponding singlet and triplet 2,3-di(X)cyclopropenylidenes.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号