首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   705篇
  免费   120篇
  国内免费   8篇
化学   111篇
晶体学   1篇
力学   9篇
综合类   75篇
数学   205篇
物理学   432篇
  2023年   17篇
  2022年   52篇
  2021年   50篇
  2020年   15篇
  2019年   26篇
  2018年   13篇
  2017年   62篇
  2016年   40篇
  2015年   29篇
  2014年   55篇
  2013年   50篇
  2012年   35篇
  2011年   30篇
  2010年   39篇
  2009年   42篇
  2008年   51篇
  2007年   36篇
  2006年   38篇
  2005年   32篇
  2004年   21篇
  2003年   24篇
  2002年   17篇
  2001年   15篇
  2000年   8篇
  1999年   4篇
  1998年   7篇
  1997年   1篇
  1996年   6篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   4篇
  1990年   1篇
  1989年   2篇
  1984年   2篇
  1983年   1篇
  1978年   1篇
排序方式: 共有833条查询结果,搜索用时 62 毫秒
91.
Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in the face of a terrorist being either strategic or non-strategic. The attack probabilities of a strategic terrorist are endogenously determined in the model, while the attack probabilities of a non-strategic terrorist are exogenously provided. We study the robustness of defensive resource allocations by comparing the government’s total expected losses when: (a) the government knows the probability that the terrorist is strategic; (b) the government falsely believes that the terrorist is fully strategic, when the terrorist could be non-strategic; and (c) the government falsely believes that the terrorist is fully non-strategic, when the terrorist could be strategic. Besides providing six theorems to highlight the general results, we find that game models are generally preferred to non-game model even when the probability of a non-strategic terrorist is significantly greater than 50%. We conclude that defensive resource allocations based on game-theoretic models would not incur too much additional expected loss and thus more preferred, as compared to non-game-theoretic models.  相似文献   
92.
This paper focuses on detecting nuclear weapons on cargo containers using port security screening methods, where the nuclear weapons would presumably be used to attack a target within the United States. This paper provides a linear programming model that simultaneously identifies optimal primary and secondary screening policies in a prescreening-based paradigm, where incoming cargo containers are classified according to their perceived risk. The proposed linear programming model determines how to utilize primary and secondary screening resources in a cargo container screening system given a screening budget, prescreening classifications, and different device costs. Structural properties of the model are examined to shed light on the optimal screening policies. The model is illustrated with a computational example. Sensitivity analysis is performed on the ability of the prescreening in correctly identifying prescreening classifications and secondary screening costs. Results reveal that there are fewer practical differences between the screening policies of the prescreening groups when prescreening is inaccurate. Moreover, devices that can better detect shielded nuclear material have the potential to substantially improve the system’s detection capabilities.  相似文献   
93.
An efficient and practical isatin-based oxidative domino protocol has been developed for the facile synthesis of 2-aminobenzamides and 2-aminobenzoates. The robust nature of this reaction system is reflected by accessible starting materials, room temperature and high-yield gram-scale synthesis.  相似文献   
94.
Thiouracil‐containing depsipeptides were produced via one‐pot four‐component condensation/Passerini tandem reaction of thiouracil, 2‐chloroacetic acid derivatives, ketones, and isocyanides in ionic liquid as green reaction media in high yields.  相似文献   
95.
张海莹  冉启文  张晋 《光学学报》2008,28(s2):117-120
为了提高图像加密的安全性, 提出了一种多参数加权类分数傅里叶变换。此类多参数加权类分数傅里叶变换是C.C.Shih提出的四项加权类分数傅里叶变换的一种扩展, 除了分数阶数, 还有四个在四项加权系数之中的自由参数, 称其为向量参数。同时给出此多参数加权类分数傅里叶变换的离散形式, 并把这种算法应用到光学图像加密中。此算法在应用一次二维分数傅里叶变换可以有十个密键:一类为阶数参数; 另一类为向量参数, 因此这种加密算法在增加了安全性的同时, 加密过程的复杂度降低。数值仿真验证了此算法的有效性和可靠性。  相似文献   
96.
一类改进的混沌迭代加密算法   总被引:3,自引:0,他引:3       下载免费PDF全文
指出了最近提出的一类混沌迭代分组密码算法的缺陷,通过选择明文攻击可以恢复出置换后的明文.算法中二进制序列的产生只依赖于密钥,而与明文无关,从而使算法容易造成信息泄露并遭受攻击.基于此,给出了一种可以抵御选择明文攻击的安全性更高的算法. 关键词: 混沌 混沌密码 攻击 安全性  相似文献   
97.
We consider the problem of sending a message from a sender s to a receiver r through an unreliable network by specifying in a protocol what each vertex is supposed to do if it receives the message from one of its neighbors. A protocol for routing a message in such a graph is finite if it never floods r with an infinite number of copies of the message. The expected reliability of a given protocol is the probability that a message sent from s reaches r when the edges of the network fail independently with probability 1?p.We discuss, for given networks, the properties of finite protocols with maximum expected reliability in the case when p is close to 0 or 1, and we describe networks for which no one protocol is optimal for all values of p. In general, finding an optimal protocol for a given network and fixed probability is challenging and many open problems remain.  相似文献   
98.
Benzyl protecting protocol was first employed in two routes for the concise synthesis of dopexamine dihydrochloride.This protecting group could be cleanly removed under mild condition and no unacceptable ion was brought to the final product.The total yield of route I was 43.8% from phenylacetic acid,while it was 54.1% of route II from 2-(3,4-bis(benzyloxy)phenyl)acetic acid.The titration purity of the final product was more than 99.5%,while any single or total impurities met the known standard of the drug by HPLC analysis.The measured residual palladium met an acceptable limit(<1 ppm) as an API for injection.  相似文献   
99.
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided.  相似文献   
100.
《中国物理 B》2021,30(9):98902-098902
Campus security has aroused many concerns from the whole society. Stampede is one of the most frequent and influential accidents in campus. Studies on pedestrian dynamics especially focusing on students are essential for campus security, which are helpful to improve facility design and emergency evacuation strategy. In this paper, primary and middle school students were recruited to participate in the single-file experiments. The microscopic movement characteristics,including walking speed, headway, gait characteristics(step length, step frequency and swaying amplitude) and their relations were investigated. Age and gender differences in the headway-speed diagram and space requirements were analyzed by statistical tests. The results indicated that the impacts of age and gender were significant. There were three stages for the influence of gender on the headway-speed diagram for both age groups. The impacts on students' space requirements were consistent for different age and gender groups. But the impacts of age and gender on free-flow speed were affected by each other. Due to the connection of walking speed and gait characteristics, the comparisons of gait characteristics between different ages and genders were performed to understand the corresponding differences in speed more deeply. The results showed that differences in step length and swaying amplitude between males and females were significant for both age groups. The effect of gender on step frequency was significant for primary students. But for middle school students,whether gender had significant impact on step frequency was not clear here because of the large P-value. Besides, the influence of age on gait characteristics changed with gender.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号