全文获取类型
收费全文 | 705篇 |
免费 | 120篇 |
国内免费 | 8篇 |
专业分类
化学 | 111篇 |
晶体学 | 1篇 |
力学 | 9篇 |
综合类 | 75篇 |
数学 | 205篇 |
物理学 | 432篇 |
出版年
2023年 | 17篇 |
2022年 | 52篇 |
2021年 | 50篇 |
2020年 | 15篇 |
2019年 | 26篇 |
2018年 | 13篇 |
2017年 | 62篇 |
2016年 | 40篇 |
2015年 | 29篇 |
2014年 | 55篇 |
2013年 | 50篇 |
2012年 | 35篇 |
2011年 | 30篇 |
2010年 | 39篇 |
2009年 | 42篇 |
2008年 | 51篇 |
2007年 | 36篇 |
2006年 | 38篇 |
2005年 | 32篇 |
2004年 | 21篇 |
2003年 | 24篇 |
2002年 | 17篇 |
2001年 | 15篇 |
2000年 | 8篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 1篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有833条查询结果,搜索用时 62 毫秒
91.
Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in the face of a terrorist being either strategic or non-strategic. The attack probabilities of a strategic terrorist are endogenously determined in the model, while the attack probabilities of a non-strategic terrorist are exogenously provided. We study the robustness of defensive resource allocations by comparing the government’s total expected losses when: (a) the government knows the probability that the terrorist is strategic; (b) the government falsely believes that the terrorist is fully strategic, when the terrorist could be non-strategic; and (c) the government falsely believes that the terrorist is fully non-strategic, when the terrorist could be strategic. Besides providing six theorems to highlight the general results, we find that game models are generally preferred to non-game model even when the probability of a non-strategic terrorist is significantly greater than 50%. We conclude that defensive resource allocations based on game-theoretic models would not incur too much additional expected loss and thus more preferred, as compared to non-game-theoretic models. 相似文献
92.
This paper focuses on detecting nuclear weapons on cargo containers using port security screening methods, where the nuclear weapons would presumably be used to attack a target within the United States. This paper provides a linear programming model that simultaneously identifies optimal primary and secondary screening policies in a prescreening-based paradigm, where incoming cargo containers are classified according to their perceived risk. The proposed linear programming model determines how to utilize primary and secondary screening resources in a cargo container screening system given a screening budget, prescreening classifications, and different device costs. Structural properties of the model are examined to shed light on the optimal screening policies. The model is illustrated with a computational example. Sensitivity analysis is performed on the ability of the prescreening in correctly identifying prescreening classifications and secondary screening costs. Results reveal that there are fewer practical differences between the screening policies of the prescreening groups when prescreening is inaccurate. Moreover, devices that can better detect shielded nuclear material have the potential to substantially improve the system’s detection capabilities. 相似文献
93.
An efficient and practical isatin-based oxidative domino protocol has been developed for the facile synthesis of 2-aminobenzamides and 2-aminobenzoates. The robust nature of this reaction system is reflected by accessible starting materials, room temperature and high-yield gram-scale synthesis. 相似文献
94.
Ashraf S. Shahvelayati 《中国化学会会志》2019,66(10):1375-1380
Thiouracil‐containing depsipeptides were produced via one‐pot four‐component condensation/Passerini tandem reaction of thiouracil, 2‐chloroacetic acid derivatives, ketones, and isocyanides in ionic liquid as green reaction media in high yields. 相似文献
95.
为了提高图像加密的安全性, 提出了一种多参数加权类分数傅里叶变换。此类多参数加权类分数傅里叶变换是C.C.Shih提出的四项加权类分数傅里叶变换的一种扩展, 除了分数阶数, 还有四个在四项加权系数之中的自由参数, 称其为向量参数。同时给出此多参数加权类分数傅里叶变换的离散形式, 并把这种算法应用到光学图像加密中。此算法在应用一次二维分数傅里叶变换可以有十个密键:一类为阶数参数; 另一类为向量参数, 因此这种加密算法在增加了安全性的同时, 加密过程的复杂度降低。数值仿真验证了此算法的有效性和可靠性。 相似文献
96.
97.
We consider the problem of sending a message from a sender to a receiver through an unreliable network by specifying in a protocol what each vertex is supposed to do if it receives the message from one of its neighbors. A protocol for routing a message in such a graph is finite if it never floods with an infinite number of copies of the message. The expected reliability of a given protocol is the probability that a message sent from reaches when the edges of the network fail independently with probability .We discuss, for given networks, the properties of finite protocols with maximum expected reliability in the case when is close to 0 or 1, and we describe networks for which no one protocol is optimal for all values of . In general, finding an optimal protocol for a given network and fixed probability is challenging and many open problems remain. 相似文献
98.
Benzyl protecting protocol was first employed in two routes for the concise synthesis of dopexamine dihydrochloride.This protecting group could be cleanly removed under mild condition and no unacceptable ion was brought to the final product.The total yield of route I was 43.8% from phenylacetic acid,while it was 54.1% of route II from 2-(3,4-bis(benzyloxy)phenyl)acetic acid.The titration purity of the final product was more than 99.5%,while any single or total impurities met the known standard of the drug by HPLC analysis.The measured residual palladium met an acceptable limit(<1 ppm) as an API for injection. 相似文献
99.
Abraham Sanenga Galefang Allycan Mapunda Tshepiso Merapelo Ludo Jacob Leatile Marata Bokamoso Basutli Joseph Monamati Chuma 《Entropy (Basel, Switzerland)》2020,22(11)
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. 相似文献
100.
Experimental study on age and gender differences in microscopic movement characteristics of students 下载免费PDF全文
《中国物理 B》2021,30(9):98902-098902
Campus security has aroused many concerns from the whole society. Stampede is one of the most frequent and influential accidents in campus. Studies on pedestrian dynamics especially focusing on students are essential for campus security, which are helpful to improve facility design and emergency evacuation strategy. In this paper, primary and middle school students were recruited to participate in the single-file experiments. The microscopic movement characteristics,including walking speed, headway, gait characteristics(step length, step frequency and swaying amplitude) and their relations were investigated. Age and gender differences in the headway-speed diagram and space requirements were analyzed by statistical tests. The results indicated that the impacts of age and gender were significant. There were three stages for the influence of gender on the headway-speed diagram for both age groups. The impacts on students' space requirements were consistent for different age and gender groups. But the impacts of age and gender on free-flow speed were affected by each other. Due to the connection of walking speed and gait characteristics, the comparisons of gait characteristics between different ages and genders were performed to understand the corresponding differences in speed more deeply. The results showed that differences in step length and swaying amplitude between males and females were significant for both age groups. The effect of gender on step frequency was significant for primary students. But for middle school students,whether gender had significant impact on step frequency was not clear here because of the large P-value. Besides, the influence of age on gait characteristics changed with gender. 相似文献