首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   89篇
  免费   4篇
化学   10篇
力学   14篇
综合类   1篇
数学   52篇
物理学   16篇
  2024年   1篇
  2022年   3篇
  2021年   3篇
  2019年   2篇
  2016年   4篇
  2015年   1篇
  2014年   3篇
  2013年   3篇
  2012年   2篇
  2011年   7篇
  2010年   2篇
  2009年   7篇
  2008年   7篇
  2007年   7篇
  2006年   4篇
  2005年   4篇
  2004年   6篇
  2003年   1篇
  2002年   2篇
  2001年   1篇
  2000年   3篇
  1998年   2篇
  1997年   3篇
  1996年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1984年   1篇
  1983年   1篇
  1981年   1篇
排序方式: 共有93条查询结果,搜索用时 62 毫秒
71.
系统地研究了高压下一系列TiSi2催化剂的可见光光热催化分解水制氢行为.研究结果表明,压力增加显著提高了TiSi2催化剂光催化分解水制氢速率.添加NaOH和Na2CO3有利于水分解制氢的反应进行,在一定范围内,NaOH和Na2CO3浓度增加,放氢速率增加.研究还发现,担载贵金属Pt或Ru对反应速率没有显著影响.本文还采...  相似文献   
72.
I Let D be a launder domain in Rz with Lipehitz continuous bodare I'. ac consider the stream-vortidty form of hmedependent Navier-stokes Muahons describing the 'flow Of a ~ incompreSSible nuid confined in Dwhere to and & are vorticity and stream function. BecaUSe the action (1) doeS not include the differentialten z, ~ tie ~ con&tion of' dab at In tthe Paper, we give a ho element n~ Galerkin ~, acs ~ is ~ an tab finite element spaceS X. and X* for the aPPmxhaation of the ~ ac v~ fUncti…  相似文献   
73.
Numerical analysis of dynamic behavior of stream turbine blade group   总被引:1,自引:0,他引:1  
This paper considers the stream turbine blade group as a rotationally periodic structure and the complex constraint method has been induced. The effect of the centrifugal force to dynamic vibration frequency has been considered by introducing a nonlinear large deformation equation. A method has been given to introduce the special constraint between the fin heaves of every blade during dynamic analysis.  相似文献   
74.
利用Legendre和伴随Legendre函数来数值模拟定常和不定常的轴对称的同心旋转球间的不可压缩流体的流动.  相似文献   
75.
This article presents the author’s own metaheuristic cryptanalytic attack based on the use of differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local search process through simulated annealing (SA). The suggested attack will be verified on a set of ciphertexts generated with the well-known DES (data encryption standard) reduced to six rounds. The aim of the attack is to guess the last encryption subkey, for each of the two characteristics Ω. Knowing the last subkey, it is possible to recreate the complete encryption key and thus decrypt the cryptogram. The suggested approach makes it possible to automatically reject solutions (keys) that represent the worst fitness function, owing to which we are able to significantly reduce the attack search space. The memetic algorithm (MASA) created in such a way will be compared with other metaheuristic techniques suggested in literature, in particular, with the genetic algorithm (NGA) and the classical differential cryptanalysis attack, in terms of consumption of memory and time needed to guess the key. The article also investigated the entropy of MASA and NGA attacks.  相似文献   
76.
原子荧光光谱法测定土壤、水系沉积物中的碲   总被引:1,自引:0,他引:1  
黄春晖 《光谱实验室》2011,28(3):1081-1084
对土壤、水系沉积物等地球化学样品中碲的原子荧光光谱测定方法进行了一些改进.方法检出限为0.0081μg/L.对实际样品进行连续12次测定,方法精密度(RSD)为3.55%.  相似文献   
77.
How Many Bits have to be Changed to Decrease the Linear Complexity?   总被引:2,自引:0,他引:2  
The k-error linear complexity of periodic binary sequences is defined to be the smallest linear complexity that can be obtained by changing k or fewer bits of the sequence per period. For the period length p n, where p is an odd prime and 2 is a primitive root modulo p 2, we show a relationship between the linear complexity and the minimum value k for which the k-error linear complexity is strictly less than the linear complexity. Moreover, we describe an algorithm to determine the k-error linear complexity of a given p n-periodic binary sequence.  相似文献   
78.
We address the problem of designing efficient algorithms for media-on-demand in systems that use stream merging. In the stream merging model the receiving bandwidth of clients is larger than the playback bandwidth, and clients can buffer parts of the transmission to be played back later. Our goal is to minimize the required server bandwidth for a given guaranteed start-up delay and uninterrupted playback. We construct an efficient O(n) optimal off-line algorithm for a time horizon that is composed of n time slots, where the length of one slot is the guaranteed start-up delay. Our algorithm works for either clients with receiving bandwidth twice as much as the playback bandwidth or for receiving bandwidth equal to the server bandwidth, independent of the clients buffer size. We describe an on-line delay guaranteed algorithm that operates without knowledge of the time horizon size, and show that it performs asymptotically close to the optimal off-line algorithm. The on-line algorithm is simpler to implement than previously proposed on-line stream merging algorithms, and empirically performs well when the intensity of client arrivals is high.  相似文献   
79.
Key-dependent S-boxes gained some prominence in block cipher design when Twofish became an AES finalist. In this paper we make some observations on how the cryptanalyst might work with key-dependent S-boxes, we begin to develop a framework for the differential cryptanalysis of key-dependent S-boxes, and we introduce some basic techniques that were used in an analysis of reduced-round Twofish.  相似文献   
80.
为了研究风沙流动所引起的沙漠化问题,本文详细研究了在风的作用下沙漠流场及其基于流体动力学的数学模型建立过程,从沙漠流场的实际性质出发,首先分析了气流场本构方程式的建立过程,然后分析了气流场和沙漠流场的牵连关系和独立性,进一步深入地分析了沙漠流场及其本构方程式的建立过程,最后给出了气流场影响下的沙漠流场的数学模型,为今后的数值分析提供了理论基础。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号