首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   236篇
  免费   42篇
  国内免费   30篇
化学   30篇
力学   5篇
综合类   20篇
数学   118篇
物理学   135篇
  2023年   1篇
  2022年   4篇
  2021年   11篇
  2020年   9篇
  2019年   5篇
  2018年   6篇
  2017年   10篇
  2016年   10篇
  2015年   7篇
  2014年   12篇
  2013年   12篇
  2012年   7篇
  2011年   19篇
  2010年   19篇
  2009年   18篇
  2008年   21篇
  2007年   7篇
  2006年   20篇
  2005年   24篇
  2004年   15篇
  2003年   12篇
  2002年   13篇
  2001年   10篇
  2000年   5篇
  1999年   9篇
  1998年   8篇
  1997年   2篇
  1996年   1篇
  1995年   3篇
  1994年   2篇
  1993年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1978年   1篇
排序方式: 共有308条查询结果,搜索用时 15 毫秒
31.
Point estimators for the parameters of the component lifetime distribution in coherent systems are evolved assuming to be independently and identically Weibull distributed component lifetimes. We study both complete and incomplete information under continuous monitoring of the essential component lifetimes. First, we prove that the maximum likelihood estimator (MLE) under complete information based on progressively Type‐II censored system lifetimes uniquely exists and we present two approaches to compute the estimates. Furthermore, we consider an ad hoc estimator, a max‐probability plan estimator and the MLE for the parameters under incomplete information. In order to compute the MLEs, we consider a direct maximization of the likelihood and an EM‐algorithm–type approach, respectively. In all cases, we illustrate the results by simulations of the five‐component bridge system and the 10‐component parallel system, respectively.  相似文献   
32.
Holonomy algebras of Weyl connections in Lorentzian signature are classified. In particular, examples of Weyl connections with all possible holonomy algebras are constructed.  相似文献   
33.
为进行快速NDT,研究了薄板声谐振子扰动和声学特征变化的关系,用有限元方法分析在睡无缺陷薄板的振动频率和振型。利用数字信号处理技术,实验研究了样品中缺陷对声学特征的影响。实现和理论分析结果一致性很好。研究结果有助于正确利用样品声学特征进行无损检测。  相似文献   
34.
通过融合蒸发反应144Nd(19F,5n)布居了双奇核158Tm的高自旋态. 扩展了原来已知的带结构, 并建立了一条新转动带. 通过与相邻核的比较, 讨论158Tm核中两条四准粒子带的内禀组态, 并分别指定为πh11/2\otimes νh9/2(α=+1/2)\otimes (νi13/2)2和πh11/2\otimes νh9/2(α=-1/2)\otimes (νi13/2)2 组态. 建立在πh11/2\otimes νi13/2组态上的转动带被观测到呈现持续旋称反转现象, 而前述的两条高自旋区的 四准粒子转动带也呈旋称反转. 对这两种类型的旋称反转现象的可能机制进行了简单而定性的讨论.  相似文献   
35.
在A≈80区奇-奇核旋称反转问题上已提出几种机制,但没有一种理论推断是结论性的.在本工作中将角动量投影壳模型应用到80,82Rb核,对组态为πg9/2⊙νg9/2的正宇称晕带和组态为π(p1/2,p3/2,f5/2)⊙νg9/2 的负宇称晕带理论计算和实验结果进行了比较,特别是对正宇称晕带中的signature反转机制进行了探讨.角动量投影壳模型计算显示正宇称晕带中的signature反转是原子核随自旋增加形状发生变化的信号,其间原子核从低自旋的长椭球变到高自旋的扁椭球.此外,还确定了此两带的原子核形状  相似文献   
36.
Certificateless cryptography involves a Key Generation Center (KGC) which issues a partial key to a user and the user also independently generates an additional public/secret key pair in such a way that the KGC who knows only the partial key but not the additional secret key is not able to do any cryptographic operation on behalf of the user; and a third party who replaces the public/secret key pair but does not know the partial key cannot do any cryptographic operation as the user either. We call this attack launched by the third party as the key replacement attack. In ACISP 2004, Yum and Lee proposed a generic construction of digital signature schemes under the framework of certificateless cryptography. In this paper, we show that their generic construction is insecure against key replacement attack. In particular, we give some concrete examples to show that the security requirements of some building blocks they specified are insufficient to support some of their security claims. We then propose a modification of their scheme and show its security in a new and simplified security model. We show that our simplified definition and adversarial model not only capture all the distinct features of certificateless signature but are also more versatile when compared with all the comparable ones. We believe that the model itself is of independent interest.A conventional certificateless signature scheme only achieves Girault’s Level 2 security. For achieving Level 3 security, that a conventional signature scheme in Public Key Infrastructure does, we propose an extension to our definition of certificateless signature scheme and introduce an additional security model for this extension. We show that our generic construction satisfies Level 3 security after some appropriate and simple modification. A preliminary version of the extended abstract of partial results appeared in ACISP 2006 [9].  相似文献   
37.
一种移动Agent的安全认证方案的设计与实现   总被引:2,自引:0,他引:2  
针对移动Agent的安全问题,简要介绍了几种常用的安全认证技术,并在公钥密码体制认证方案的基础上,提出并实现了一种可用于移动Agent和Agent平台之间安全认证的方案。证书采用X.509证书格式,使用RSA和IDEA混合加密的算法,密钥管理采用PGP算法中公私钥环的方式,使该认证方案具有很高的安全性。文中详细说明了方案的实现流程,并深入分析了其安全性。结果表明,采用该方案能有效改善移动Agent的安全性。  相似文献   
38.
We introduce the notion of signature for relations in mapping class groups and show that the signature of a Lefschetz fibration over the 2-sphere is the sum of the signatures for basic relations contained in its monodromy. Combining explicit calculations of the signature cocycle with a technique of substituting positive relations, we give some new examples of non-holomorphic Lefschetz fibrations of genus and which violate slope bounds for non-hyperelliptic fibrations on algebraic surfaces of general type.

  相似文献   

39.
We present protocols for speeding up fixed-base variable-exponent exponentiation and variable-base fixed-exponent exponentiation using an untrusted computational resource. In the fixed-base protocols, the exponent may be blinded. In the variable-base protocols, the base may be blinded. The protocols are described for exponentiation in a cyclic group. We describe how to extend them to exponentiation modulo an integer where the modulus is the product of primes with single multiplicity. The protocols provide a speedup of over the square-and-multiply algorithm, where k is the bitlength of the exponent. One application of the protocols is to speed up exponentiation-based verification in discrete log-based signature and credential schemes. The protocols also allow signature verifiers to dynamically choose, for each message, the amount of work it would like to perform to verify the signature. This results in a work-security tradeoff. We introduce a fifth protocol to perform variable-base variable- exponent exponentiation, which also has this feature. Our model allows the trusted resource to perform computations in its idle time. The protocols facilitate the offloading of work to the offline stage, such that the work the trusted resource performs when it has to do an exponentiation is smaller. Our protocols are unconditionally secure.  相似文献   
40.
??Coherent systems are very important in reliability,survival analysis and other life sciences. In this paper, we consider the number of working components in an $(n-k+1)$-out-of-$n$ system, given that at least $(n-m+1)$ components are working at time $t$, and the system has failed at time $t$. In this condition, we compute the probability that there are exactly $i$ working components. First the reliability and several stochastic properties are obtained. Furthermore, we extend the results to general coherent systems with absolutely continuous and exchangeable components.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号