全文获取类型
收费全文 | 263篇 |
免费 | 45篇 |
国内免费 | 15篇 |
专业分类
化学 | 70篇 |
晶体学 | 2篇 |
力学 | 62篇 |
综合类 | 16篇 |
数学 | 44篇 |
物理学 | 129篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 18篇 |
2021年 | 10篇 |
2020年 | 9篇 |
2019年 | 4篇 |
2018年 | 6篇 |
2017年 | 6篇 |
2016年 | 12篇 |
2015年 | 10篇 |
2014年 | 30篇 |
2013年 | 22篇 |
2012年 | 19篇 |
2011年 | 15篇 |
2010年 | 13篇 |
2009年 | 11篇 |
2008年 | 19篇 |
2007年 | 22篇 |
2006年 | 14篇 |
2005年 | 12篇 |
2004年 | 18篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 1篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有323条查询结果,搜索用时 18 毫秒
241.
J. Dubac A. Laporterie G. Manuel H. Iloughmane 《Phosphorus, sulfur, and silicon and the related elements》2013,188(1-2):191-203
Abstract In order to obtain β-functionalized 1-sila (or germa)-cyclopent-2-enes (M = Si, Ge; R1, R2 = Me or Ph; R3, R4 = H or Me) (I) various oxidation methods of metallacyclopent-3-enes have been examinated. The resulting metallacyclopent-4-ene-3-ols (I, X = OH) were converted into phenylcarbamates (I = OC(O)NHPh) or S-methylxanthates (I = OC(S)SMe) and their utility as intermediates in the synthesis of metalloles (siloles and germoles) was investigated. Depending on the experimental conditions, catalytic dehydration of metallacyclopentenols or thermolysis of carbamates or xanthates give various dienes via four different reaction processes: i) β-elimination C-M; ii) β-elimination C-H; iii) isomerization of C-methylated metalloles; iv) catalytic demetallation. The thermolysis of arylcarbamates is the best method for conversion of I to metalloles, specially for the synthesis of remarkably dimerization-stable 1,1-R1R2-3,4-dimethylmetalloles (≥ 80% yield). A one pot synthesis of these stable metalloles from the corresponding alcohol and phenyl isocyanate is proposed. Unstable monomeric metalloles are stabilized by transition metal complexes or trapped by a (4 + 2) cycloaddition. 相似文献
242.
The exact mechanisms of the phase transitions caused by a combined sulphate-chloride attack are discussed controversially. The main points concern the mutual influences of sulphate and chloride ions during the secondary binding processes of these anions within cement hydrate phases. We simulated combined sulphate-chloride attack under laboratory conditions using solutions containing NaCl and Na2SO4 in different concentrations. Three sample compositions were used for the preparation of the specimens. In two of them, 30% of Portland cement was replaced by supplementary cementitious materials (fly ash, slag).The phase distribution in the samples was determined using synchrotron X-ray diffraction. The analysis with high spatial resolution allows the localisation of the secondary phase formation in the microstructural profile of the sample. A mechanism of the phase developments under combined sulphate-chloride attack is derived. 相似文献
243.
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
244.
A saturation attack can be employed for compromising the practical security of continuous-variable quantum key distribution (CVQKD). In this paper, we suggest a countermeasure approach to resisting this attack by embedding an adjustable optical filter (AOF) in the CVQKD system. Numerical simulations illustrate the effects of the AOF-enabled countermeasure on the performance in terms of the secret key rate and transmission distance. The legal participants can trace back the information that has been eavesdropped by an attacker from the imperfect receiver, which indicates that this approach can be used for defeating a saturation attack in practical quantum communications. 相似文献
245.
Han Cao Chengxiang Si Qindong Sun Yanxiao Liu Shancang Li Prosanta Gope 《Entropy (Basel, Switzerland)》2022,24(3)
The vulnerability of deep neural network (DNN)-based systems makes them susceptible to adversarial perturbation and may cause classification task failure. In this work, we propose an adversarial attack model using the Artificial Bee Colony (ABC) algorithm to generate adversarial samples without the need for a further gradient evaluation and training of the substitute model, which can further improve the chance of task failure caused by adversarial perturbation. In untargeted attacks, the proposed method obtained 100%, 98.6%, and 90.00% success rates on the MNIST, CIFAR-10 and ImageNet datasets, respectively. The experimental results show that the proposed ABCAttack can not only obtain a high attack success rate with fewer queries in the black-box setting, but also break some existing defenses to a large extent, and is not limited by model structure or size, which provides further research directions for deep learning evasion attacks and defenses. 相似文献
246.
Yun Shao Yan Pan Heng Wang Yaodi Pi Yang Li Li Ma Yichen Zhang Wei Huang Bingjie Xu 《Entropy (Basel, Switzerland)》2022,24(7)
The estimation of phase noise of continuous-variable quantum key distribution protocol with a local local oscillator (LLO CVQKD), as a major process in quantifying the secret key rate, is closely relevant to the intensity of the phase reference. However, the transmission of the phase reference through the insecure quantum channel is prone to be exploited by the eavesdropper (Eve) to mount attacks. Here, we introduce a polarization attack scheme against the phase reference. Presently, in a practical LLO CVQKD system, only part of the phase reference pulses are measured to compensate for the polarization drift of the quantum signal pulses in a compensation cycle due to the limited polarization measurement rate, while the other part of the phase reference pulses are not measured. We show that Eve can control the phase noise by manipulating the polarization direction of the unmeasured phase reference to hide her attack on the quantum signal. Simulations show that Eve can obtain partial or total key rates information shared between Alice and Bob as the transmission distance increases. Improving the polarization measurement rate to 100% or monitoring the phase reference intensity in real-time is of great importance to protect the LLO CVQKD from polarization attack. 相似文献
247.
Yu Zhao Wanli Zuo Shining Liang Xiaosong Yuan Yijia Zhang Xianglin Zuo 《Entropy (Basel, Switzerland)》2022,24(2)
As a data augmentation method, masking word is commonly used in many natural language processing tasks. However, most mask methods are based on rules and are not related to downstream tasks. In this paper, we propose a novel masking word generator, named Actor-Critic Mask Model (ACMM), which can adaptively adjust the mask strategy according to the performance of downstream tasks. In order to demonstrate the effectiveness of the method, we conducted experiments on two causal event extraction datasets. Experiment results show that, compared with various rule-based masking methods, the masked sentences generated by our proposed method can significantly enhance the generalization of the model and improve the model performance. 相似文献
248.
研究了基于Arnold变换的图像置乱算法的安全性问题.该算法使用两个不同的Arnold变换矩阵,分别对明文图像进行一次全局置乱和一次分割置乱.结果分析表明,该算法的密钥空间小,不足以抵抗穷举密钥攻击.在选择明文攻击下,导出了两次Arnold变换等效密钥之间的确定性关系.这一关系有效地降低了整个密码系统的密钥空间,从而可以用较小的计算代价获得密钥.理论和实验结果均表明,该密码系统不够安全. 相似文献
249.
基于线导+尾流自导鱼雷的弹道特点和末端尾流进入角的使用限制,选用Runge-Kutta方法,得出线导+尾流自导鱼雷在不同尾流进入角和不同射距时的弹道轨迹,进而分析并解算出线导+尾流自导鱼雷有效射击可行域.方法对自导鱼雷有效射击可行域解算方法进行了较大改进,能更好地满足线导+尾流自导鱼雷作战使用时射击阵位点选择需求. 相似文献
250.
对一般的(带保密的)多个接收者认证码进行了讨论,给出了这类认证码的r阶欺骗攻击成功概率的信息论下界,并利用部分平衡t-设计和狭义区组设计刻划了达到信息论下界的多个接收者认证码的组合特征。 相似文献