首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   46篇
  国内免费   14篇
化学   70篇
晶体学   2篇
力学   61篇
综合类   16篇
数学   44篇
物理学   119篇
  2024年   1篇
  2023年   4篇
  2022年   11篇
  2021年   10篇
  2020年   9篇
  2019年   4篇
  2018年   6篇
  2017年   6篇
  2016年   12篇
  2015年   9篇
  2014年   29篇
  2013年   22篇
  2012年   19篇
  2011年   15篇
  2010年   13篇
  2009年   11篇
  2008年   19篇
  2007年   22篇
  2006年   13篇
  2005年   12篇
  2004年   18篇
  2003年   4篇
  2002年   7篇
  2001年   1篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   4篇
  1996年   4篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1984年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有312条查询结果,搜索用时 390 毫秒
291.
赵霞  黎军  左林玄 《实验力学》2013,28(1):63-67
采用激光片光流动显示技术,针对某高机动布局飞机开展大迎角流动机理研究.结果表明激光片光流动显示技术具备捕捉复杂流动结构的能力,可以清晰观察双前翼布局大迎角下机头涡、第一前翼涡、第二前翼涡以及机翼涡等涡结构的生成、发展、融合等复杂流动结构的演化,并且揭示出涡结构扫略垂尾内侧使布局航向更加安定,偏转前翼将使旋涡绕流的涡心降低,造成布局升力提高,低头力矩增加.片光流动显示结果进一步表明,布局航向安定性不足,垂尾需要沿展向外移动,为布局深化设计提供了设计依据.  相似文献   
292.
刘志昊  陈汉武 《中国物理 B》2016,25(8):80308-080308
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol.Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one.  相似文献   
293.
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.  相似文献   
294.
利用奇、偶特征有限域上的正交几何构作出一类C artesian认证码,并且计算了它们的参数.并在假定按照等概率分布来选择编码规则下,求出了认证码的成功的模仿攻击概率和成功的替换攻击概率.作为一个推论,还得到了一些最优的C artesian认证码.  相似文献   
295.
A new computational approach is developed for the analysis of vortex-dominated flow fields around highly swept wings at high angles of attack. In this approach an inviscid Euler technology is coupled with viscous models, similar to inviscid/boundary layer coupling. The viscous nature of the vortex core is represented by an algebraic model derived from the Navier–Stokes equations. The approach also accounts for the effects of the viscous shear layer near a wing surface through a modified surface boundary condition. The inviscid/viscous coupling consistently provides improved predictions of leading edge separation, vortex bursting and secondary vortex formation at relatively low computational cost. Results for several cases are compared with wind tunnel tests and other Euler and Navier-Stokes solutions.  相似文献   
296.
297.
The reaction of -tetrahydrofurylsuccinic anhydride with amines proceeds regiospecifically at room temperature with the formation of N-substituted 2-(-tetrahydrofuryl)succinamic acids. On increasing the temperature the reaction direction is changed and the 3 isomer is mainly formed.  相似文献   
298.
Treatment of Co2(CO)6(-dmad) (where dmad = dimethyl acetylenedicarboxylate) with the bidentate ligand 4,5-bis(diphenylphosphino)-4-cyclopenten-1,3-dione (bpcd) in the presence of added Me3NO affords the new alkyne compound Co2(CO)4(bpcd)(-dmad) in good yield. Both IR and 31P NMR spectroscopies indicate that the bpcd ligand is coordinated to a single cobalt center in a chelating fashion in solution. The solid-state structure of Co2(CO)4(bpcd)(-dmad) is identical to the solution structure Co2(CO)4(bpcd)(-dmad), as determined by X-ray diffraction analysis. Co2(CO)4(bpcd)(-dmad) crystallizes in the triclinic space group P-1, a = 10.7460(8) Å, b = 11.628(2) Å, c = 15.077(1) Å, = 95.831(9)°, = 91.205(7)°, = 101.526(9)°, V = 1834.7(3) Å3, Z = 2, and d calc = 1.514 g/cm3; R = 0.0489, R w = 0.0528 for 2854 reflections with I > 3(I). The thermal reactivity of Co2(CO)4(bpcd)(-dmad) has been briefly explored by spectroscopic methods, and evidence is presented for the attack of one of the PPh2 groups on an alkyne carbon atom in Co2(CO)4(bpcd)(-dmad) to from the zwitterionic hydrocarbyl compound Co2(CO)4(-2:2:1:1-(MeO2C)=C(CO2Me)PPh2C=C(PPh2)C(O)CH2C(O)] upon thermolysis. The redox chemistry of both Co2(CO)4(bpcd)(-dmad) and Co2(CO)4[-2:2:1:1-(MeO2C) C=C(CO2Me)PPh2C=C(PPh2)C(O)CH2C(O)] has been explored by cyclic voltammetery.  相似文献   
299.
The first adducts of NHCs (=N-heterocyclic carbenes) with aromatic polyphosphorus complexes are reported. The reactions of [Cp*Fe(η5-P5)] ( 1 ) (Cp*=pentamethyl-cyclopentadienyl) with IMe (=1,3,4,5-tetramethylimidazolin-2-ylidene), IMes (=1,3-bis(2,4,6-trimethylphenyl)-imidazolin-2-ylidene) and IDipp (=1,3-bis(2,6-diisopropylphenyl)-imidazolin-2-ylidene) led to the corresponding neutral adducts which can be isolated in the solid state. However, in solution, they quickly undergo a dissociative equilibrium between the adduct and 1 including the corresponding NHC. The equilibrium is influenced by the bulkiness of the NHC. [Cp′′Ta(CO)24-P4)] (Cp′′=1,3-di-tert-butylcyclopentadienyl) reacts with IMe under P atom abstraction to give an unprecedented cyclo-P3-containing anionic tantalum complex. DFT calculations shed light onto the energetics of the reaction pathways.  相似文献   
300.
李超  聂敏  刘晓慧 《光子学报》2014,41(3):339-342
本文提出了一个多用户量子信令传输系统,并详细阐述了信令在信道中的传输过程.研究了传输过程中信令受到第三方恶意攻击的损伤模型,并将诱骗态的思想引入量子信令安全的直接通信中,分析了采用不同光强来发送光脉冲,以克服光子数分裂攻击的问题,从而提高了信令传输的安全性.仿真结果表明,本文所提出的对多用户信令攻击的修复策略可有效地检测到光子数分裂数攻击,并增加了安全传输距离,从而保证信令传输过程安全有效的进行.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号