全文获取类型
收费全文 | 252篇 |
免费 | 46篇 |
国内免费 | 14篇 |
专业分类
化学 | 70篇 |
晶体学 | 2篇 |
力学 | 61篇 |
综合类 | 16篇 |
数学 | 44篇 |
物理学 | 119篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 11篇 |
2021年 | 10篇 |
2020年 | 9篇 |
2019年 | 4篇 |
2018年 | 6篇 |
2017年 | 6篇 |
2016年 | 12篇 |
2015年 | 9篇 |
2014年 | 29篇 |
2013年 | 22篇 |
2012年 | 19篇 |
2011年 | 15篇 |
2010年 | 13篇 |
2009年 | 11篇 |
2008年 | 19篇 |
2007年 | 22篇 |
2006年 | 13篇 |
2005年 | 12篇 |
2004年 | 18篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 1篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有312条查询结果,搜索用时 953 毫秒
301.
基于PD控制的航天飞行器控制系统的设计与实现 总被引:1,自引:0,他引:1
当前的飞行器控制系统在运行过程中容易受到噪声因素的干扰,对飞行器的控制存在滞后性和片面性,无法直观描述飞行器的运行状态,设计并实现了一种抗干扰能力强的航天飞行器控制系统,给出了无刷直流电机、电源电路、无线通信模块以及RS-232接口的硬件设计原理,给出了系统主控中心的人机交互界面组成;通过PD算法运算出不同电机的调整量,按照运算出的调整量控制电机的PCA模块,进而控制飞行器电机的转速,调整飞行器的姿态,克服干扰;实验结果说明,该种系统可对飞行器的各种飞行攻角进行准确的控制,该种系统的控制效率参数优于传统系统。 相似文献
302.
Recently, an image fusion encryption algorithm [Optik 124 (18) (2013) 3596–3600] was proposed based on DNA sequence operation and hyper-chaotic system. The security of this algorithm depends mainly on both five keys as the initial conditions of hyper-chaotic system and a key image. In this paper, we cryptanalyze the algorithm and find that two chaotic keystream determined by the five keys keep unchanged for different image encryption processes. The two chaotic keystream can be revealed and the computational complexity is approximately O(mn), where m and n represent the height and width, respectively. In addition, the key image needs to be changed for each encryption. Finally, experimental results also verify our idea. 相似文献
303.
Pietro Baroni Federico Cerutti Massimiliano Giacomin Giovanni Guida 《International Journal of Approximate Reasoning》2011,52(1):19-37
The issue of representing attacks to attacks in argumentation is receiving an increasing attention as a useful conceptual modelling tool in several contexts. In this paper we present AFRA, a formalism encompassing unlimited recursive attacks within argumentation frameworks. AFRA satisfies the basic requirements of definition simplicity and rigorous compatibility with Dung’s theory of argumentation. This paper provides a complete development of the AFRA formalism complemented by illustrative examples and a detailed comparison with other recursive attack formalizations. 相似文献
304.
布尔函数的代数免疫度是在流密码的代数攻击中所产生的重要概念.研究了代数免疫度为1的布尔函数,得到的主要结果有:对代数免疫度为1的布尔函数给出了一个谱刻画,给出了其个数的精确计数公式,最后给出了此类函数的非线性度的紧的上界. 相似文献
305.
306.
Otilia Mó Al Mokhtar Lamsabhi Manuel Yáñez Gavin S. Heverly‐Coulson Russell J. Boyd 《Journal of computational chemistry》2013,34(29):2537-2547
The reactions of XSeSX, XSeSY, and YSeSX (X, Y = CH3, NH2, OH, F) with F? and CN? nucleophiles have been investigated by means of B3PW91/6‐311+G(2df,p) and G4 calculations. In systems where the two substituents are not identical (XSeSY), the more stable of the two possible isomers corresponds to those in which the most electronegative substituent is attached to Se. Nucleophilic attack takes place at Se, independent of the nature of the nucleophile, with the only exception being XSeSF (X = CH3, NH2, OH), in which case the attack occurs at S. In agreement with recent results for disulfide and diselenide linkages, the mechanisms leading to Se—S bond cleavage are not always the more favorable ones because for highly electronegative substituents the most favorable process is fission of the chalcogen‐substituent bond. These dissimilarities in the observed reactivity pattern as a function of the electronegativity of the substituents are due to the fact that the σ‐type Se—S antibonding orbital, which for low‐electronegative substituents is the lowest unnoccupied molecular orbital (LUMO), becomes strongly destabilized when the electronegativity of the substituent increases, and is replaced by an antibonding π‐type Se‐X (or S‐X) orbital. In contrast, however, with what has been found for disulfide and diselenide derivatives, the observed reactivity does not change with the nature of the nucleophile. The activation strain model provides interesting insight into these processes, showing that in most cases the activation barriers are the consequence of subtle differences in the strain or in the interaction energies. © 2013 Wiley Periodicals, Inc. 相似文献
307.
Jing-Lin Zhang Xiao-Bo Ma 《Phosphorus, sulfur, and silicon and the related elements》2013,188(1-4):15-20
Abstract The title reaction was investigated to find that only substitution reaction on amino group occurred when (2-benzothiazolyl)sulfenamides 1 reacted with P(NR2,)3, whereas the treatment of 1 with (RO)P(NR2,)2, gave derivatives of phosphorodiarnidothioic acid together with 2-alkylthiobenzothiazole and its isomer in addition to substitution products, and no substitution products obtained when N-substituted analogues of 1 were treated similarly. 相似文献
308.
实际量子密钥分发系统使用的单光子源主要是由弱激光脉冲经衰减得到。它不是理想单光子源而是服从泊松分布的准单光子源。每个非空光脉冲中包含多光子的概率不为零,强大的窃听者可利用此获得一些关于最终密钥的信息。因此,有必要研究实际QKD系统的安全性。采用对多光子进行分束窃听、单光子最佳攻击相结合的方案,用Shannon信息理论分析了基于弱相干光的实际QKD系统的安全性。研究结果表明实际QKD系统对于分束窃听和最佳攻击是安全的,并给出合法通信双方在该攻击方案下所容忍的误码率上限。 相似文献
309.
310.
The expansion property of cement mortar under the attack of sulfate ions is studied by experimental and theoretical methods. First, cement mortars are fabricated with the ratio of water to cement of 0.4, 0.6, and 0.8. Secondly, the expansion of specimen immerged in sulphate solution is measured at different times. Thirdly, a theoretical model of expansion of cement mortar under sulphate erosion is suggested by virtue of represent volume element method. In this model, the damage evolution due to the interaction between delayed ettringite and cement mortar is taken into account. Finally, the numerical calculation is results indicate that the model perfectly describes performed. The numerical and experimental the expansion of the cement mortar. 相似文献