首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2455篇
  免费   348篇
  国内免费   99篇
化学   73篇
晶体学   2篇
力学   62篇
综合类   23篇
数学   60篇
物理学   150篇
无线电   2532篇
  2024年   5篇
  2023年   32篇
  2022年   53篇
  2021年   65篇
  2020年   74篇
  2019年   51篇
  2018年   65篇
  2017年   94篇
  2016年   119篇
  2015年   142篇
  2014年   246篇
  2013年   212篇
  2012年   234篇
  2011年   251篇
  2010年   207篇
  2009年   204篇
  2008年   197篇
  2007年   195篇
  2006年   185篇
  2005年   69篇
  2004年   58篇
  2003年   37篇
  2002年   25篇
  2001年   12篇
  2000年   22篇
  1999年   12篇
  1998年   3篇
  1997年   6篇
  1996年   7篇
  1995年   4篇
  1994年   2篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   1篇
  1984年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有2902条查询结果,搜索用时 15 毫秒
61.
Abstract

The effects of two metal complexes of 2,2′‐dipyridylamine (bpya) ligand, [(bpya)Cu]Cl2 and [(bpya)Zn]Cl2, in promoting the hydrolysis of bis(4‐nitrophenyl) phosphate (BNPP) have been kinetically investigated in Brij35 micellar solution and at 298 K, pH ranging from 6.41 to 8.6. In neutral micellar solution at 298 K, pH 7.02, the rate constants for the catalytic hydrolysis of BNPP by [(bpya)Cu]Cl2 and [(bpya)Zn]Cl2 are 1.2 × 106 times and 1.5 × 105 times higher than those for the spontaneous hydrolysis, respectively. Kinetic studies show that the active species in the catalytic hydrolysis of BNPP is the aquo‐hydroxy form, and the relative kinetic and thermodynamic parameters indicate that the mechanism of the reaction involves intramolecular nucleophilic attack on the metal center‐bound diester.  相似文献   
62.
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
63.
Evidence of internal sulfate attack in field exposure was demonstrated by the damaged interior wall of a three‐year‐old house situated in Nakhon Ratchasima Province, Thailand. Partial distension of the mortar was clearly observed together with an expansion of a black substance. Removal of the black substance revealed a dense black layer. This layer was only found in the vicinity of the damaged area, suggesting that this black material is possibly involved in the wall cracking. By employing synchrotron‐based X‐ray photoelectron spectroscopy (XPS) and X‐ray absorption near‐edge structure (XANES) techniques, the unknown sample was chemically identified. The S 2p and O 1s XPS results mutually indicated the existence of sulfate species in the materials collected from the damaged area. The XANES results indicated the presence of ferrous (II) sulfate, confirming sulfate‐induced expansion and cracking. The sulfate attack in the present case appeared to physically affect the structure whereas the chemical integrity at the molecular level of the calcium silicate hydrate phase was retained since there was a lack of spectroscopic evidence for calcium sulfate. It was speculated that internal sulfate probably originated from the contaminated aggregates used during the construction. The current findings would be beneficial for understanding the sulfate‐attack mechanism as well as for future prevention against sulfate attack during construction.  相似文献   
64.
王忠勇  张延彬 《电讯技术》2006,46(3):123-126
论述了基于DSP技术的RFID读写器设计方法。在描述RFID系统组成的基础上,给出了读写器的软硬件设计流程。重点阐述了DSP对接收信号的软件处理以及反冲撞功能的实现方法。该读写器已应用于开放式门禁系统中,实际应用结果表明其性能良好。  相似文献   
65.
基于RFID专用读写模块和IC卡的手机支付新方案的研究   总被引:2,自引:0,他引:2  
蔡逆水 《电信科学》2006,22(10):4-7
本文首先研究了移动支付业务需求、业务模式、技术背景与实现方式,然后描述了将RFID技术与移动通信技术相结合实现移动支付业务的技术方案,最后针对国内移动支付的发展现状,详细介绍了基于RFID专用读写模块和IC卡的手机移动支付新方案.  相似文献   
66.
针对复杂多步攻击检测问题,研究面向云计算环境的攻击场景构建方法.首先,构建了动态概率攻击图模型,设计了概率攻击图更新算法,使之能够随着时空的推移而周期性更新,从而适应弹性、动态性的云计算环境.其次,设计了攻击意图推断算法和最大概率攻击路径推断算法,解决了误报、漏报导致的攻击场景错误、断裂等不确定性问题,保证了攻击场景的...  相似文献   
67.
空对空多目标攻击载机攻击航线求解逻辑   总被引:1,自引:1,他引:0  
介绍了空对空多目标攻击载机攻击航线的基本要求、航线选择和求解方法,以及载机航线、瞄准偏差、操纵指令的计算逻辑图.同时还介绍了多目标攻击"可能攻击扇形区"交集的概念和在载机航线求解中的应用等问题.  相似文献   
68.
传统湿度传感器制造工艺复杂、需有线连接信号,对此,文中提出一种纸基无芯片射频识别(Radio Frequency Identification, RFID)湿度传感器。为提升传感器谐振特性,选择非对称开口环内部分布式加载金属碎片作为传感器结构,聚乙烯醇(PVA)作为湿敏材料,使用遗传算法和HFSS射频仿真软件来设计并优化传感器结构。以喷墨打印技术制作传感器样品,采用滴涂法在传感器表面分别制备了5%、10%、15%三种质量浓度比的PVA薄膜。湿敏特性仿真及测试结果一致表明:PVA与纸基底协同作用可显著提高传感器灵敏度。随PVA浓度增加灵敏度增加,15%PVA传感器灵敏度最高,高湿灵敏度达到12.22 MHz/%RH,但随PVA浓度增加恢复特性变差,5%PVA湿度传感器具有良好的恢复特性,恢复度达83.87%。通过长期多次实验验证了PVA纸基湿度传感器具有良好的温度稳定性与中长期稳定性。与同类研究成果对比,文中设计在感湿范围及灵敏度方面有优势且制造工艺更简单,为低成本湿度传感器的大规模使用提供了可能。  相似文献   
69.
基于运动矢量统计的同步视频水印算法   总被引:3,自引:2,他引:1  
通过分析运动矢量的数据统计特性,提出一种基于统计的抗同步攻击视频水印算法.该算法水印信息表示空间与数据特性紧密联系,具有物理空间、时间不可划分性,克服了传统水印算法的检测器对水印同步的依赖性.实验表明,该算法具有很好的鲁棒性和不可感知性,能够抵抗帧删除等同步攻击以及基于视频内容的攻击;在帧删除率小于18%时,水印正确率大于80%.  相似文献   
70.
Inspired by the promising potential of re-configurable intelligent surface (RIS)-aided transmission in achieving the vision of 6th Generation (6G) network, we analyze the security model for a vehicular-to-infrastructure (V2I) network by considering multiple RISs (M-RIS) on buildings to act as passive relays at fixed distances from a source. In addition, multiple eavesdroppers are presented in the vicinity of the intended destination. Our aim is to enhance the secrecy capacity (SC) and to minimize secrecy outage probability (SOP) in presence of multiple eavesdroppers with the help of M-RIS in V2I communications. We propose a key-less physical layer security using beam-forming by exploiting M-RIS. The proposed approach assumes the concept of detecting eavesdroppers before the information can be transmitted via beam-forming by utilizing M-RIS. The results reveal that with consideration of M-RIS and beam-forming, the achievable SC and SOP performance is significantly improved while imposing minimum power consumption and fewer RIS reflectors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号