首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1262篇
  免费   216篇
  国内免费   19篇
化学   120篇
晶体学   2篇
力学   61篇
综合类   17篇
数学   45篇
物理学   123篇
无线电   1129篇
  2024年   2篇
  2023年   19篇
  2022年   33篇
  2021年   45篇
  2020年   58篇
  2019年   35篇
  2018年   44篇
  2017年   59篇
  2016年   56篇
  2015年   80篇
  2014年   128篇
  2013年   97篇
  2012年   96篇
  2011年   106篇
  2010年   85篇
  2009年   70篇
  2008年   102篇
  2007年   79篇
  2006年   63篇
  2005年   53篇
  2004年   49篇
  2003年   34篇
  2002年   22篇
  2001年   12篇
  2000年   22篇
  1999年   12篇
  1998年   3篇
  1997年   6篇
  1996年   7篇
  1995年   4篇
  1994年   2篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   1篇
  1984年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有1497条查询结果,搜索用时 906 毫秒
11.
While malicious samples are widely found in many application fields of machine learning, suitable countermeasures have been investigated in the field of adversarial machine learning. Due to the importance and popularity of Support Vector Machines (SVMs), we first describe the evasion attack against SVM classification and then propose a defense strategy in this paper. The evasion attack utilizes the classification surface of SVM to iteratively find the minimal perturbations that mislead the nonlinear classifier. Specially, we propose what is called a vulnerability function to measure the vulnerability of the SVM classifiers. Utilizing this vulnerability function, we put forward an effective defense strategy based on the kernel optimization of SVMs with Gaussian kernel against the evasion attack. Our defense method is verified to be very effective on the benchmark datasets, and the SVM classifier becomes more robust after using our kernel optimization scheme.  相似文献   
12.
It is usually reported that reaction between carbonyl and P2S5 produce thiono group compound. The Products from carbonyl after ammonolysis and hydrazinolysis have the very import applied value in the synthesize of heterocyclic compound. Sulfuration reation if a nucleophilic attack, SPS2 anionsid obtained from P2S5 in the organic sovent, rather easier than thereationsof scheeren’s reagent. The reation mechanism is as follows: The reation speed has something todo with the electronegative of…  相似文献   
13.
14.
The reaction of different epoxides with commercially available imidazole at 60 °C leads to the formation of the corresponding 1-(β-hydroxyalkyl)imidazoles in a regioselective manner. When the reaction is applied to a chiral epoxide [(R)-styrene oxide], the expected chiral alcohol is isolated with the same enantiomeric excess. The use of benzimidazole as the heterocyclic component in the same process also allows the simple preparation of the corresponding 1-(β-hydroxyalkyl)benzimidazoles.  相似文献   
15.
Density functional theory calculations were carried out for the title reactions. Ethylene oxide and methylamine were adopted as reactants. Amine clusters (dimer, trimer, tetramer, and pentamer) were considered, because the combination of one oxide and one amine molecule gave a large activation energy. An amine tetramer was found to react favorably with the oxide via various zwitterionic intermediates. A back-side S(N)2 nucleophilic attack of one amine and the subsequent proton relay up to the front side provide a stabilized reaction field. The amine-alcohol mixed reactant may react readily with the oxide, because the alcoholic O-H group is in contact with the oxide oxygen with the strong hydrogen-bond stabilization.  相似文献   
16.
Metalation of (HSiMe2)3CH with lithium diisopropylamide (LDA) in THF gives (HSiMe2)3CLi, which reacts with ethylene oxide, propylene oxide, 1,2-epoxy butane, 1,2-epoxy pentane, 1,2-epoxy hexane, and epichlorohydrin to give the corresponding 1-oxa-2-silacyclopentane derivatives. Then, glycidylmethacrylate (GM) random copolymers with styrene (St) (in a 1:1 and 1:3 mol ratio) were synthesized by solution free radical polymerization at 70(±1) °C using α,α′-azobis(isobutyronitrile) (AIBN) as an initiator. Both types of copolymers were treated with (HSiMe2)3CLi to give new modified copolymers. The reaction of (HSiMe2)3CLi with epoxides on the side chains of the copolymers does not lead to intramolecular nucleophilic attack contrary to simple epoxides. All the products have been characterized by spectroscopic techniques.  相似文献   
17.
Surprising Reactions on O-Methyl-1,1-dithiooxalates The O-methyl-1,1-dithiooxalate ligand (i-dtoMe) reacts with metalII-acetylacetonates of d8 metal centers (NiII, PdII) forming mononuclear mixed ligand complexes with two remarkable aspects: The formation of a perthioligand, first time described for thiooxalates, and the first example of a nucleophilic attack of a CH-acidic compound (acetylacetonate) on dithiocarbon of coordinated dithiocompounds (here i-dtoMe). X-ray structure is shown for Ph4P[(ptoMe)Ni(i-dtoMeacac)].  相似文献   
18.
强口令认证协议的组合攻击   总被引:7,自引:0,他引:7  
秦小龙  杨义先 《电子学报》2003,31(7):1043-1045
基于强口令的身份认证机制是目前身份认证技术发展的一个重要方向.本文对IEICE上新近提出的一个优化强口令身份认证协议OSPA(Optimal Strong-Password Authentication)进行了分析,并利用本文首次提出的组合攻击方法对其进行了有效攻击.攻击结果表明该协议对凭证被窃问题、中间人攻击、重放攻击和拒绝服务攻击是脆弱的.  相似文献   
19.
Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.  相似文献   
20.
A mathematical model has been developed to analyze the spread of a distributed attack on critical targeted resources in a network. The model provides an epidemic framework with two sub-frameworks to consider the difference between the overall behavior of the attacking hosts and the targeted resources. The analysis focuses on obtaining threshold conditions that determine the success or failure of such attacks. Considering the criticality of the systems involved and the strength of the defence mechanism involved, a measure has been suggested that highlights the level of success that has been achieved by the attacker. To understand the overall dynamics of the system in the long run, its equilibrium points have been obtained and their stability has been analyzed, and conditions for their stability have been outlined.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号