首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48篇
  免费   0篇
  国内免费   1篇
化学   5篇
力学   1篇
数学   8篇
物理学   35篇
  2019年   2篇
  2013年   1篇
  2012年   1篇
  2010年   1篇
  2009年   1篇
  2005年   1篇
  2004年   2篇
  2002年   4篇
  2001年   1篇
  2000年   5篇
  1999年   4篇
  1998年   3篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   5篇
  1988年   2篇
  1987年   1篇
  1983年   1篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1978年   1篇
  1975年   1篇
  1971年   1篇
排序方式: 共有49条查询结果,搜索用时 0 毫秒
1.
Experiments concerning the properties of soap films have recently been carried out and these systems have been proposed as experimental versions of theoretical two‐dimensional liquids. A silk filament introduced into a flowing soap film, was seen to demonstrate various stable modes, and these were, namely, a mode in which the filament oscillates and one in which the filament is stationary and aligns with the flow of the liquid. The system could be forced from the oscillatory mode into the non‐ oscillatory mode by varying the length of the filament. In this article we use numerical and computational techniques in order to simulate the strongly coupled behaviour of the filament and the fluid. Preliminary results are presented for the specific case in which the filament is seen to oscillate continuously for the duration of our simulation. We also find that the filament oscillations are strongly suppressed when we reduce the effective length of the filament. We believe that these results are reminiscent of the different oscillatory and non‐oscillatory modes observed in experiment. The numerical solutions show that, in contrast to experiment, vortices are created at the leading edge of the filament and are preferentially grown in the curvature of the filament and are eventually released from the trailing edge of the filament. In a similar manner to oscillating hydrofoils, it seems that the oscillating filaments are in a minimal energy state, extracting sufficient energy from the fluid to oscillate. In comparing numerical and experimental results it is possible that the soap film does have an effect on the fluid flow especially in the boundary layer where surface tension forces are large. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
2.
3.
4.
A complete ro structure has been obtained for propadienone (CH2CCCO) with the aid of ab initio molecular-orbital calculations. The effect of electron correlation has been investigated using third order Møller-Plesset perturbation theory. The molecule is found to be planar bent (CCC145°) and the calculated structure yields rotational constants which are in good agreemant with experimental values.  相似文献   
5.
Ab initio molecular orbital calculations with the STO-3G and 4-31G basis sets have been carried out for the neutral oxocarbons CnOn (n = 3, 4, 5, 6 and 7), the dianions CnOn2- (n = 3, 4, 5, 6 and 7), the monoanions CnOnH? (n = 3 and 4) and the related acids CnOnH2 (n = 3 and 4). Fully optimised geometries have been obtained for all species. The geometries, stabilities and acidities are discussed.  相似文献   
6.
Ab initio molecular orbital calculations have been used to compute potential energy and dipole moment functions for the X2II and a4Σ? states of NH+. These functions have been used to compute rotational-vibrational energy levels, including the interaction between the two states. Transition moments have been calculated for transitions between these levels, using either the results of numerical diagonalization of the Hamiltonian, or more approximately by fitting analytic functions. Good agreement with experimental data is found, and our results have also been used to interpret previously unassigned spectral lines.  相似文献   
7.
A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presentedMost of this work was done while he was with Rome CryptoDesign Center, Gemplus, Italy  相似文献   
8.
The motion of a holonomic scleronomic non-conservative mechanicalsystem with minimal dissipation is considered. As applicationsof the theory several problems are studied in detail.  相似文献   
9.
Fusion cross-sections for the 7Li + 12C reaction have been measured at energies above the Coulomb barrier by the direct detection of evaporation residues. The heavy evaporation residues with energies below 3 MeV could not be separated out from the α-particles in the spectrum and hence their contribution was estimated using statistical model calculations. The present work indicates that suppression of fusion cross-sections due to the breakup of 7Li may not be significant for 7Li + 12C reaction at energies around the barrier.  相似文献   
10.
The alternating step generator is a well-known keystream generator consisting of two stop/go clocked LFSRs, LFSR1 and LFSR2, whose clocks are controlled by another LFSR, LFSR3, which is clocked regularly. A probabilistic analysis of this generator is conducted which shows that the posterior probabilites of individual bits of the first derivatives of the regularly clocked LFSR1 and LFSR2 sequences, when conditioned on a given segment of the first derivative of the keystream sequence, can be computed efficiently in a number of probabilistic models of interest. The expected values of these probabilities, for a random keystream sequence, are derived by an approximate theoretical analysis and are also verified by systematic computer experiments. It is pointed out that these posterior probabilities can be enhanced in a resynchronization scenario and thus used for a low-complexity fast correlation attack on the two LFSRs. More generally, it is argued that even without resynchronization these probabilities may be significantly different from one half for fast correlation attacks based on iterative decoding algorithms to be successful, although with incresead complexity. A related method for computing the posterior probabilities of individual bits of the LFSR3 sequence, when conditioned on both the keystream sequence and the LFSR1 and LFSR2 sequences, is also developed. As these posterior probabilities are much more different from one half, they can be used for a low-complexity fast correlation attack on LFSR3, provided that the initial states of LFSR1 and LFSR2 are previously reconstructed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号