全文获取类型
收费全文 | 1180篇 |
免费 | 205篇 |
国内免费 | 17篇 |
专业分类
化学 | 70篇 |
晶体学 | 2篇 |
力学 | 61篇 |
综合类 | 16篇 |
数学 | 44篇 |
物理学 | 120篇 |
无线电 | 1089篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 33篇 |
2021年 | 42篇 |
2020年 | 54篇 |
2019年 | 34篇 |
2018年 | 41篇 |
2017年 | 57篇 |
2016年 | 54篇 |
2015年 | 70篇 |
2014年 | 116篇 |
2013年 | 89篇 |
2012年 | 90篇 |
2011年 | 98篇 |
2010年 | 79篇 |
2009年 | 66篇 |
2008年 | 98篇 |
2007年 | 76篇 |
2006年 | 57篇 |
2005年 | 48篇 |
2004年 | 48篇 |
2003年 | 31篇 |
2002年 | 22篇 |
2001年 | 11篇 |
2000年 | 22篇 |
1999年 | 12篇 |
1998年 | 3篇 |
1997年 | 6篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1402条查询结果,搜索用时 358 毫秒
1.
Sulfur hexafluoride (SF6) is considered as a potent greenhouse gas, whose effective degradation is challenging. Here we report a computational study on the nucleophilic activation of sulfur hexafluoride by N-heterocyclic carbenes and N-heterocyclic olefins. The result shows that the activation of SF6 is both thermodynamically and kinetically favorable at mild condition using NHOs with fluoro-substituted azolium and sulfur pentafluoride anion being formed. The Gibbs free energy barrier during the activation of SF6 has a linear relationship with the energy of HOMO of substrates, which could be a guideline for applying those compounds that feature higher energy in HOMO to activate SF6 in high efficiency. 相似文献
2.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time. 相似文献
3.
连续波半主动雷达制导空空导弹截获跟踪距离计算 总被引:1,自引:1,他引:0
分析了连续波半主动雷达制导导弹导引头工作电磁环境和对武器系统攻击区的影响,建立了热噪声和杂波干扰环境下导引头截获距离方程,分析推导了直波泄漏干扰,地杂波干扰的计算公式,并在此基础上给出了导弹允许攻击区计算公式。 相似文献
4.
在综述光电对抗内涵的基础上,论述光电对抗在现代战争作战平台中的具体应用,并着重从电子战的角度论述了光电对抗在现代防空作战中的最新应用。最后指出光电对抗技术在未来电子战中的作用和发展方向。 相似文献
5.
对具有消息恢复的数字签名方案提出了两种攻击方法.此外,对原方案进行了改进,通过对改进方案的安全性分析得出结论:改进方案比原方案更安全,并且消息恢复过程只需要计算一次大数模幂乘和两次单向函数. 相似文献
6.
7.
因特网防御DoS攻击技术评述Ⅰ--攻击分类与特征·包过滤·攻击检测与防御 总被引:1,自引:0,他引:1
概述了因特网上DoS攻击的相应分类及基本特征,评述了包过滤、攻击检测及防御技术的最新成果.前一部分介绍了入口过滤、基于路由的过滤网和有效源地址强制协议.后一方面主要讨论了适合于检测攻击包的技术,介绍了新近提出的频谱分析方法和泛滥检测系统.简要评述了已有的防御SYN泛滥攻击的技术措施,介绍了Cisco的TCP拦截技术,提出了改进策略. 相似文献
8.
C. Acero J. M. Ribó R. Solé F. R. Trull 《Monatshefte für Chemie / Chemical Monthly》1993,124(4):401-417
Summary Characteristic oxidation reactions of bilin-1,19-diones (biliverdins) and biladien-ac-1,19-diones (bilirubins) were reinvestigated. These include bromine and iodine oxidation of biliverdin IX, bilirubin IX and their Zn(II) complexes, the reaction described by Siedel (1941) of mesobilirubin XIII dimethyl ester with nitric acid (Gmelin reaction) and Smith's oxidation (1977) of etiobiliverdin IV using Tl triacetate and Pb tetra-acetate. For some of these reaction products new structures were assigned on the basis of their spectrometric data. These structures agreed with the expected reactivity pattern of biliverdins and bilirubins.
Reaktivität von Pyrrolpigmenten, 15 Mitt.: Über die Oxidation von Bilirubinen und Biliverdinen
Zusammenfassung Einige bekannte Oxydationen von Bilin-1,19-dionen (Biliverdinen) und Biladien-ac-dionen (Bilirubinen) wurden neuerlich untersucht, und zwar die Brom- und Jodoxydation von Biliverdin IX und Bilirubin IX sowie der entsprechenden Zn(II)-Komplexe, die Reaktion des Dimethylesters von Mesobilirubin XIII mit HNO3 (Gmelinreaktion; Siedel 1941) und Smith's Oxydation von Etiobiliverdin IV mit Thaliumtriacetat und Bleitetraacetat. Für einige Reaktionsprodukte wurden aufgrund spektroskopischer Daten neue Strukturen-konsistent mit dem bekannten Reaktionsverhalten von Biliverdinen und Bilirubinen-formuliert.相似文献
9.
A JPEG image encryption with the adaptive key and run consistency of MCUs is proposed. The chosen-plaintext attack (CPA) is given here on this encryption scheme. First, the adaptive key can be reproduced from the encrypted image, so that the plaintext images with the same adaptive key can be constructed. Second, the existence of run consistency of MCUs (RCM) between the original image and the encrypted image facilitates rapid estimation. In addition, the single swap for the runs of MCUs with RCM is designed for more accurate estimation. Detailed cryptanalytic results suggest that this encryption scheme can only be used to realize perceptual encryption but not to provide content protection for digital images. Furthermore, applications of the CPA to break other encryption schemes with RCM are presented. 相似文献
10.
While malicious samples are widely found in many application fields of machine learning, suitable countermeasures have been investigated in the field of adversarial machine learning. Due to the importance and popularity of Support Vector Machines (SVMs), we first describe the evasion attack against SVM classification and then propose a defense strategy in this paper. The evasion attack utilizes the classification surface of SVM to iteratively find the minimal perturbations that mislead the nonlinear classifier. Specially, we propose what is called a vulnerability function to measure the vulnerability of the SVM classifiers. Utilizing this vulnerability function, we put forward an effective defense strategy based on the kernel optimization of SVMs with Gaussian kernel against the evasion attack. Our defense method is verified to be very effective on the benchmark datasets, and the SVM classifier becomes more robust after using our kernel optimization scheme. 相似文献