首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1676篇
  免费   417篇
  国内免费   41篇
化学   140篇
晶体学   2篇
力学   19篇
综合类   51篇
数学   163篇
物理学   1759篇
  2024年   3篇
  2023年   33篇
  2022年   57篇
  2021年   43篇
  2020年   26篇
  2019年   24篇
  2018年   37篇
  2017年   76篇
  2016年   93篇
  2015年   80篇
  2014年   151篇
  2013年   113篇
  2012年   88篇
  2011年   102篇
  2010年   111篇
  2009年   123篇
  2008年   158篇
  2007年   145篇
  2006年   123篇
  2005年   101篇
  2004年   83篇
  2003年   68篇
  2002年   43篇
  2001年   49篇
  2000年   30篇
  1999年   31篇
  1998年   40篇
  1997年   22篇
  1996年   8篇
  1995年   15篇
  1994年   8篇
  1993年   6篇
  1992年   5篇
  1991年   4篇
  1989年   4篇
  1987年   1篇
  1986年   1篇
  1985年   6篇
  1984年   2篇
  1983年   3篇
  1982年   5篇
  1980年   3篇
  1977年   3篇
  1974年   1篇
  1973年   5篇
  1969年   1篇
排序方式: 共有2134条查询结果,搜索用时 333 毫秒
81.
大气激光通信中,湍流引起的光强闪烁严重影响通信系统的性能指标(误码率)。通过对湍流条件下光强分布的数值仿真,得出弱湍流时接收光强服从对数正态分布,与Rytov理论一致。用随机过程分析的方法给出了系统误码率与光强闪烁的关系,并进行MATLAB数值模拟。研究表明误码率随对数振幅方差(湍流强度)的增加而上升,且当对数振幅方差在0~0.02时,误码率随对数振幅方差的变化较快,近似呈线性递增。在工程中,可采用自适应光学或多发射机等技术抑制湍流对大气激光通信的影响。  相似文献   
82.
王瑾  黄德修  元秀华 《光子学报》2007,36(6):1078-1082
针对强湍流信道下信号衰落的特点,分析了对数正态分布模型与K分布模型的适用范围.基于K分布模型建立大气光通信接收信号模型,并给出了自适应最优门限检测方法.采用四阶和六阶累计量对强湍流信道参量进行估计,采用二阶累计量对其它高斯噪音进行估计,得到K分布参量及高斯噪音统计量的预测值,实现自适应门限更新.基于Monte Calro算法进行仿真,给出了门限更新算法对通信系统误码率的影响,同时分析了信号采样率对估计参量偏差的影响.计算表明,在强湍流情况下,大气光通信系统的误码率性能得到极大的改善,优于基于MLSD检测的接收机.  相似文献   
83.
The structures of the novel super forward error correction (Super-FEC) code type based on the concatenated code for high-speed long-haul optical communication systems are studied in this paper. The Reed-Solomon (RS) (255, 239) + Bose-Chaudhuri-Hocguenghem (BCH) (1023, 963) concatenated code is presented after the characteristics of the concatenated code and the two Super-FEC code type presented in ITU-T G.975.1 have theoretically been analyzed, the simulation result shows that this novel code type, compared with the RS (255, 239) + convolutional-self-orthogonal-code (CSOC) (k0/n0 = 6/7, J = 8) code in ITU-T G.975.1, has a lower redundancy and better error-correction capabilities, and its net coding gain (NCG) at the third iteration is 0.57 dB more than that of RS (255, 239) + CSOC (k0/n0 = 6/7, J = 8) code in ITU-T G.975.1 at the third iteration for the bit error rate (BER) of 10−12. Therefore, the novel code type can better be used in long-haul, larger capacity and higher bit-rate optical communication systems. Furthermore, the design and implementation of the novel concatenated code type are also discussed.  相似文献   
84.
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.   相似文献   
85.
We present a continuous variable quantum communication protocol based on bright continuous-wave twin-beams generated by a type-II OPO. Intensity correlation between the beams is used in conjunction with a binary randomization of polarization to guarantee security and reveal eavesdropping actions. The scheme presented is asymmetric. Bob (the receiver) retains one of the beams and sends the other one to Alice after a random rotation of its polarization. The cryptographic key elements are encoded through amplitude modulation by Alice, who sends back her beam to Bob after a second rotation of the polarization. Eventually, the beams are detected by Bob after a further random polarization rotation. The security of the system and the possibility of revealing the eavesdropping action in the case of an individual attack are demonstrated by evaluating the bit error rates.  相似文献   
86.
江阳  于晋龙  胡浩  王文睿  杨恩泽 《光学学报》2007,27(8):1397-1400
采用双波长注入一包含伪随机码发生器与相位调制器的光电振荡器可以同时得到非归零(NRZ)码,归零(RZ)码以及光,电时钟信号输出。该方案使用了光域耦合的双环路结构,在不增加有源器件的条件下实现边模抑制。相位调制器用于反馈调制并同时实现占空比可调的非归零码到归零码的转换。双波长的注入排除了编码信号在振荡器中引入的非时钟频率成分。实验给出了10 Gb/s工作速率下的结果,得到了抖动为637 fs的光信号输出。转换得到的归零码信号占空比约为33%。输出电时钟信号的相位噪声在频偏10 kHz处为-109 dBc/Hz,边模抑制比为58 dB。  相似文献   
87.
设计了大气激光通信信道测量系统,利用此系统在不同气象条件下进行了近地视距实验测量并采集了不同天气条件下的实验数据,详细分析讨论了所得实验数据并进行了误差分析.同时实验中获得了大量数据,为进一步完善大气激光信道模型提供了有力的依据.  相似文献   
88.
The control scheme of long distance optical transmission is treated based on conception of mode-locked Laser cavity in this paper. The general mode-locking equation of fiber ring soliton Laser is first constructed, then we give the general perturbed nonlinear schrödinger equation, and finally the transmission and control equations of optical soliton communication systems with various different configurations, respectively, are obtained.  相似文献   
89.
Maoyin Chen  Wang Min 《Physics letters. A》2008,372(10):1595-1600
Based on the idea of unknown input observers (UIOs), this Letter considers the problem of chaos secure communication within the master-slave configuration. The unknown constant disturbance of parameters in chaotic systems and the unknown input in chaotic signals can be regarded as messages to be recovered in the slave end. If certain conditions are satisfied, we can recover all the unknown messages by designing the UIO based slave. Theoretical analysis and simulation results fully verify the effectiveness of the proposed scheme.  相似文献   
90.
介绍了在VISUAL BASIC环境中研华公司的ADAM-5510数据采集控制器和上位机通信实现的方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号