全文获取类型
收费全文 | 1676篇 |
免费 | 417篇 |
国内免费 | 41篇 |
专业分类
化学 | 140篇 |
晶体学 | 2篇 |
力学 | 19篇 |
综合类 | 51篇 |
数学 | 163篇 |
物理学 | 1759篇 |
出版年
2024年 | 3篇 |
2023年 | 33篇 |
2022年 | 57篇 |
2021年 | 43篇 |
2020年 | 26篇 |
2019年 | 24篇 |
2018年 | 37篇 |
2017年 | 76篇 |
2016年 | 93篇 |
2015年 | 80篇 |
2014年 | 151篇 |
2013年 | 113篇 |
2012年 | 88篇 |
2011年 | 102篇 |
2010年 | 111篇 |
2009年 | 123篇 |
2008年 | 158篇 |
2007年 | 145篇 |
2006年 | 123篇 |
2005年 | 101篇 |
2004年 | 83篇 |
2003年 | 68篇 |
2002年 | 43篇 |
2001年 | 49篇 |
2000年 | 30篇 |
1999年 | 31篇 |
1998年 | 40篇 |
1997年 | 22篇 |
1996年 | 8篇 |
1995年 | 15篇 |
1994年 | 8篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1991年 | 4篇 |
1989年 | 4篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 6篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1980年 | 3篇 |
1977年 | 3篇 |
1974年 | 1篇 |
1973年 | 5篇 |
1969年 | 1篇 |
排序方式: 共有2134条查询结果,搜索用时 333 毫秒
81.
82.
针对强湍流信道下信号衰落的特点,分析了对数正态分布模型与K分布模型的适用范围.基于K分布模型建立大气光通信接收信号模型,并给出了自适应最优门限检测方法.采用四阶和六阶累计量对强湍流信道参量进行估计,采用二阶累计量对其它高斯噪音进行估计,得到K分布参量及高斯噪音统计量的预测值,实现自适应门限更新.基于Monte Calro算法进行仿真,给出了门限更新算法对通信系统误码率的影响,同时分析了信号采样率对估计参量偏差的影响.计算表明,在强湍流情况下,大气光通信系统的误码率性能得到极大的改善,优于基于MLSD检测的接收机. 相似文献
83.
A novel super-FEC code based on concatenated code for high-speed long-haul optical communication systems 总被引:3,自引:0,他引:3
The structures of the novel super forward error correction (Super-FEC) code type based on the concatenated code for high-speed long-haul optical communication systems are studied in this paper. The Reed-Solomon (RS) (255, 239) + Bose-Chaudhuri-Hocguenghem (BCH) (1023, 963) concatenated code is presented after the characteristics of the concatenated code and the two Super-FEC code type presented in ITU-T G.975.1 have theoretically been analyzed, the simulation result shows that this novel code type, compared with the RS (255, 239) + convolutional-self-orthogonal-code (CSOC) (k0/n0 = 6/7, J = 8) code in ITU-T G.975.1, has a lower redundancy and better error-correction capabilities, and its net coding gain (NCG) at the third iteration is 0.57 dB more than that of RS (255, 239) + CSOC (k0/n0 = 6/7, J = 8) code in ITU-T G.975.1 at the third iteration for the bit error rate (BER) of 10−12. Therefore, the novel code type can better be used in long-haul, larger capacity and higher bit-rate optical communication systems. Furthermore, the design and implementation of the novel concatenated code type are also discussed. 相似文献
84.
Long Gui-lu Deng Fu-guo Wang Chuan Li Xi-han Wen Kai Wang Wan-ying 《Frontiers of Physics in China》2007,2(3):251-272
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure
quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting
QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication
is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each
qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum
mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the
safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification
protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small
level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes
and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum
world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols
based on dense coding.
相似文献
85.
A. Porzio V. DAuria P.Aniello M.G.A. Paris S. Solimeno 《Optics and Lasers in Engineering》2007,45(4):463
We present a continuous variable quantum communication protocol based on bright continuous-wave twin-beams generated by a type-II OPO. Intensity correlation between the beams is used in conjunction with a binary randomization of polarization to guarantee security and reveal eavesdropping actions. The scheme presented is asymmetric. Bob (the receiver) retains one of the beams and sends the other one to Alice after a random rotation of its polarization. The cryptographic key elements are encoded through amplitude modulation by Alice, who sends back her beam to Bob after a second rotation of the polarization. Eventually, the beams are detected by Bob after a further random polarization rotation. The security of the system and the possibility of revealing the eavesdropping action in the case of an individual attack are demonstrated by evaluating the bit error rates. 相似文献
86.
采用双波长注入一包含伪随机码发生器与相位调制器的光电振荡器可以同时得到非归零(NRZ)码,归零(RZ)码以及光,电时钟信号输出。该方案使用了光域耦合的双环路结构,在不增加有源器件的条件下实现边模抑制。相位调制器用于反馈调制并同时实现占空比可调的非归零码到归零码的转换。双波长的注入排除了编码信号在振荡器中引入的非时钟频率成分。实验给出了10 Gb/s工作速率下的结果,得到了抖动为637 fs的光信号输出。转换得到的归零码信号占空比约为33%。输出电时钟信号的相位噪声在频偏10 kHz处为-109 dBc/Hz,边模抑制比为58 dB。 相似文献
87.
设计了大气激光通信信道测量系统,利用此系统在不同气象条件下进行了近地视距实验测量并采集了不同天气条件下的实验数据,详细分析讨论了所得实验数据并进行了误差分析.同时实验中获得了大量数据,为进一步完善大气激光信道模型提供了有力的依据. 相似文献
88.
XiangLin Yang YangJing Wen Ming Xu 《International Journal of Infrared and Millimeter Waves》2000,21(9):1495-1502
The control scheme of long distance optical transmission is treated based on conception of mode-locked Laser cavity in this paper. The general mode-locking equation of fiber ring soliton Laser is first constructed, then we give the general perturbed nonlinear schrödinger equation, and finally the transmission and control equations of optical soliton communication systems with various different configurations, respectively, are obtained. 相似文献
89.
Based on the idea of unknown input observers (UIOs), this Letter considers the problem of chaos secure communication within the master-slave configuration. The unknown constant disturbance of parameters in chaotic systems and the unknown input in chaotic signals can be regarded as messages to be recovered in the slave end. If certain conditions are satisfied, we can recover all the unknown messages by designing the UIO based slave. Theoretical analysis and simulation results fully verify the effectiveness of the proposed scheme. 相似文献
90.
介绍了在VISUAL BASIC环境中研华公司的ADAM-5510数据采集控制器和上位机通信实现的方法。 相似文献