首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41篇
  免费   38篇
  国内免费   8篇
化学   9篇
综合类   1篇
数学   29篇
物理学   48篇
  2022年   2篇
  2020年   2篇
  2019年   3篇
  2018年   4篇
  2017年   6篇
  2016年   4篇
  2015年   1篇
  2014年   11篇
  2013年   3篇
  2012年   5篇
  2011年   3篇
  2010年   4篇
  2009年   2篇
  2008年   4篇
  2007年   1篇
  2006年   4篇
  2005年   2篇
  2004年   5篇
  2002年   6篇
  2001年   7篇
  2000年   3篇
  1995年   4篇
  1991年   1篇
排序方式: 共有87条查询结果,搜索用时 31 毫秒
41.
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol.  相似文献   
42.
李宏伟  陈克安 《声学学报》2008,33(2):145-151
将边界变量用二维子波展开,获得了三维任意边界条件声辐射和声散射的边界积分方程的子波谱方法.采用以子波为权函数的Gauss积分法计算子波谱方法的系数,获得了与传统边界元法相同的计算量,克服了普通积分法计算子波系数计算量大甚至难以收敛的缺点;采用Duffy的方法解决了子波谱方法中的奇异积分,使其能够用普通的Gauss积分法计算.算例表明:子波谱方法系数矩阵压缩率超过50%以后,计算精度仍然高于传统边界元方法.  相似文献   
43.
Bell inequality is an important resource in the quantum information theory, which can be applied to guarantee security of the device independent quantum information protocols. By utilizing the quantum weak measurement technology, we propose the Chain inequality violation with three parties, and the analysis result demonstrates that double Chain inequality violation can be observed in the case of Alice and Bob have two different measurement bases.Since the weak measurement model can be assumed to be an eavesdropping model, our analysis model may be applied to analyze security of the device independent quantum information protocols.  相似文献   
44.
A new chaotic system and its circuit realization   总被引:12,自引:0,他引:12       下载免费PDF全文
王光义  丘水生  李宏伟  李彩芬  郑艳 《中国物理》2006,15(12):2872-2877
Based on the Lü system, a new chaotic system is constructed, which can generate a Lorenz-like attractor, Chen-like attractor, Lü-like attractor and new attractor when its parameters are chosen appropriately. The detailed dynamical behaviours of this system are also investigated, including equilibria and stability, bifurcations, and Lyapunov exponent spectrum. Moreover, a novel analogue circuit diagram is designed for the verification of various attractors.  相似文献   
45.
Coulomb blockade oscillations of Si single-electron transistors, which are fabricated completely by the conventional photolithography technique, have been investigated. Most of the single-electron transistors clearly show Coulomb blockade oscillations and these oscillations can be periodic by applying negative voltages to the in-plane gates. A shift of the peak positions is observed at high temperatures. It is also found that the fluctuation of the peak spacing cannot be neglected.  相似文献   
46.
Single electron transistors with wire channels are fabricated by a nanoelectrode-pair technique. Their characteristics strongly depend on the channel widths and the voltages on the in-plane gates. A few dips in the Coulomb blockade oscillations were observed at the less positive gate voltages for a device with a 70nm-wide wire due to Coulomb blockade between the coupled dots. By applying negative voltages to the in-plane gates, the oscillations became periodic, which indicated the formation of a single dot in the conducting channel. These gates facilitate fabricating single-electron transistors with single dot structures, which have potential applications on its integration.  相似文献   
47.
Post-processing is indispensable in quantum key distribution(QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.  相似文献   
48.
超高速微粒在与靶物质撞击时会形成瞬时的等离子体.本文首次设计出两种传感器收集等离子体获取微粒到达传感器的时间,然后通过飞行时间法测量超高速微粒的速度.在等离子体驱动微小碎片加速器上开展了原理实验,采集到了微粒撞击产生的等离子体信号,测量到了超高速微粒的速度,验证了这种时间测量精度高、信噪比高的全新超高速微粒速度的测量方法.  相似文献   
49.
从一道线性代数习题出发,举例说明常见教材中关于由矩阵A的特征值确定ψ(A)的特征值的结论不够完备,进而分析问题关键,运用求解特征多项式的方法推导出矩阵多项式的特征值.  相似文献   
50.
沈远彤  李宏伟 《应用数学》2004,17(1):104-107
利用小波的高分辨率和具有紧支性的特点将小波插值基函数引入到界面裂纹分析 ,针对裂纹面的应力奇异特点 ,采用了不同分辨率的插值方法 ,提出了基于广义变分原理的小波计算格式 ,并通常计算实例对所提方法进行验证  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号