首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   520篇
  免费   79篇
  国内免费   9篇
化学   26篇
晶体学   1篇
力学   10篇
综合类   55篇
数学   210篇
物理学   306篇
  2023年   12篇
  2022年   25篇
  2021年   38篇
  2020年   14篇
  2019年   17篇
  2018年   11篇
  2017年   41篇
  2016年   28篇
  2015年   15篇
  2014年   36篇
  2013年   27篇
  2012年   39篇
  2011年   21篇
  2010年   27篇
  2009年   36篇
  2008年   41篇
  2007年   27篇
  2006年   35篇
  2005年   26篇
  2004年   16篇
  2003年   21篇
  2002年   14篇
  2001年   11篇
  2000年   3篇
  1999年   4篇
  1998年   4篇
  1997年   1篇
  1996年   4篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1991年   3篇
  1989年   1篇
  1984年   2篇
  1983年   1篇
  1959年   1篇
排序方式: 共有608条查询结果,搜索用时 578 毫秒
601.
Unlike masked with analog chaotic sequence, digital information is masked with binary chaotic sequence with a method proposed by U. Parfitz and 2. Ergezinger (Phys. Lett. 198A (1994) 146). It is demonstrated by numerical simulations that both security and robustness of this communication method are improved. When considered as digital communication, the method is very robust to transmission errors.  相似文献   
602.
王阳  胡珀  周帅  傅佳骏 《化学进展》2021,33(7):1221-1237
与有机荧光染料、量子点等传统发光材料相比,稀土上转换发光纳米材料(UCNPs)具有反斯托克斯位移大、发光谱带多且狭窄、荧光寿命长、光化稳定性高、无光闪烁和光漂白等独特优势,将其与图形编码、防伪印刷技术结合可获得难以仿冒的隐形荧光图案,这已经成为防伪安全领域的应用研究热点。本文首先介绍了UCNPs的上转换发光机理及其合成方法,然后阐述近年来UCNPs在防伪安全领域的研究现状,归纳总结出上转换防伪安全图案的四种形式(NIR单波长激发、NIR双波长激发、NIR/UV双波长激发以及三波长激发)。最后,本文指出UCNPs应用于防伪安全领域所面临的问题与挑战,并对未来的发展方向进行了展望。  相似文献   
603.
A Modified Sensitive Driving Cellular Automaton Model   总被引:1,自引:0,他引:1  
A modified cellular automaton model for traffic flow on highway is proposed with a novel concept about the variable security gap. The concept is first introduced into the original Nagel-Schreckenberg model, which is called the non-sensitive driving cellular automaton model. And then it is incorporated with a sensitive driving NaSch model, in which the randomization brake is arranged before the deterministic deceleration. A parameter related to the variable security gap is determined through simulation. Comparison of the simulation results indicates that the variable security gap has different influence on the two models. The fundamental diagram obtained by simulation with the modified sensitive driving NaSch model shows that the maximum flow are in good agreement with the observed data, indicating that the presented model is more reasonable and realistic.  相似文献   
604.
In this article, the sum secure degrees-of-freedom (SDoF) of the multiple-input multiple-output (MIMO) X channel with confidential messages (XCCM) and arbitrary antenna configurations is studied, where there is no channel state information (CSI) at two transmitters and only delayed CSI at a multiple-antenna, full-duplex, and decode-and-forward relay. We aim at establishing the sum-SDoF lower and upper bounds. For the sum-SDoF lower bound, we design three relay-aided transmission schemes, namely, the relay-aided jamming scheme, the relay-aided jamming and one-receiver interference alignment scheme, and the relay-aided jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations. Moreover, the security and decoding of each scheme are analyzed. The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter (CSIT). As a result, the sum-SDoF lower and upper bounds are derived, and the sum-SDoF is characterized when the relay has sufficiently large antennas. Furthermore, even assuming no CSI at two transmitters, our results show that a multiple-antenna full-duplex relay with delayed CSI can elevate the sum-SDoF of the MIMO XCCM. This is corroborated by the fact that the derived sum-SDoF lower bound can be greater than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT.  相似文献   
605.
In low-earth-orbit (LEO) satellite-to-ground communication, the size of satellite antennae is limited and the satellite motion trajectory is predictable, which makes the channel state information (CSI) of the satellite-to-ground channel easy to leak and impossible to use to generate a physical layer key. To solve these problems, we propose a key generation method based on multi-satellite cooperation and random perturbation. On the one hand, we use multi-satellite cooperation to form a constellation that services users, in order to increase the equivalent aperture of satellite antennae and reduce the correlation between the legal channel and the wiretap channel. On the other hand, according to the endogenous characteristics of satellite motion, a random perturbation factor is proposed, which reflects the randomness of the actual channel and ensures that the CSI of the legal channel is not leaked due to the predictability of satellite motion trajectory. Simulation results show that the proposed method can effectively reduce the leakage of the legal channel’s CSI, which makes the method of physical layer key generation safe and feasible in the LEO satellite-to-ground communication scene.  相似文献   
606.
607.
In the Internet of Things (IoT) ecosystem, devices will predominate, using it in a manner similar to how people used it. Devices will cooperating in a multicast network to collect, share, and forward information way while interacting with one another autonomously and without centralised supervision. The building of an intelligent environment the capability of real-time collection of data, which is crucial for maximising the value of the IoT, will make this possible. A typical electric grid is made up of many power plants that use various power generating units, such as coal-based units, gas-based units, hydro units, etc. The majority of the infrastructure and wires that make up the conventional electricity grid have been in existence for a long time, it should be mentioned. They require significant investments, so providing them could take years. As a result, many grid components are outmoded and must be maintained and monitored on a regular basis to keep power flowing. A sophisticated technology is the smart grid (SG) system that makes it easier to integrate green technology and environmental considerations. The SG cyber–physical system was implemented thanks to the advancement and use of communication technologies in the conventional power system. The Internet of Things (IoT) and essential devices are both present in the complicated architecture of the SG systems. The traditional electric grids are been transformed into smart and efficient grid known as “Smart grid”. The Internet of Things’ smart grid allows for two-way communications among connected devices and technology that can recognise and respond to human needs. The cost and reliability of a smart grid are superior to that of conventional power infrastructure. Through use and data maintenance, smart grid technology will assist in reducing energy use and costs. One of the primary contributions made to grids is the integration of IoT with producing facilities using sustainable energy at various levels. To enhance the smart grid for bidirectional information exchange, improve power quality, and increase reliability Internet of Things (IOT) devices are becoming an important part of smart electric grid. IOT Infrastructure (IOTI) provide a flexible, efficient and secure platform providing strategic management for monitoring and controlling of different operations under different working conditions. This paper discusses cyber security on IOT based infrastructure for electric power systems. A comprehensive study is highlighted which includes type of IOTs, architecture used for smart grid, and future challenges.  相似文献   
608.
With the vigorous development of today’s wireless communication industry, the Internet of Vehicles (IoV), as one of its application scenarios, has received extensive attention from researchers. Ensuring the security of information transmission is one of the many problems to be solved in the IoV system. To fit the actual scene, this paper considers the impacts of both the channel characteristics of Nakagami-m fading and the distribution of the vehicles’ positions in the real road scenario of the IoV. According to the random distribution characteristics of vehicle terminal position, a system model with a transmitter base station, a legitimate vehicle terminal, and an eavesdropper is established. The approximate and asymptotic analytical expressions of the secrecy outage probability over the Nakagami-m fading channels are derived. Finally, the correctness of the proposed analysis models established in this paper is verified by Monte Carlo simulation and numerical analysis. The secrecy outage performance and the influencing factors of the considered model in the Nakagami-m fading environment are discussed and analyzed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号