首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  国内免费   2篇
  完全免费   29篇
  物理学   42篇
  2019年   1篇
  2018年   2篇
  2015年   1篇
  2014年   9篇
  2013年   1篇
  2012年   4篇
  2011年   1篇
  2010年   2篇
  2009年   1篇
  2008年   3篇
  2007年   1篇
  2006年   3篇
  2002年   4篇
  2001年   7篇
  2000年   2篇
排序方式: 共有42条查询结果,搜索用时 134 毫秒
1.
A new chaotic system and its circuit realization   总被引:12,自引:0,他引:12  
Based on the Lü system, a new chaotic system is constructed, which can generate a Lorenz-like attractor, Chen-like attractor, Lii-like attractor and new attractor when its parameters are chosen appropriately. The detailed dynamical behaviours of this system are also investigated, including equilibria and stability, bifurcations, and Lyapunov exponent spectrum. Moreover, a novel analogue circuit diagram is designed for the verification of various attractors.  相似文献
2.
纳米结构的制备及单电子器件研究   总被引:4,自引:0,他引:4  
建立了单电子器件的制备工艺和单电子器件的分析、测量系统,研究了有潜在应用价值的纳米结构加工技术,制备了适合光电集成的多种纳米结构,发展了常规光刻法制备单电子器件的多种技术,其中,在生命科学和信息领域有着广泛应用的“纳米电极对”引起了国内外专家的重视,发展以“纳米电极对”为基础的单电子器件及其应用是我们目前的主要研究方向,目前我们正在探索这种单电子器件在生命芯片、微电子系统集成方面的应用。  相似文献
3.
空间微小碎片累积撞击损伤效应加速模拟研究   总被引:2,自引:0,他引:2       下载免费PDF全文
利用等离子体驱动微小碎片加速器对太阳同步轨道上太阳电池在轨10年遭遇微小碎片超高速撞击的累积损伤效应进行了加速模拟, 获得了电池性能参数的损伤结果, 并与所建立的损伤评估模型的预测结果进行了分析比较, 二者基本一致.  相似文献
4.
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.  相似文献
5.
临近空间大气中子环境的仿真研究   总被引:1,自引:0,他引:1       下载免费PDF全文
以大气模型、宇宙线模型和地磁截止刚度模型为基础,利用蒙特卡罗方法在国内首次建立了临近空间大气中子环境的计算机仿真模型,分别研究了银河宇宙线、太阳宇宙线诱发的大气中子环境分布规律以及地磁场屏蔽作用对大气中子环境的影响.通过与国外相关模型对比,证明本仿真模型是准确、可靠的,对太阳质子事件的详细分析,弥补了国外已有模型中的不足.该模型可用于临近空间大气中子诱发的元器件单粒子效应评估,以及航空机组人员飞行期间所接受的辐射剂量分析. 关键词: 临近空间 大气中子 单粒子效应 蒙特卡罗  相似文献
6.
高红外吸收是实现高灵敏度红外探测器的一个重要途径。探测器的响应率与热吸收率紧密相关。高红外吸收将提升红外探测器的探测性能。鉴于高吸收率的重要性,对国内外研究中典型的高红外吸收结构的研究进展进行介绍。目前典型新型高吸收结构有基于新型材料(如超材料)的高吸收结构和基于金属光栅高吸收结构。研究表明这些结构在某些波段可实现近100%的完美吸收,是发展高灵敏探测器的新途径。  相似文献
7.
Similar to device-independent quantum key distribution(DI-QKD), semi-device-independent quantum key distribution(SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices.The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a oneway prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD.  相似文献
8.
Post-processing is indispensable in quantum key distribution(QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.  相似文献
9.
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.  相似文献
10.
To improve the security of the smart grid, quantum key distribution(QKD) is an excellent choice. The rapid fluctuations on the power aerial optical cable and electromagnetic disturbance in substations are two main challenges for implementation of QKD. Due to insensitivity to birefringence of the channel, the stable phase-coding Faraday–Michelson QKD system is very practical in the smart grid. However, the electromagnetic disturbance in substations on this practical QKD system should be considered. The disturbance might change the rotation angle of the Faraday mirror, and would introduce an additional quantum bit error rate(QBER). We derive the new fringe visibility of the system and the additional QBER from the electromagnetic disturbance. In the worst case, the average additional QBER only increases about 0.17% due to the disturbance, which is relatively small to normal QBER values. We also find the way to degrade the electromagnetic disturbance on the QKD system.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号