首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4285篇
  免费   483篇
  国内免费   186篇
化学   847篇
晶体学   5篇
力学   128篇
综合类   138篇
数学   1589篇
物理学   2247篇
  2024年   8篇
  2023年   40篇
  2022年   278篇
  2021年   269篇
  2020年   139篇
  2019年   107篇
  2018年   85篇
  2017年   133篇
  2016年   173篇
  2015年   123篇
  2014年   225篇
  2013年   284篇
  2012年   199篇
  2011年   255篇
  2010年   218篇
  2009年   264篇
  2008年   247篇
  2007年   291篇
  2006年   233篇
  2005年   221篇
  2004年   189篇
  2003年   150篇
  2002年   126篇
  2001年   79篇
  2000年   63篇
  1999年   55篇
  1998年   56篇
  1997年   44篇
  1996年   41篇
  1995年   53篇
  1994年   44篇
  1993年   23篇
  1992年   16篇
  1991年   21篇
  1990年   23篇
  1989年   30篇
  1988年   19篇
  1987年   15篇
  1986年   10篇
  1985年   21篇
  1984年   11篇
  1983年   9篇
  1982年   7篇
  1981年   7篇
  1980年   6篇
  1979年   5篇
  1978年   10篇
  1976年   5篇
  1973年   4篇
  1972年   4篇
排序方式: 共有4954条查询结果,搜索用时 15 毫秒
181.
《Physics letters. A》2020,384(3):126078
The information loss problem in black hole evaporation is one of fundamental issues. Its resolution requires more profound understanding of information storage mechanism in quantum systems. In this Letter, we argue that when multiple unknown parameters are stored in large entangled qudits, strong chaos generated by fast scrambling in high temperature limit yields an ordered information storage structure with decoupled quantum information capsules (QICs). A rotational isometry emerges in the quantum Fisher information metric. The isometry is expected to be observed in future experiments on cold atoms in a pure entangled state. We provide a QIC speculation of black hole evaporation.  相似文献   
182.
We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.  相似文献   
183.
One of the most important multipartite entangled states, Greenberger–Horne–Zeilinger state (GHZ), serves as a fundamental resource for quantum foundation test, quantum communication and quantum computation. To increase the number of entangled particles, significant experimental efforts should been invested due to the complexity of optical setup and the difficulty in maintaining the coherence condition for high-fidelity GHZ state. Here, we propose an ultra-integrated scalable on-chip GHZ state generation scheme based on frequency combs. By designing several microrings pumped by different lasers, multiple partially overlapped quantum frequency combs are generated to supply as the basis for on-chip polarization-encoded GHZ state with each qubit occupying a certain spectral mode. Both even and odd numbers of GHZ states can be engineered with constant small number of integrated components and easily scaled up on the same chip by only adjusting one of the pump wavelengths. In addition, we give the on-chip design of projection measurement for characterizing GHZ states and show the reconfigurability of the state. Our proposal is rather simple and feasible within the existing fabrication technologies and we believe it will boost the development of multiphoton technologies.  相似文献   
184.
This work introduces channel-supermodular entropies, a subset of quasi-concave entropies. Channel-supermodularity is a property shared by some of the most commonly used entropies in the literature, including Arimoto–Rényi conditional entropies (which include Shannon and min-entropy as special cases), k-tries entropies, and guessing entropy. Based on channel-supermodularity, new preorders for channels that strictly include degradedness and inclusion (or Shannon ordering) are defined, and these preorders are shown to provide a sufficient condition for the more-capable and capacity ordering, not only for Shannon entropy but also regarding analogous concepts for other entropy measures. The theory developed is then applied in the context of query anonymization. We introduce a greedy algorithm based on channel-supermodularity for query anonymization and prove its optimality, in terms of information leakage, for all symmetric channel-supermodular entropies.  相似文献   
185.
单光子纠缠态的纠缠转移和量子隐形传态   总被引:19,自引:19,他引:0  
使用光学分束器和单光子源,利用单光子态和真空态制备出了纠缠单光子态.利用光学分束器作用和单光子探测,实现了三个通讯伙伴之间的纠缠转移.提出了一个关于纠缠单光子态的量子隐形传态方案.在这个方案中,被传送的是一个未知的单光子纠缠态.通讯双方使用的量子信道是两个单光子纠缠态.通过使用分束器作用和对输出态进行光子测量以及在经典信息的帮助下,纠缠转移和量子隐形传态的过程被完成.  相似文献   
186.
实际量子密钥分配扩展BB84协议窃听下的安全性分析   总被引:10,自引:10,他引:0  
考虑强衰减激光脉冲技术实现的准单光子源和量子信道损耗以及窃听者Eve窃听能力有限等实际情况, 提出了一种窃听装置;同时对扩展BB84协议的各种窃听做了全面分析,计算得出发送者Alice/窃听者Eve所获得的交互信息量和发送者Alice/接收者Bob所能容忍的误码率上限,以此作为检测量子信道安全性的标准,同时得出Breidbart基/分束攻击相结合的方法是比截取/重发更为有效的窃听方案.  相似文献   
187.
188.
Quantum information theorists have created axiomatic reconstructions of quantum mechanics (QM) that are very successful at identifying precisely what distinguishes quantum probability theory from classical and more general probability theories in terms of information-theoretic principles. Herein, we show how one such principle, Information Invariance and Continuity, at the foundation of those axiomatic reconstructions, maps to “no preferred reference frame” (NPRF, aka “the relativity principle”) as it pertains to the invariant measurement of Planck’s constant h for Stern-Gerlach (SG) spin measurements. This is in exact analogy to the relativity principle as it pertains to the invariant measurement of the speed of light c at the foundation of special relativity (SR). Essentially, quantum information theorists have extended Einstein’s use of NPRF from the boost invariance of measurements of c to include the SO(3) invariance of measurements of h between different reference frames of mutually complementary spin measurements via the principle of Information Invariance and Continuity. Consequently, the “mystery” of the Bell states is understood to result from conservation per Information Invariance and Continuity between different reference frames of mutually complementary qubit measurements, and this maps to conservation per NPRF in spacetime. If one falsely conflates the relativity principle with the classical theory of SR, then it may seem impossible that the relativity principle resides at the foundation of non-relativisitic QM. In fact, there is nothing inherently classical or quantum about NPRF. Thus, the axiomatic reconstructions of QM have succeeded in producing a principle account of QM that reveals as much about Nature as the postulates of SR.  相似文献   
189.
Proposed quantum experiments in deep space will be able to explore quantum information issues in regimes where relativistic effects are important. In this essay, we argue that a proper extension of quantum information theory into the relativistic domain requires the expression of all informational notions in terms of quantum field theoretic (QFT) concepts. This task requires a working and practicable theory of QFT measurements. We present the foundational problems in constructing such a theory, especially in relation to longstanding causality and locality issues in the foundations of QFT. Finally, we present the ongoing Quantum Temporal Probabilities program for constructing a measurement theory that (i) works, in principle, for any QFT, (ii) allows for a first- principles investigation of all relevant issues of causality and locality, and (iii) it can be directly applied to experiments of current interest.  相似文献   
190.
Finding a seed set to propagate more information within a specific budget is defined as the influence maximization (IM) problem. The traditional IM model contains two cardinal aspects: (i) the influence propagation model and (ii) effective/efficient seed-seeking algorithms. However, most of models only consider one kind of node (i.e., influential nodes), ignoring the role of other nodes (e.g., boosting nodes) in the spreading process, which are irrational. Specifically, in the real-world propagation scenario, the boosting nodes always improve the spread of influence from the initial activated seeds, which is an efficient and cost-economic measure. In this paper, we consider the realistic budgeted influence maximization (RBIM) problem, which contains two kind of nodes to improve the diffusion of influence. Facing the newly modified objective function, we propose a novel B-degree discount algorithm to solve it. The novel B-degree discount algorithm which adopts the cost-economic boosting nodes to retweet the influence from the predecessor nodes can greatly reduce the cost, and performs better than other state-of-the-art algorithms in both effect and efficiency on RBIM problem solving.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号