首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   6篇
  国内免费   3篇
化学   4篇
力学   5篇
数学   33篇
物理学   36篇
  2023年   2篇
  2022年   4篇
  2019年   2篇
  2018年   2篇
  2017年   5篇
  2014年   6篇
  2013年   3篇
  2012年   6篇
  2011年   4篇
  2010年   6篇
  2009年   4篇
  2008年   3篇
  2007年   5篇
  2006年   6篇
  2005年   7篇
  2004年   1篇
  2003年   2篇
  2002年   3篇
  2001年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1990年   1篇
排序方式: 共有78条查询结果,搜索用时 15 毫秒
21.
约瑟夫森结的混沌行为及其在保密通信中的应用   总被引:1,自引:1,他引:0  
约瑟夫森结的混沌行为在研究和应用方面都具有重要的价值。电阻-电容-电感并联约瑟夫森结在直流电流的驱动下会出现混沌行为,采用数值计算的方法,对混沌行为进行了研究。通过电压波形、频谱、对初始条件的敏感依赖以及奇怪吸引子,证实了混沌的存在,在此基础上首次提出了基于约瑟夫森结混沌行为的保密通信方案。  相似文献   
22.
In this paper, the synchronization problem of coupled chaotic lasers in master–slave configuration is numerically studied. The approach used allows to give a simple design procedure for the slave laser. In particular, we consider a complex system composed by two chaotic Nd:YAG lasers coupled through the first state variable of the master laser. Synchronization of chaotic Nd:YAG lasers is achieved by injecting the chaotic signal from the master Nd:YAG laser into the slave Nd:YAG laser. The robustness of synchronization is discussed when a mismatch of parameters occurs, and the effects of the channel noise on recovered information are showed. A potential application of chaotic synchronization of Nd:YAG lasers to transmit encrypted digital information is also given.  相似文献   
23.
Using algebraic and geometric methods,functional relationships between a point on a conic segment and its corresponding parameter are derived when the conic segment is presented by a rational quadratic or cubic Bézier curve.That is,the inverse mappings of the mappings represented by the expressions of rational conic segments are given.These formulae relate some triangular areas or some angles,determined by the selected point on the curve and the control points of the curve,as well as by the weights of the rational Bézier curve.Also,the relationship can be expressed by the corresponding parametric angles of the selected point and two endpoints on the conic segment,as well as by the weights of the rational Bézier curve.These results are greatly useful for optimal parametrization,reparametrization,etc.,of rational Bézier curves and surfaces.  相似文献   
24.
邵军虎  白宝明 《光子学报》2014,40(12):1809-1814
针对现有量子信息直传协议在有噪音量子信道下传输效率低及可靠性差的问题,提出了一种有效利用纠缠资源的量子安全直传通信方案.通过收发双方共享纠缠粒子作为辅助比特,采用纠缠辅助量子低密度校验码对量子态信息进行前向纠错保护,以提高系统在噪音环境下的传输可靠性.同时采用自动请求重传策略对量子态信息进行检错编码保护,当因窃听或强噪音导致译码获得的信息不正确时,则请求发端对该组信息进行编码重传操作.文中对所选用纠缠辅助量子低密度校验码在量子退极化噪音信道下的迭代译码性能进行了仿真,最后对方案的安全性进行了分析论证.  相似文献   
25.
In the paper we propose a new method of constructing cryptosystems utilising a nonpredictability property of discrete chaotic systems. We formulate the requirements for such systems to assure their safety. We also give examples of practical realisation of chaotic cryptosystems, using a generalisation of the method presented in [7]. The proposed algorithm of encryption and decryption is based on multiple iteration of a certain dynamical chaotic system. We assume that some part of the initial condition is a plain message. As the secret key we assume the system parameter(s) and additionally another part of the initial condition.  相似文献   
26.
双原子分子电子振动光谱的转动结构分析   总被引:6,自引:3,他引:3  
本文分析了双原子分子电子振动光谱的转动结构规律,说明了如何对电子振转光谱进行标识,从而获得不同电子态的转动常数、转动惯量和核间距。  相似文献   
27.
Spatial Resolution Enhancement in BOTDR by Spectrum Separation Method   总被引:3,自引:0,他引:3  
BOTDR (Brillouin optical-fiber time domain reflectometry) is a promising technique for measuring the strain distribution along an optical fiber which can be used for diagnosing civil structures. However, there is a trade-off between the spatial and the frequency resolutions, and its practical spatial resolution is limited to about 1 m; to date the application scope has been restricted. In order to enhance the spatial resolution without decreasing the measurement accuracy, we intentionally introduce two kinds of strain within the spatial resolution length determined by the optical pulse width, which results in Brillouin gain spectrum separation. In this paper, we describe the theoretical analysis of the spectrum separation method together with experimental verification, where a spatial resolution of 0.5 m is demonstrated. We further propose a new parabolic data fitting method especially effective in the spectrum separation method.  相似文献   
28.
王庆  周建伟 《大学数学》2017,33(3):101-106
近年,在研究射影几何在二次曲线上的运用中,发现有些平面几何问题用射影几何研究更自然、条理更清楚,而用平面几何方法处理则有难度.将二次曲线中的抛物线放在拓广平面上,借助射影几何中的Pascal定理、Steiner定理,给出了抛物线一些有趣的性质.  相似文献   
29.
It is a well-acknowledged fact that collaboration between different members of a supply chain yields a significant potential to increase overall supply chain performance. Sharing private information has been identified as prerequisite for collaboration and, at the same time, as one of its major obstacles. One potential avenue for overcoming this obstacle is Secure Multi-Party Computation (SMC). SMC is a cryptographic technique that enables the computation of any (well-defined) mathematical function by a number of parties without any party having to disclose its input to another party. In this paper, we show how SMC can be successfully employed to enable joint decision-making and benefit sharing in a simple supply chain setting. We develop secure protocols for implementing the well-known “Joint Economic Lot Size (JELS) Model” with benefit sharing in such a way that none of the parties involved has to disclose any private (cost and capacity) data. Thereupon, we show that although computation of the model’s outputs can be performed securely, the approach still faces practical limitations. These limitations are caused by the potential of “inverse optimization”, i.e., a party can infer another party’s private data from the output of a collaborative planning scheme even if the computation is performed in a secure fashion. We provide a detailed analysis of “inverse optimization” potentials and introduce the notion of “stochastic security”, a novel approach to assess the additional information a party may learn from joint computation and benefit sharing. Based on our definition of “stochastic security” we propose a stochastic benefit sharing rule, develop a secure protocol for this benefit sharing rule, and assess under which conditions stochastic benefit sharing can guarantee secure collaboration.  相似文献   
30.
In this paper, we investigate secure uplink and downlink communications between an unmanned aerial vehicle (UAV) and multiple user equipments (UEs) in the presence of multiple ground-based eavesdroppers (EVs) and unfriendly jammers. In order to guarantee the secure uplink and downlink transmissions, we consider a novel secure transmission scheme, which involves a power splitting based downlink transmission and scheduling of uplink and downlink transmission. Explicitly, we aim to maximize the average secrecy rate (ASR) by optimizing the UAV trajectory, the transmit power of the UAV and UEs, and scheduling of uplink and downlink transmission. Although the formulated problem is nonconvex, we propose an efficient solution by jointly applying the techniques of block coordinate descent and successive convex approximation. Numerical results show that the proposed scheme achieves a better ASR than the benchmark schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号