首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   317篇
  免费   95篇
  国内免费   1篇
化学   9篇
力学   1篇
综合类   12篇
数学   47篇
物理学   344篇
  2024年   2篇
  2023年   4篇
  2022年   18篇
  2021年   28篇
  2020年   17篇
  2019年   6篇
  2018年   3篇
  2017年   32篇
  2016年   14篇
  2015年   17篇
  2014年   39篇
  2013年   28篇
  2012年   22篇
  2011年   31篇
  2010年   23篇
  2009年   24篇
  2008年   25篇
  2007年   16篇
  2006年   13篇
  2005年   13篇
  2004年   9篇
  2003年   10篇
  2002年   2篇
  2001年   4篇
  2000年   1篇
  1999年   1篇
  1998年   6篇
  1997年   4篇
  1992年   1篇
排序方式: 共有413条查询结果,搜索用时 15 毫秒
21.
Quantum Bayesian computation is an emerging field that levers the computational gains available from quantum computers. They promise to provide an exponential speed-up in Bayesian computation. Our article adds to the literature in three ways. First, we describe how quantum von Neumann measurement provides quantum versions of popular machine learning algorithms such as Markov chain Monte Carlo and deep learning that are fundamental to Bayesian learning. Second, we describe quantum data encoding methods needed to implement quantum machine learning including the counterparts to traditional feature extraction and kernel embeddings methods. Third, we show how quantum algorithms naturally calculate Bayesian quantities of interest such as posterior distributions and marginal likelihoods. Our goal then is to show how quantum algorithms solve statistical machine learning problems. On the theoretical side, we provide quantum versions of high dimensional regression, Gaussian processes and stochastic gradient descent. On the empirical side, we apply a quantum FFT algorithm to Chicago house price data. Finally, we conclude with directions for future research.  相似文献   
22.
A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system is presented. Different from the traditional DNA encryption methods, our algorithm is not use complex biological operation, but just uses the idea of DNA subsequence operation (such as elongation operation, truncation operation, and deletion operation). And then, do the DNA addition operation under the Chen's Hyper-chaotic map in this image cipher. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.  相似文献   
23.
A new image fusion encryption algorithm based on image fusion and DNA sequence operation and hyper-chaotic system is presented. Firstly, two DNA sequences matrices are obtained by encoding the original image and the key image. Secondly, using the chaotic sequences generated by Chen's hyper-chaotic maps to scramble the locations of elements from the DNA sequence matrix which generated form original image. Thirdly, XOR the scrambled DNA matrix and the random DNA matrix by using DNA sequence addition operation. At last, decoding the DNA sequence matrix, we will get the encrypted image. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.  相似文献   
24.
Broadcast domination was introduced by Erwin in 2002, and it is a variant of the standard dominating set problem, such that different vertices can be assigned different domination powers. Broadcast domination assigns an integer power f(v)?0 to each vertex v of a given graph, such that every vertex of the graph is within distance f(v) from some vertex v having f(v)?1. The optimal broadcast domination problem seeks to minimize the sum of the powers assigned to the vertices of the graph. Since the presentation of this problem its computational complexity has been open, and the general belief has been that it might be NP-hard. In this paper, we show that optimal broadcast domination is actually in P, and we give a polynomial time algorithm for solving the problem on arbitrary graphs, using a non-standard approach.  相似文献   
25.
不对称离散分数傅里叶变换实现数字图像的加密变换   总被引:8,自引:1,他引:7  
利用不对称分数傅里叶变换的特性,提出了一种图像加密变换的新方法。对图像的x,y方向分别实施不同级次的一维分数傅里叶变换,得到加密图像。解密方法就是对变换后的图像实施对应级次的分数傅里叶逆变换,只有当x,y方向的逆变换级次分别与原变换级次都相同或者满足周期条件时,才能恢复原图像。加密变换有效地提高了图像加密和防伪力度。数值计算验证了方法的正确性和可行性。  相似文献   
26.
Pseudo-random properties of a class of two-dimensional (2-D) 5-neighborhood cellular automata (CA), built around nonlinear (OR, AND) and linear (XOR) Boolean functions are studied. The site values at each step of the 2-D CA evolution are taken in parallel and form pseudo-random sequences, which satisfy the criteria established for pseudo random number generator (PRNG): long period, excellent random qualities, single bit error propagation (avalanche criteria), easy and fast generation of the random bits. A block-scheme for secure Stream Cipher based on 2-D CA is proposed. The 2-D CA based PRNG algorithm has simple structure, use space-invariant and local interconnections and can be easily realized in very large scale integration or parallel optoelectronic architectures.  相似文献   
27.
Banghe Zhu  Haifa Zhao  Shutian Liu 《Optik》2003,114(2):95-99
We propose a novel image encryption method that combines the pure intensity random encoding and the digital holography technique. A phase-shifting interferometer records both phase and amplitude information of a complex object with a CCD sensor array. The encryption is performed by placing two pure intensity random masks between the image to be encrypted and an intensity recording device. Electronic decryption can be performed with fast Fresnel reconstruction procedure. Numerical simulation results show the validity of the algorithm and an optoelectronic implementation setup is also presented.  相似文献   
28.
In this paper, the implementation of a secure optical system using fully phase encryption is described. A two-dimensional phase image obtained from an amplitude image is encrypted and decrypted by using a spatial light modulator working in phase mode. The fully phase encryption is achieved using double random phase encoding. The encrypted image is holographically recorded in a photorefractive crystal and is then decrypted by generating, through phase conjugation, the conjugate of the encrypted image. A lithium niobate crystal has been used as a phase contrast filter to change the decrypted phase image into an amplitude image, thus alleviating the need for alignment of the phase contrast set-up in the Fourier plane. Simulation results are provided to verify the proposed study. The mean square error between the primary image and decrypted image has been calculated to study the sensitivity of the system.  相似文献   
29.
大连广电中心广播电视剧场声学设计   总被引:3,自引:0,他引:3       下载免费PDF全文
广播电视剧场是随着电视技术的发展和需要而产生的一种新的观演建筑的形式,它不同于一般的演播室,也有别于普通的剧场。它不仅要求能够进行电视节目的转播和录制,还要求能够进行音乐、歌舞等各种文艺节目的演出,并能够举行会议和放映立体声电影,因此,广播电视剧场对音质有很高的要求。本文介绍了大连广播电视中心广播电视剧场的建声设计,在该剧场内采用了计算机控制的可调混响装置,使得各种使用功能都能有一个较为理想的建声环境。  相似文献   
30.
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares   总被引:2,自引:0,他引:2  
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques. Our schemes traitor tracing and revocation programs cohere tightly. The size of the enabling block of our scheme is independent of the number of receivers. Each receiver holds one decryption key only. The distinct feature of our scheme is that when traitors are found, we can revoke their private keys (up to some threshold z) without updating the private keys of other receivers. In particular, no revocation messages are broadcast and all receivers do nothing. Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way. It is conceptually simple and fully k-resilient, that is, it can find all traitors if the number of them is k or less. The encryption algorithm of our scheme is semantically secure assuming that the decisional Diffie-Hellman problem is hard.AMS Classification: 11T71, 68P30  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号