首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   264篇
  免费   47篇
  国内免费   14篇
化学   71篇
晶体学   2篇
力学   61篇
综合类   16篇
数学   47篇
物理学   128篇
  2024年   1篇
  2023年   4篇
  2022年   18篇
  2021年   11篇
  2020年   10篇
  2019年   4篇
  2018年   6篇
  2017年   6篇
  2016年   12篇
  2015年   9篇
  2014年   31篇
  2013年   23篇
  2012年   19篇
  2011年   15篇
  2010年   13篇
  2009年   11篇
  2008年   19篇
  2007年   22篇
  2006年   13篇
  2005年   12篇
  2004年   18篇
  2003年   4篇
  2002年   7篇
  2001年   1篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   4篇
  1996年   4篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1984年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
排序方式: 共有325条查询结果,搜索用时 62 毫秒
61.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.  相似文献   
62.
Hard or abrupt glottal attack (HGA) is one of the vocal behaviors often associated with benign lesion of the vocal folds. This study was designed to determine whether the frequency of HGA was different in hyperfunctional voice patients with and without vocal fold masses. One hundred and forty-seven subjects were studied. All subjects received a complete otolaryngological evaluation including strobovideolaryngoscopy, objective voice measures, and evaluation by a speech-language pathologist. Thirty-two patients were diagnosed with muscle tension dysphonia (19 male, 13 female) without vocal fold masses. Fifty-seven patients were diagnosed with unilateral vocal fold masses (29 male, 28 female), most of which were cysts. Fifty-eight patients were diagnosed with bilateral vocal fold masses (13 male, 45 female). Of the 45 females with bilateral vocal fold masses. 26 had a vocal cyst and reactive nodule and 19 had bilateral vocal fold nodules. The control group was balanced and matched based on sex and on percentage of singers and nonsingers. It consisted of 49 subjects with no vocal fold pathology (20 male, 29 female). The group was composed of professional speakers, singers, and nonprofessional speakers. All voice disordered groups demonstrated higher frequencies of HGA than the control group. Differences were found between the male and female subjects in this study. No differences were found between the various disorders. Differences were also found between the subgroups of bilateral masses, where the bilateral nodules group presented a higher frequency of HGA than the cyst and contralateral reactive nodule.  相似文献   
63.
This paper is concerned with a numerical study of the three-dimensional Honji instability that can arise in an oscillatory flow impinging on a circular cylinder. It is well known that when the fluid motion far from the cylinder is perpendicular to its axis then the flow is liable to a three-dimensional breakdown via this instability which initially appears as an axially periodic mushroom-like structure attached to the surface of the cylinder. Here the focus is on examining the Honji instability under an oblique inflow. The obliqueness of the free stream is represented by an angle of attack through introducing an axial flow component. It is found that the Honji mode is suppressed by increasing the axial flow component, and when this component is sufficiently large the instability mechanism is no longer operative so that all that remains is a featureless two-dimensional columnar flow. At smaller values of angle of attack, though the Honji structure remains, it is deformed by the axial flow component. The developed two-layer near-cylinder vortical structures can be related to the energy and momentum transfer between the two layers.  相似文献   
64.
李超  聂敏 《光子学报》2012,41(10):1256-1260
提出了一个多用户量子信令树型传输系统,并详细阐述了信令的传输过程.研究了系统中信令受到特洛伊木马攻击的损伤模型及其修复的必要性.将量子密钥分发的思想引入量子信令安全的直接通信中,分析了采用非正交量子态,以克服特洛伊木马攻击的问题,从而提高了信令传输的安全性.对多用户量子信令树型传输系统进行改进,提出了新的广义的多用户量子信令树型拓扑传输模型.研究结果表明,本文所提出的对多用户信令攻击的修复策略可有效地防止特洛伊木马攻击,从而保证信令传输过程安全有效的进行.  相似文献   
65.
An image scrambling encryption scheme for pixel bits was presented by Ye [Ye GD. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 2010;31:347-54], which can be seen as one kind of typical binary image scrambling encryption considering from the bit-plain of size M × (8N). However, recently, some defects existing in the original image encryption scheme, i.e., Ye’s scheme, have been observed by Li and Lo [Li CQ, Lo KT. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 2011;91:949-54]. In the attack proposed by Li and Lo at least 3 + ⌈log2(MN)⌉ plain images of size M × N are used to reveal the permutation matrix W = [w(ik)] (i ∈ {1, 2, … , M}; k ∈ {1, 2, … , 8N}) which can be applied to recover the exact plain image. In the current paper, at first, one type of special plain image/cipher image is used to analyze the security weakness of the original image scrambling scheme under study. The final encryption vectors TM and TN or the decryption vectors TM′ and TN′ are revealed completely according to our attack. To demonstrate the performance of our attack, a quantified comparison is drawn between our attack and the attack proposed by Li and Lo. Compared with Li and Lo’s attack, our attack is more efficient in the general conditions. In particular, when the sizes of images satisfy the condition M = N or M ? 8N, the number of the used plain images/cipher images is at most 9, which is sharply less than 3 + ⌈log2(MN)⌉ when M and N are of large size. To overcome the weaknesses of the original scheme, in this paper, an improved image scrambling encryption scheme is proposed. In the improved scheme, the idea of the “self-correlation” method is used to resist the chosen-plaintext attack/known-plaintext attack. The corresponding simulations and analyses illustrate that the improved encryption method has good cryptographic properties, and can overcome the weakness of the original image encryption scheme. Finally, farther improvement is briefly presented for the future work.  相似文献   
66.
在南航3m低速风洞内,利用一套两自由度动态试验机构,通过测力实验研究了某飞机模型静态和俯仰动态过程中大迎角下的横侧向气动特性,分析比较了在模型头部加上扰动片后,对横侧向气动特性产生的影响.研究结果表明,模型在静态大迎角下会产生较大的侧向力和偏航力矩,而模型的快速上仰过程则进一步加剧了模型头部流动的非对称性,在大迎角下产生较大的偏航力矩迟滞环;当在模型头部加扰动片后,不论是静态过程还是动态过程,都使得模型的侧向力和偏航力矩减小,从而改善了俯仰运动过程中大迎角下的横侧向气动特性.  相似文献   
67.
The wing rock motion is frequently suffered by a wing-body configuration with low swept wing at high angle of attack. It is found from our experimental study that the tip perturbation and wing longitudinal locations affect significantly the wing rock motion of a wing-body. The natural tip perturbation would make the wing rock motion of a nondeterministic nature and an artificial mini-tip perturbation would make the wing rock motion deterministic. The artificial tip perturbation would, as its circumferential location is varied, generate three different types of motion patterns: (1) limit cycle oscillation, (2) irregular oscillation, (3) equilibrium state with tiny oscillation. The amplitude of rolling oscillation corresponding to the limit cycle oscillatory motion pattern is decreased with the wing location shifting downstream along the body axis.  相似文献   
68.
Firstly, the steady laminar flow field of a hypersonic sharp cone boundary layer with zero angle of attack was computed.Then,two groups of finite amplitude T-S wave disturbances were introduced at the entrance of the computational field,and the spatial mode transition process was studied by direct numerical simulation (DNS) method. The mechanism of the transition process was analyzed.It was found that the change of the stability characteristics of the mean flow profile was the key issue.Furthermore,the characteristics of evolution for the disturbances of different modes in the hypersonic sharp cone boundary layer were discussed.  相似文献   
69.
With the recent developments of Machine Learning as a Service (MLaaS), various privacy concerns have been raised. Having access to the user’s data, an adversary can design attacks with different objectives, namely, reconstruction or attribute inference attacks. In this paper, we propose two different training frameworks for an image classification task while preserving user data privacy against the two aforementioned attacks. In both frameworks, an encoder is trained with contrastive loss, providing a superior utility-privacy trade-off. In the reconstruction attack scenario, a supervised contrastive loss was employed to provide maximal discrimination for the targeted classification task. The encoded features are further perturbed using the obfuscator module to remove all redundant information. Moreover, the obfuscator module is jointly trained with a classifier to minimize the correlation between private feature representation and original data while retaining the model utility for the classification. For the attribute inference attack, we aim to provide a representation of data that is independent of the sensitive attribute. Therefore, the encoder is trained with supervised and private contrastive loss. Furthermore, an obfuscator module is trained in an adversarial manner to preserve the privacy of sensitive attributes while maintaining the classification performance on the target attribute. The reported results on the CelebA dataset validate the effectiveness of the proposed frameworks.  相似文献   
70.
柏楠  邓学蓥  王延奎 《力学学报》2007,39(2):261-266
通过在细长旋成体模型机身的不同位置设置出烟孔,使用新型发烟装置对模型注入雾化油 滴,采用激光片光法在常规风洞中高风速(60m/s)条件下得到清晰、完整而稳定的截面涡 结构图像. 并通过同状态标定法和等比例网格法发展了简易涡位定量测量技术,为前体非对 称涡Re数效应的研究提供了重要的技术平台.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号