首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1589篇
  免费   195篇
  国内免费   75篇
化学   86篇
力学   271篇
综合类   18篇
数学   1139篇
物理学   345篇
  2024年   2篇
  2023年   25篇
  2022年   36篇
  2021年   46篇
  2020年   42篇
  2019年   49篇
  2018年   37篇
  2017年   51篇
  2016年   51篇
  2015年   45篇
  2014年   94篇
  2013年   121篇
  2012年   58篇
  2011年   114篇
  2010年   113篇
  2009年   102篇
  2008年   113篇
  2007年   93篇
  2006年   99篇
  2005年   73篇
  2004年   55篇
  2003年   74篇
  2002年   59篇
  2001年   46篇
  2000年   41篇
  1999年   35篇
  1998年   48篇
  1997年   30篇
  1996年   22篇
  1995年   13篇
  1994年   13篇
  1993年   7篇
  1992年   8篇
  1991年   9篇
  1990年   5篇
  1989年   2篇
  1988年   6篇
  1987年   2篇
  1986年   1篇
  1985年   7篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
排序方式: 共有1859条查询结果,搜索用时 15 毫秒
41.
We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation.After ensuring the security of the quantum channel,the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation.The receivers can recover the secret message by combining their measurement results with the sender's result.If a perfect quantum channel is used,our scheme is completely secure because the transmitting particle sequence does not carry the secret message.We also show our scheme is secure for noise quantum channel.  相似文献   
42.
We present a novel protocol for deterministic secure quantum communication by using the lour-qubit cluster state as quantum channel. It is shown that two legitimate users can directly transmit the secret messages based on Bellbasis measurements and classical communication. The present protocol makes use of the ideas of block transmission and decoy particle checking technique. It has a high capacity as each cluster state can carry two 5its of information, and has a high intrinsic efficieney 5ecause almost all the instances except the decoy checking particles (its numSer is negligible) are useful. Furthermore, this protocol is feasible with present-day technique.  相似文献   
43.
A comparison of discretization schemes required to evaluate the radiation intensity at the cell faces of a control volume in differential solution methods of the radiative transfer equation is presented. Several schemes developed using the normalized variable diagram and the total variation diminishing formalisms are compared along with essentially non-oscillatory schemes and genuinely multidimensional schemes. The calculations were carried out using the discrete ordinates method, but the analysis is equally valid for the finite-volume method. It is shown that the S schemes of the genuinely multidimensional family perform quite well, particularly in problems with discontinuous radiation intensity fields. However, they are time consuming, and so they do not always become more attractive regarding the trade-off between accuracy and computational requirements, in comparison with other high-order schemes that, although being less accurate, are also more economical.  相似文献   
44.
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme.  相似文献   
45.
基于分时原理的多相流体比例分配方法   总被引:1,自引:0,他引:1  
提出了从“时间”上对多相流进行分配的新思路,分析了分时分配的基本原理,并设计了具体的实现方式。在空气-水实验回路上对分时分配装置进行了实验研究和验证。分时分配的基本原理就是通过“分时”的方法,使整个分配器“空间”内的多相流都能按照给定的时间份额周期性地交替流向对应的支路,从而保证各支路内的多相流具有高度一致的相含量和确定的流量比例。实验研究证明,分时分配法具有切实的可行性,分流比等于分时比且与流量和流体的物性无关,仅取决于分配器的几何参数。  相似文献   
46.
We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitaryoperation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique.  相似文献   
47.
In this paper we develop numerical fluxes of the centred type for one-step schemes in conservative form for solving general systems of conservation laws in multiple-space dimensions on structured meshes. The proposed method is an extension of the multidimensional FORCE flux developed by Toro et al. (2009) [14]. Here we introduce upwind bias by modifying the shape of the staggered mesh of the original FORCE method. The upwind bias is evaluated using an estimate of the largest eigenvalue, which in any case is needed for selecting a time step. The resulting basic flux is first-order accurate and monotone. For the linear advection equation, the proposed UFORCE method reproduces exactly the upwind Godunov method. Extension to non-linear systems has been done empirically via the two-dimensional inviscid shallow water equations. Second order of accuracy in space and time on structured meshes is obtained in the framework of finite volume methods. The proposed method improves the accuracy of the solution for small Courant numbers and intermediate waves associated with linearly degenerate fields (contact discontinuities, shear waves and material interfaces). It achieves comparable accuracy to that of upwind methods with approximate Riemann solvers, though retaining the simplicity and efficiency of centred methods. The performance of the schemes is assessed on a suite of test problems for the two-dimensional shallow water equations.  相似文献   
48.
A new integrated scheme based on resource-reservation and adaptive network flow routing to alleviate contention in optical burst switching networks is proposed. The objective of the proposed scheme is to reduce the overall burst loss in the network and at the same time to avoid the packet out-of-sequence arrival problem. Simulations are carried out to assess the feasibility of the proposed scheme. Its performance is compared with that of contention resolution schemes based on conventional routing. Through extensive simulations, it is shown that the proposed scheme not only provides significantly better burst loss performance than the basic equal proportion and hop-length based traffic routing algorithms, but also is void of any packet re-orderings.  相似文献   
49.
A spectrum sharing system with primary and secondary nodes, each equipped with an arbitrary number of antennas, is investigated. Particularly, the outage performance of an underlay cognitive system is analytically studied, in the case when the end-to-end (e2e) communication is established via an intermediate relay node. To better enhance the e2e communication, successive interference cancellation (SIC) is adopted, which compensates for both the transmission power constraint and the presence of interference from primary nodes. Both the relay and secondary receiver perform unordered SIC to successively decode the multiple streams, whereas the decode-and-forward relaying protocol is used for the e2e communication. New closed-form expressions for the e2e outage performance of each transmitted stream are derived in terms of finite sum series of the Tricomi confluent hypergeometric function. In addition, simplified yet tight approximations for the asymptotic outage performance are obtained. Useful engineering insights are manifested, such as the diversity order of the considered system and the impact of interference from the primary nodes in conjunction with the constrained transmission power of the secondary nodes.  相似文献   
50.
Image sharing scheme based on combination theory   总被引:1,自引:0,他引:1  
We present a simple algorithm for sharing and hiding secret image based on combination theory. The secret image is firstly encrypted by matrix multiplications and then shared into many shadow images by multiplying binary random sampling matrices. The sampling matrices randomly assign the pixel values to the shadow images which satisfy a specific combination rule as a constrain, so that the (tn) threshold secret sharing scheme can be implemented. Numerical experiments have demonstrated the effectiveness of this image sharing algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号