首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1071篇
  免费   252篇
  国内免费   20篇
化学   99篇
晶体学   7篇
力学   63篇
综合类   46篇
数学   149篇
物理学   979篇
  2024年   2篇
  2023年   15篇
  2022年   43篇
  2021年   52篇
  2020年   38篇
  2019年   29篇
  2018年   20篇
  2017年   35篇
  2016年   32篇
  2015年   42篇
  2014年   113篇
  2013年   91篇
  2012年   42篇
  2011年   64篇
  2010年   57篇
  2009年   53篇
  2008年   66篇
  2007年   79篇
  2006年   67篇
  2005年   62篇
  2004年   54篇
  2003年   50篇
  2002年   50篇
  2001年   32篇
  2000年   32篇
  1999年   30篇
  1998年   21篇
  1997年   23篇
  1996年   10篇
  1995年   10篇
  1994年   5篇
  1993年   7篇
  1992年   2篇
  1991年   2篇
  1990年   4篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
排序方式: 共有1343条查询结果,搜索用时 46 毫秒
51.
赵剑强  赵倩  陈莹  杨文娟  胡博  刘珺  吴沛 《应用声学》2018,37(4):582-586
基于理论推导和计算,给出了公路声屏障声学设计中,在考虑地面附加衰减情况下计算插入损失的方法。该方法综合考虑了有限长线声源无限长声屏障绕射声衰减量、有限长线声源地面衰减量及遮蔽角对插入损失的影响。通过与《声屏障声学设计和测量规范》(HJ/T90-2004)的计算结果的对比,验证了本文所给方法的精确性及可行性,并对规范所给地面衰减修正量进行了商榷。最后,给出了当预测点位于有限长路段中央法线上时,通过计算线声源地面衰减量得到计算插入损失所需参数值,再计算插入损失的简便方法。本研究为存在地面附加衰减情况下有限长声屏障插入损失计算提供了一个新的参考方法。  相似文献   
52.
光纤光栅的温度补偿   总被引:16,自引:1,他引:16  
提出了一种简单、小型的光纤光栅温度补偿器件,将光纤光栅粘贴在具有负热膨胀系数的材料上,实现了光纤光栅的温度补偿。该器件在-20~44℃温度范围内光栅波长变化0.08m,是未补偿光纤光栅的1/8。  相似文献   
53.
长距离长期稳定的量子密钥分发系统   总被引:6,自引:0,他引:6       下载免费PDF全文
介绍了最近完成的长距离长期稳定的量子密钥分发系统.该系统利用往返光路补偿光纤偏振 抖动和相位漂移的原理,采用结电容平衡魔T网络耦合的单光子探测技术,在506km单模 光纤中实现了长时间(大于12h)稳定的量子密钥分发实验.单脉冲平均光子数为007, 误码率为4%,其中单光子探测器的探测效率大于5%,单脉冲暗计数低于29×10-6. 关键词: 量子保密通信 量子密钥分发 单光子探测  相似文献   
54.
为了提高PM-CO-OFDM-PON系统中上行数据的传输速率,提出采用偏振复用结构与相干检测技术相结合,通过光载波源方式实现上行链路光网络单元无色化传输的技术方案.利用光学软件VPI和Matlab,搭建了基于偏振复用技术的40Gb/s PM-CO-OFDM-PON系统仿真平台,结果表明:该方案可有效提高PM-CO-OFDM-PON系统中上行数据传输速率,并实现光网络单元无色化;利用相干检测比直接检测可以更高地提高接收端的灵敏度.  相似文献   
55.
In a quantum key distribution(QKD)system,the error rate needs to be estimated for determining the joint probability distribution between legitimate parties,and for improving the performance of key reconciliation.We propose an efficient error estimation scheme for QKD,which is called parity comparison method(PCM).In the proposed method,the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling.From the simulation results,the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations.  相似文献   
56.
This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems.  相似文献   
57.
Qiang Lai 《中国物理 B》2022,31(6):68905-068905
The identification of key nodes plays an important role in improving the robustness of the transportation network. For different types of transportation networks, the effect of the same identification method may be different. It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks. Based on the knowledge of complex networks, the metro networks and the bus networks are selected as the objects, and the key nodes are identified by the node degree identification method, the neighbor node degree identification method, the weighted k-shell degree neighborhood identification method (KSD), the degree k-shell identification method (DKS), and the degree k-shell neighborhood identification method (DKSN). Take the network efficiency and the largest connected subgraph as the effective indicators. The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance.  相似文献   
58.
Zhongqi Sun 《中国物理 B》2021,30(11):110303-110303
Reference-frame-independent quantum key distribution (RFI-QKD) can allow a quantum key distribution system to obtain the ideal key rate and transmission distance without reference system calibration, which has attracted much attention. Here, we propose an RFI-QKD protocol based on wavelength division multiplexing (WDM) considering finite-key analysis and crosstalk. The finite-key bound for RFI-QKD with decoy states is derived under the crosstalk of WDM. The resulting secret key rate of RFI-QKD, which is more rigorous, is obtained. Simulation results reveal that the secret key rate of RFI-QKD based on WDM is affected by the multiplexing channel number, as well as crosstalk between adjacent channels.  相似文献   
59.
Periplasmic binding protein-dependent maltose transport system (MBP-MalFGK2) of Escherichia coli, an important member of the Adenosine triphosphate-binding cassette transporter superfamily, is in charge of the transportation of maltoses across cellular membrane. Studies have shown that this transport processes are activated by the binding of maltose and are accompanied by large-scale cooperative movements between different domains which are mediated by a network of important residues related to signal transduction and allosteric regulation. In this paper, the functionally crucial residues and long-range allosteric pathway of the regulation of the system by substrate were identified by utilising a coarse-grained thermodynamic method proposed by our group. The residues whose perturbations markedly change the binding free energy between maltoses and MBP-MalFGK2 were considered to be key residues. In result, the key residues in 62 clusters distributed in different subdomains were identified successfully, and the results from our calculation are highly consistent with experimental and theoretical observations. Furthermore, we explored the long-range cooperation within the transporter. These studies will help us better understand the physical mechanism of the effects of the maltose on MBP-MalFGK2 by long-range allosteric modulation.  相似文献   
60.
The number of transmitted signals in practical quantum key distribution (QKD) protocol is always finite. We discuss the security of decoy states QKD protocol with finite resources by considering the statistical fluctuation for the yield and error rate of the quantum state in different sources of pulses (signal sources and decoy sources). The number of exchanged quantum signals vs positive key generation rate is given with experiment results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号