全文获取类型
收费全文 | 1077篇 |
免费 | 252篇 |
国内免费 | 20篇 |
专业分类
化学 | 99篇 |
晶体学 | 7篇 |
力学 | 63篇 |
综合类 | 46篇 |
数学 | 149篇 |
物理学 | 985篇 |
出版年
2024年 | 2篇 |
2023年 | 15篇 |
2022年 | 49篇 |
2021年 | 52篇 |
2020年 | 38篇 |
2019年 | 29篇 |
2018年 | 20篇 |
2017年 | 35篇 |
2016年 | 32篇 |
2015年 | 42篇 |
2014年 | 113篇 |
2013年 | 91篇 |
2012年 | 42篇 |
2011年 | 64篇 |
2010年 | 57篇 |
2009年 | 53篇 |
2008年 | 66篇 |
2007年 | 79篇 |
2006年 | 67篇 |
2005年 | 62篇 |
2004年 | 54篇 |
2003年 | 50篇 |
2002年 | 50篇 |
2001年 | 32篇 |
2000年 | 32篇 |
1999年 | 30篇 |
1998年 | 21篇 |
1997年 | 23篇 |
1996年 | 10篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 7篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有1349条查询结果,搜索用时 15 毫秒
61.
This paper proposes an adaptive parameter identification method
for breaking chaotic shift key communication from the
transmitted signal in public channel. The sensitive dependence
property of chaos on parameter mismatch is used for chaos adaptive
synchronization and parameter identification. An index function
about the synchronization error is defined and conjugate gradient
method is used to minimize the index function and to search the
transmitter's parameter (key). By using proposed method, secure key
is recovered from transmitted signal generated by low dimensional
chaos and hyper chaos switching communication. Multi-parameters can
also be identified from the transmitted signal with noise. 相似文献
62.
现在诱惑态已被证明是一种可以大大提高量子密钥分发安全性能的现实可行的方法.由于考虑到现实应用中激光器在调制过程中的消光比不能做到100%,以及激光器固有的自发辐射因而使得制备真空态并不是一件容易的事情. 因此本文将对理想情况下准单光子光源量子密钥分发系统应用中的诱惑态结论作了补充和扩展,提出了两个弱光强态的诱惑态方案和一个弱光强诱惑态方案.最后,将“双探测器”的理论应用在准单光子源(HSPS)光源系统中,使系统的安全传输距离可达到2215km,比使用普通探测器的系统增加了约50km. 相似文献
63.
64.
We review our recent work in the implementation of optical single-sideband (OSSB) modulation and in the application of this modulation format to microwave photonics and optical testing systems. We have developed an enhanced OSSB modulator for wide-band operation, the so-called bidirectional OSSB modulator, and a simplification of this scheme for narrow-band applications. These OSSB modulators are based on the use of a standard single-electrode Mach-Zehnder electro-optic modulator (MZ-EOM) and passive fiber-optic components. In both designs, the OSSB operation is shown to be independent of the MZ-EOM bias. Therefore, the optical modulation depth at the output of the device can be enhanced using minimum transmission biasing to provide suppression of the optical carrier. Finally, we demonstrate the application of OSSB modulators to the improvement of microwave/millimeter-wave subcarrier multiplexing fiber-optic links and to narrow-band fiber radio systems. In addition, we analyzed the feasibility and the limitations of an optical vector network analysis technique based on OSSB modulation that can provide sub-picometer wavelength resolution. 相似文献
65.
光交叉连接节点的功能结构 总被引:1,自引:1,他引:0
光交叉连接(OXC)是未来波分复用光传送网实现交换与选路功能的核心部件.目前,OXC节点的物理结构得到深入研究,已经提出了一些采用不同光子器件的OXC实现方案.本文从描述光交叉连接功能的角度出发,给出一种分析OXC节点功能结构的模型,并比较各种OXC方案在功能结构上的差异。 相似文献
66.
Karol?Horodecki Micha??HorodeckiEmail author Pawel?Horodecki Jonathan?Oppenheim 《Foundations of Physics》2005,35(12):2027-2040
There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and
key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular
case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result
of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the
question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can
create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that
it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical
distributions.
It is our pleasure to dedicate this paper to Asher Peres on the occasion of his seventieth birthday. 相似文献
67.
68.
We address the problem of finding the worst possible traffic a
user of a telecommunications network can send.
We take worst to mean having the highest effective
bandwidth, a concept that arises in the Large Deviation theory of
queueing networks.
The traffic is assumed to be stationary and to satisfy leaky bucket
constraints, which represent the a priori knowledge the network
operator has concerning the traffic.
Firstly, we show that this optimization problem may be reduced to an
optimization over periodic traffic sources.
Then, using convexity methods, we show that the realizations of a
worst case source must have the following properties:
at each instant the transmission rate must be either zero,
the peak rate, or the leaky bucket rate; it may only be the latter when
the leaky bucket is empty or full;
each burst of activity must either start with the leaky
bucket empty or end with it full. 相似文献
69.
Kameron Rausch N. Yurt D. F. Geraghty N. Eradat N. Peyghambarian Alan R. Kost 《Optical and Quantum Electronics》2007,39(7):611-622
Broadband arrayed waveguide gratings on InP are presented using a novel S-shape design. This design was utilized to accommodate
the large free spectral range required for broadband operation. Four and eight channel AWGs with a wavelength channel spacing
of 18 nm are discussed. The output peaks of the AWGs have a wide FWHM of 11 nm which provides insensitive operation to polarization,
temperature fluctuations, and chromatic dispersion. 相似文献
70.
研究了一种新型模拟双折射结构DWDM滤波器的中心频率和带宽的可调谐特性.研究表明:当给定满足一定平坦化要求的光谱透射率所需的各模拟波片中偏振旋转器的旋转角时,通过模拟波片中楔形介质对的相对位移来调节光在各模拟波片中的光程差,同时保持光程差仍满足特定的比例关系,可实现中心频率及带宽的调谐.当光在各模拟波片中的光程差变化较小时,可实现中心频率的调谐,此时带宽的改变很小,可忽略不计;随着光程差变化的不断增大,带宽的改变则不能忽略. 相似文献