首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   46篇
  国内免费   14篇
化学   70篇
晶体学   2篇
力学   61篇
综合类   16篇
数学   44篇
物理学   119篇
  2024年   1篇
  2023年   4篇
  2022年   11篇
  2021年   10篇
  2020年   9篇
  2019年   4篇
  2018年   6篇
  2017年   6篇
  2016年   12篇
  2015年   9篇
  2014年   29篇
  2013年   22篇
  2012年   19篇
  2011年   15篇
  2010年   13篇
  2009年   11篇
  2008年   19篇
  2007年   22篇
  2006年   13篇
  2005年   12篇
  2004年   18篇
  2003年   4篇
  2002年   7篇
  2001年   1篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   4篇
  1996年   4篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1984年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有312条查询结果,搜索用时 436 毫秒
21.
Automated border control systems are the first critical infrastructure point when crossing a border country. Crossing border lines for unauthorized passengers is a high security risk to any country. This paper presents a multispectral analysis of presentation attack detection for facial biometrics using the learned features from a convolutional neural network. Three sensors are considered to design and develop a new database that is composed of visible (VIS), near-infrared (NIR), and thermal images. Most studies are based on laboratory or ideal conditions-controlled environments. However, in a real scenario, a subject’s situation is completely modified due to diverse physiological conditions, such as stress, temperature changes, sweating, and increased blood pressure. For this reason, the added value of this study is that this database was acquired in situ. The attacks considered were printed, masked, and displayed images. In addition, five classifiers were used to detect the presentation attack. Note that thermal sensors provide better performance than other solutions. The results present better outputs when all sensors are used together, regardless of whether classifier or feature-level fusion is considered. Finally, classifiers such as KNN or SVM show high performance and low computational level.  相似文献   
22.
Advanced Encryption Standard (AES) is one of the most widely used block ciphers nowadays, and has been established as an encryption standard in 2001. Here we design AES-128 and the sample-AES (S-AES) quantum circuits for deciphering. In the quantum circuit of AES-128, we perform an affine transformation for the SubBytes part to solve the problem that the initial state of the output qubits in SubBytes is not the |0>⊗8 state. After that, we are able to encode the new round sub-key on the qubits encoding the previous round sub-key, and this improvement reduces the number of qubits used by 224 compared with Langenberg et al.’s implementation. For S-AES, a complete quantum circuit is presented with only 48 qubits, which is already within the reach of existing noisy intermediate-scale quantum computers.  相似文献   
23.
Tricarbonyl(1-methoxycarbonyl-5-phenylpentadienyl)iron(1+) hexafluorophosphate (7) was prepared in two steps from tricarbonyl(methyl 6-oxo-2,4-hexadienoate)iron. While addition of carbon and heteroatom nucleophiles to 7 generally occurs at the phenyl-substituted dienyl carbon to afford (2,4-dienoate)iron products, the addition of phthalimide proceeded at C2 to afford a (pentenediyl)iron product (18). Complex 18 was structurally characterized by X-ray diffraction analysis.  相似文献   
24.
双随机相位编码光学加密系统的唯密文攻击   总被引:11,自引:0,他引:11       下载免费PDF全文
彭翔  汤红乔  田劲东 《物理学报》2007,56(5):2629-2636
针对双随机相位编码光学加密系统的安全性分析表明,该系统属于线性对称分组密码系统,其线性性质为安全性留下极大隐患.在唯密文攻击下,仅根据密文估计出物面波函数的“支撑”(support),然后利用迭代相位恢复算法获得物面波函数(其振幅是明文信息),再根据物面波函数与频域密文的关系可推导出频谱平面的解密密钥.由于估计出来的物面波函数的“支撑”相对于真实的物面波函数的“支撑”有一定的平移,使得恢复的物面波函数与真实的物面波函数之间无论在振幅上还是相位上都存在平移,导致用推导出来的解密密钥去解密其他密文时所获得的明文与原始明文之间存在明显平移.然而,可依照这一先验信息,将估计出来的物面波函数的“支撑”在物面内遍历,从而找到逼近真实解密密钥的解.利用此解密密钥去解密其他密文时获得更好的解密效果. 关键词: 光学信息安全 双随机相位编码 唯密文攻击 函数支撑  相似文献   
25.
The aerodynamic characteristics of cone-sphere models are studied at Mach numbers M = 6, 8.4, and 12 to 13 over a wide Reynolds number range. Models of a braking device (sphere) were connected with a load (frustum of a cone) by means of shrouds. The dependences of the aerodynamic coefficients C x and C y on the angle of attack α were obtained for different relative dimensions of the load and the braking device, shroud lengths, and Mach and Reynolds numbers. The effect of the above-mentioned parameters on the aerodynamic characteristics of the models is analyzed. The C x (ReD) dependences of load-parachutemodels in a symmetric flow are determined over the wide Mach and Reynolds number ranges 6 ≤ M ≤ 13 and 3 · 103 ≤ ReD ≤ 3 · 106.  相似文献   
26.
Jason Lin 《Optics Communications》2011,284(9):2412-2414
Recently, Chen et al. presented a novel quantum private comparison (QPC) protocol using triplet GHZ state to enable two parties to compare the equality of their information without revealing the content. The protocol is rather promising because it only requires single-photon measurement with the help of a semi-honest third party to complete the secret comparison. However, this study will point out that a weakness could occur in the eavesdropping check phase. That is, an intercept-resend attack could be launched by one of the two participants to reveal the information content of the other participant—a result that contradicts to the security requirement of a QPC. Fortunately, two solutions are possible to avoid the attack.  相似文献   
27.
 介绍了卫星制导武器直接瞄准攻击方式在对地精确打击中占据的关键位置,阐述了卫星制导武器直接瞄准攻击方法的原理。由于卫星制导武器直接瞄准攻击对目标定位要求较高,采用常用定位手段已不能满足系统对目标定位的要求,分析了使用相对GPS制导成为卫星制导武器直接瞄准攻击的关键的原因。相对GPS制导误差主要包括采用载机和武器相对GPS定位误差以及传感器对目标的相对定位误差,分别对两者的定位精度进行了分析和推导。仿真结果表明:这两者的综合误差理论值小于7.5 m,满足卫星制导武器在直接瞄准攻击中对目标定位的需求。  相似文献   
28.
对(X+K)mod 2~n运算和X⊕K运算异或差值函数的概率分布规律进行了研究,并基于穷举攻击中大概率优先选取原则,给出了一个解决(X+K)mod 2~n和X⊕K等价问题的计算复杂度为O(n)的算法,基于此对Hawkes等人针对SNOW1.0的猜测决定攻击进行了改进,使其数据量由O(2~(95))降为O(2~(90)),而计算复杂度由O(2~(224))略微提高到O(2~(224.482)).  相似文献   
29.
Substituted carbonylmanganese cations [Mn(CO)5L]+, where L=py, PPh3 and PPh2Me, readily react with various organoborate anions (tetramethylborate, methyltriphenylborate and tetraphenylborate) in THF solution to afford a mixture of dimanganese carbonyls, hydridomanganese carbonyls and alkylmanganese carbonyls. The formation of the dimanganese carbonyl dimers as well as the hydridomanganese carbonyls suggests the involvement of 19-electron carbonylmanganese radicals that stem from an initial electron transfer. On the other hand, the acetonitrile-substituted analogue [Mn(CO)5(CH3CN)]+ reacts with the same borate anions to afford the alkylated RMn(CO)5, where R=CH3 and C6H5, as the sole carbonylmanganese product. As such, this alkylative annihilation is best formulated as a direct attack on the carbonyl carbon by the borate nucleophile. The two different pathways can be understood in terms of the balance between the electrophilicity of the carbonyl ligand and the electron affinity of the carbonylmanganese cation.  相似文献   
30.
针对传统的ElGamal加密机制不能抵抗自主选择密文攻击的问题,通过引入安全Hash函数和伪随机数发生函数给出了一种新的增强ElGamal加密机制.结果表明,该机制不仅能够抵抗自主选择密文攻击,且由于伪随机数发生函数的引入,解决了加密过程中随机数的暴露问题.该机制加密过程需要两次模幂运算,解密过程仅需一次模幂运算.完全适合于对安全性要求较高但是对系统资源要求消耗低的应用环境.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号