全文获取类型
收费全文 | 521篇 |
免费 | 139篇 |
国内免费 | 20篇 |
专业分类
化学 | 31篇 |
力学 | 14篇 |
综合类 | 14篇 |
数学 | 425篇 |
物理学 | 196篇 |
出版年
2023年 | 12篇 |
2022年 | 28篇 |
2021年 | 35篇 |
2020年 | 27篇 |
2019年 | 22篇 |
2018年 | 17篇 |
2017年 | 26篇 |
2016年 | 30篇 |
2015年 | 16篇 |
2014年 | 50篇 |
2013年 | 25篇 |
2012年 | 32篇 |
2011年 | 42篇 |
2010年 | 48篇 |
2009年 | 37篇 |
2008年 | 37篇 |
2007年 | 38篇 |
2006年 | 40篇 |
2005年 | 17篇 |
2004年 | 8篇 |
2003年 | 17篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 10篇 |
1999年 | 3篇 |
1998年 | 14篇 |
1997年 | 5篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
排序方式: 共有680条查询结果,搜索用时 15 毫秒
121.
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack. 相似文献
122.
123.
团队中,个体知识共享行为的回报往往来自第三方而非受助者,而以直接互惠为视角的知识共享研究却不足以解释此类现象。采用基于计算机仿真实验方法,通过赋予Agent记忆、推理、决策和沟通等能力,研究受表型背叛、组织信任氛围及声誉传播机制影响下,间接互惠机制对团队大范围知识共享行为的维系机理。研究发现,由于辨别者的存在,即使无条件共享者会成为绝对多数,隐藏者并不会大量侵入群体。这意味着间接互惠机制维系了团队大范围知识共享行为。在低的组织信任氛围水平下,辨别者和隐藏者虽然能够共存,团队内的知识共享行为却没有出现。即使只有少数成员能观察到周围同事的知识共享行为,只要声誉信息能够有效传播,间接互惠对广泛知识共享行为的维系作用就能够发挥。 相似文献
124.
为有效改善宁波地铁企业信息系统中各个信息系统间信息的有效互通、数据共享、统一管理等问题, 结合宁波市轨道交通的规划、建设、运营和开发“四位一体”战略, 设计了面向智慧地铁的信息系统架构, 整个架构的内容包括基础设施、基础平台、一体化的信息系统平台、信息门户及网站、微信、移动APP等公众服务平台, 并设计配置了信息化管理体系, 进而实现异构、分散的应用系统之间的有效集成, 提升信息化系统资源协同工作和业务管理的效率. 相似文献
125.
Parameter estimation of continuous variable quantum key distribution system via artificial neural networks
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret keys.However,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the present CVQKD system.In this paper,we suggest an approach for parameter estimation of the CVQKD system via artificial neural networks(ANN),which can be merged in post-processing with less additional devices.The ANN-based training scheme,enables key prediction without exposing any raw key.Experimental results show that the error between the predicted values and the true ones is in a reasonable range.The CVQKD system can be improved in terms of the secret key rate and the parameter estimation,which involves less additional devices than the traditional CVQKD system. 相似文献
126.
Cryptanalysis and improvement of a quantum secret sharing scheme based on χ-type entangled states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on χ-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement. 相似文献
127.
Temperature dependence of the P-hit single event transient pulse width in a three-transistor inverter chain
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
A comparison of the temperature dependence of the P-hit single event transient (SET) in a two-transistor (2T) inverter with that in a three-transistor (3T) inverter is carried out based on a three-dimensional numerical simulation.Due to the significantly distinct mechanisms of the single event change collection in the 2T and the 3T inverters,the temperature plays different roles in the SET production and propagation.The SET pulse will be significantly broadened in the 2T inverter chain while will be compressed in the 3T inverter chain as temperature increases.The investigation provides a new insight into the SET mitigation under the extreme environment,where both the high temperature and the single event effects should be considered.The 3T inverter layout structure (or similar layout structures) will be a better solution for spaceborne integrated circuit design for extreme environments. 相似文献
128.
Cryptanalysis and improvement of a quantum secret sharing scheme based on x-type entangled states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on χ-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice’s secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement. 相似文献
129.
We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitaryoperation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique. 相似文献
130.
A two fluid continuum model is applied to the simulation of steady fully developed particle/fluid flow in a vertical circular pipe. Both closed form and numerical solutions are obtained to the associated governing equations. These solutions are compared to the predictions of another two fluid continuum model. These comparisons are used to illustrate the differences in the predictions of two widely used models, even in the fundamental problem of steady flow in a circular pipe. 相似文献