首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   521篇
  免费   139篇
  国内免费   20篇
化学   31篇
力学   14篇
综合类   14篇
数学   425篇
物理学   196篇
  2023年   12篇
  2022年   28篇
  2021年   35篇
  2020年   27篇
  2019年   22篇
  2018年   17篇
  2017年   26篇
  2016年   30篇
  2015年   16篇
  2014年   50篇
  2013年   25篇
  2012年   32篇
  2011年   42篇
  2010年   48篇
  2009年   37篇
  2008年   37篇
  2007年   38篇
  2006年   40篇
  2005年   17篇
  2004年   8篇
  2003年   17篇
  2002年   14篇
  2001年   12篇
  2000年   10篇
  1999年   3篇
  1998年   14篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   4篇
  1993年   2篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1987年   2篇
  1986年   1篇
排序方式: 共有680条查询结果,搜索用时 15 毫秒
121.
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack.  相似文献   
122.
吴翠莲  王谦  田歆  蔡笠 《运筹与管理》2017,26(7):117-124
如何实现团购网站和团购参与商家之间的双赢是我国网络团购目前面临的一大挑战性问题。结合我国网络团购的特点,构建团购网站和商家之间定价与收益分配的博弈模型,针对博弈结果运用纳什谈判模型给出协调策略。最后,通过数值算例分析主要参数的变化对价格与收益的影响。结果表明,敏感市场的规模和团购网站的广告效应越大、商品的单位成本越小、开展网络团购对商家和团购网站越有利。  相似文献   
123.
林润辉  米捷 《运筹与管理》2017,26(9):157-165
团队中,个体知识共享行为的回报往往来自第三方而非受助者,而以直接互惠为视角的知识共享研究却不足以解释此类现象。采用基于计算机仿真实验方法,通过赋予Agent记忆、推理、决策和沟通等能力,研究受表型背叛、组织信任氛围及声誉传播机制影响下,间接互惠机制对团队大范围知识共享行为的维系机理。研究发现,由于辨别者的存在,即使无条件共享者会成为绝对多数,隐藏者并不会大量侵入群体。这意味着间接互惠机制维系了团队大范围知识共享行为。在低的组织信任氛围水平下,辨别者和隐藏者虽然能够共存,团队内的知识共享行为却没有出现。即使只有少数成员能观察到周围同事的知识共享行为,只要声誉信息能够有效传播,间接互惠对广泛知识共享行为的维系作用就能够发挥。  相似文献   
124.
为有效改善宁波地铁企业信息系统中各个信息系统间信息的有效互通、数据共享、统一管理等问题, 结合宁波市轨道交通的规划、建设、运营和开发“四位一体”战略, 设计了面向智慧地铁的信息系统架构, 整个架构的内容包括基础设施、基础平台、一体化的信息系统平台、信息门户及网站、微信、移动APP等公众服务平台, 并设计配置了信息化管理体系, 进而实现异构、分散的应用系统之间的有效集成, 提升信息化系统资源协同工作和业务管理的效率.  相似文献   
125.
罗浩  王一军  叶炜  钟海  毛宜钰  郭迎 《中国物理 B》2022,31(2):20306-020306
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret keys.However,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the present CVQKD system.In this paper,we suggest an approach for parameter estimation of the CVQKD system via artificial neural networks(ANN),which can be merged in post-processing with less additional devices.The ANN-based training scheme,enables key prediction without exposing any raw key.Experimental results show that the error between the predicted values and the true ones is in a reasonable range.The CVQKD system can be improved in terms of the secret key rate and the parameter estimation,which involves less additional devices than the traditional CVQKD system.  相似文献   
126.
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on χ-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.  相似文献   
127.
A comparison of the temperature dependence of the P-hit single event transient (SET) in a two-transistor (2T) inverter with that in a three-transistor (3T) inverter is carried out based on a three-dimensional numerical simulation.Due to the significantly distinct mechanisms of the single event change collection in the 2T and the 3T inverters,the temperature plays different roles in the SET production and propagation.The SET pulse will be significantly broadened in the 2T inverter chain while will be compressed in the 3T inverter chain as temperature increases.The investigation provides a new insight into the SET mitigation under the extreme environment,where both the high temperature and the single event effects should be considered.The 3T inverter layout structure (or similar layout structures) will be a better solution for spaceborne integrated circuit design for extreme environments.  相似文献   
128.
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on χ-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice’s secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement.  相似文献   
129.
We propose a scheme for sharing an arbitrary unknown two-qubit state among three parties by using a four-qubit cluster-class state and a Bell state as a quantum channel. With a quantum controlled phase gate (QCPG) operation and a local unitaryoperation, any one of the two agents has the access to reconstruct the original state if he/she collaborates with the other one, whilst individual agent obtains no information. As all quantum resource can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. Moreover, the present scheme is more feasible with present-day technique.  相似文献   
130.
A two fluid continuum model is applied to the simulation of steady fully developed particle/fluid flow in a vertical circular pipe. Both closed form and numerical solutions are obtained to the associated governing equations. These solutions are compared to the predictions of another two fluid continuum model. These comparisons are used to illustrate the differences in the predictions of two widely used models, even in the fundamental problem of steady flow in a circular pipe.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号