首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   547篇
  免费   82篇
  国内免费   15篇
化学   31篇
晶体学   1篇
力学   12篇
综合类   55篇
数学   210篇
物理学   335篇
  2023年   12篇
  2022年   46篇
  2021年   39篇
  2020年   14篇
  2019年   26篇
  2018年   11篇
  2017年   41篇
  2016年   28篇
  2015年   16篇
  2014年   38篇
  2013年   27篇
  2012年   39篇
  2011年   21篇
  2010年   27篇
  2009年   36篇
  2008年   41篇
  2007年   28篇
  2006年   36篇
  2005年   26篇
  2004年   16篇
  2003年   21篇
  2002年   14篇
  2001年   11篇
  2000年   3篇
  1999年   4篇
  1998年   4篇
  1997年   1篇
  1996年   4篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1991年   3篇
  1989年   1篇
  1984年   2篇
  1983年   1篇
  1959年   1篇
排序方式: 共有644条查询结果,搜索用时 15 毫秒
1.
Ying Tsung Lu  Sien Chi 《Optik》2003,114(4):161-167
This study presents a compact optical configuration that can generate a multiplex dot-matrix hologram with complex interlaced images for anti-counterfeiting applications on valuable paper. Varying the orientation of the interference plane can enable the multiplex hologram to be recorded without changing the interference angle of two laser beams. With its simple asymmetric optical setup, a multiplex hologram with many interlaced images can be efficiently fabricated, increasing the cost of imitation. Experimental details of the asymmetric optical setup are also described.  相似文献   
2.
证券价格按几何布朗运动变化的微观解释   总被引:10,自引:1,他引:9  
金融市场研究中经常不加解释地假设证券价格按几何布朗运动变化 .本文通过假定投资者要求来自证券的期望收益率与证券价格无关 ,在理想市场的前提条件下 ,对证券价格运动将遵循有漂移率的几何布朗运动给予严格的证明 .  相似文献   
3.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations have confirmed the validity of the proposed encryption scheme and simple decryption architecture.  相似文献   
4.
从现行典型园区网络安全设计方案入手,结合其在安全防范解决方案上存在的问题,提出了一种网络主动安全模型;在全局网络安全认识的基础上.阐述了模型组成部件的功能定义和网络主动安全实现流程;采用统一网络入口认证、网络知识发现及资源有效控制、沟通等手段,解决了现行网络安全设计中存在的恶意攻击行为源头定位困难,以及信息安全司法取证不准、网络资源安全被动防护、网络灾难快速反映能力差等问题.实验结果表明,该设计方案具有较好的可行性和实用性.  相似文献   
5.
In order to contribute to the valorisation of wild fungi whose nutritional potential, although considerable, is not sufficiently known in some countries such as Togo, a study has been carried out on Russula species. The diversity of Russula species from Alédjo Wildlife Reserve has been assessed using a focused inventory in woodlands dominated by Isoberlinia doka Craib & Stapf, Isoberlinia tomentosa (Harms) Craib & Stapf, Monotes kerstingii Gilg, Uapaca togoensis Pax and gallery forests dominated by Berlinia grandiflora (Vahl) Hutch & Dalz and Uapaca guineensis Müll. Ethnomycological surveys have been carried out among Tém and Kabyè, two riparian ethnic groups that are mainly represented. Biochemical analyses have been carried out using the AOAC method. Fifteen (15) taxa of edible Russula species are commonly used by Tém and Kabyè people living along the Alédjo Wildlife Reserve among which thirteen (13) taxa have been identified up to species level. R. oleifera is eaten by all interviewed people in both sociolinguistic groups (Fr = 100%) followed by R. compressa (Fr = 92.31%), R. ochrocephala (Fr = 87.18%) among Tém people and R. ochrocephala (Fr = 91.67%), R. compressa (Fr = 83.33%) among Kabyè people. Five (05) new species of edible Russula have been identified for the first time in Togo. The Russula species analysed have been rich in macronutrients with contents ranging from 2.88 g/100 g of dw for fat to 65.83 g/100 g of dw for total carbohydrates. In addition, these Russula species have shown a relatively high mineral content with contents ranging from 405.70 mg/100 g of dw for Ca to 2784 mg/100 g of dw for K. Furthermore, the results have revealed that Russula species analysed are a source of energy with 309.50 Kcal/100 g of dw. The edible Russula species analysed can thus contribute to food security in Togo.  相似文献   
6.
张锋  李凯亮 《应用声学》2015,23(11):44-44
针对石化厂区在生产过程中可能发生有毒气体泄露带来的生产安全问题,构建了石化厂区有毒气体在线监测平台。该平台是由PC监控中心、网络监控中心、ARM便携式终端、安卓手机客户端组成。实现对石化厂区中有毒气体及环境参数的实时、在线监测和预警,使生产管理人员掌握石化厂区的有毒气体实时动态信息,对可能引发危险事故的因素及时排除,把危险控制在始发阶段,以实现化工生产的安全、持续、高效进行。测试结果表明该平台能实现所设计的各项功能,并具有良好的稳定性、安全性和实用性。  相似文献   
7.
该文对苯二氮类和吩噻嗪类镇静安眠药样品的红外光谱数据进行采集,构建了不同数据分类模型并对比了不同波段光谱数据集对其分析准确率的影响。结果表明,借助贝叶斯判别分析的基于全波段数据集的二阶导数模型分类效果优于其他单一模型,对于苯二氮类和吩噻嗪类两个不同类型精神药物的总体分类准确率达92.7%。借助贝叶斯判别分析的基于全波段和指纹区融合数据集的二阶导数融合模型分类效果最佳,对苯二氮类和吩噻嗪类两个不同类型精神药物的总体分类准确率达到100%;对苯二氮类和吩噻嗪类中不同种类精神药物的总体分类准确率则分别达到96.7%和100%。该研究实现了不同类型及同一类型不同种类镇静安眠药的快速准确定性分析,为此类管制类药物走私案件的准确定性提供了一定的技术支持。  相似文献   
8.
食品安全分析样品前处理-快速检测联用方法研究进展   总被引:4,自引:0,他引:4  
黄怡淳  丁炜炜  张卓旻  李攻科 《色谱》2013,31(7):613-619
综述了近年来传感器、可视化分析、便携光谱、酶联免疫检测及便携气相色谱等食品安全快速检测技术的研究现状,以及食品安全分析中样品前处理-快速检测联用技术的研究进展,为发展选择性好、准确度高、可定量的新型食品安全快速检测技术提供参考。  相似文献   
9.
After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms, devices and systems. Moreover, we study existing trends, and establish a roadmap for future research in these areas.  相似文献   
10.
In present times, barcode decoders on mobile phones can extract the data content of QR codes. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. This new scheme designs the triple module groups based on the concept of the error correction capability. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. This designed scheme can provide secure and reliable applications for the QR system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号