首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   371篇
  免费   28篇
  国内免费   2篇
化学   1篇
综合类   1篇
数学   53篇
物理学   91篇
无线电   255篇
  2023年   1篇
  2022年   6篇
  2021年   5篇
  2020年   12篇
  2019年   5篇
  2018年   8篇
  2017年   7篇
  2016年   9篇
  2015年   4篇
  2014年   39篇
  2013年   15篇
  2012年   25篇
  2011年   17篇
  2010年   26篇
  2009年   36篇
  2008年   35篇
  2007年   25篇
  2006年   19篇
  2005年   14篇
  2004年   10篇
  2003年   17篇
  2002年   14篇
  2001年   12篇
  2000年   11篇
  1999年   7篇
  1998年   2篇
  1997年   4篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1993年   3篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
排序方式: 共有401条查询结果,搜索用时 794 毫秒
51.
利用Bit承诺,单向函数和数字签名算法,对一种安全电子拍卖模型进行改进,提出了一种安全、简单、高效的密封式电子拍卖方案.它可以在注册中心离线的情况下,最大程度地缩小拍卖行的权力实现公共认证.同时,该方案不仅能对除中标者外的其他所有投标者的投标价进行保密,而且能有效防止拍卖行不诚实的行为.  相似文献   
52.
Manjit Singh  R.S. Kaler 《Optik》2008,119(8):359-364
We have investigated the return-to-zero (RZ) pulse duty cycle for single-channel Standard Single mode fiber (SSMF), Non Zero Dispersion shifted fibers (normal NZDSF and anomalous NZDSF fiber) for 10 Gbps optical fiber communication system. We give a comprehensive look on the behavior of variable duty cycle optical RZ pulse indicating that lowest bit error rate for duty cycle 0.8 among the duty cycle values 0.2, 0.4, 0.6 and 0.8 investigated for the case of SSMF. The single repeaterless mode fiber length is increased from existing 55 km at duty cycle 0.2 to fiber length 85 km by keeping duty cycle at 0.8. The result is also emphasized through the 10 dB Q value improvement and corresponding improvement in average eye opening diagram. The normal NZDSF show similar improvement but at greater fiber length, it offers BER 10−9 at length 110 km with duty cycle 0.2. NZDSF operating length can further be increased to length 160 km by keeping duty cycle 0.8. The corresponding 8 dB Q value improvement and Average eye opening improvement also supports the result through its graphical variation. Thirdly Anomalous NZDSF for same optical communication system showed that 0.2 duty cycle value give operational length of 130 km which could be extended to 160 km if 0.8 duty cycle is kept. The corresponding 8 dB Q value improvement, average eye-opening improvement endorsed the fact in the graphs.  相似文献   
53.
A new and straightforward optical signal quality metric, which is based on the approximation of the analytical probability density function by its Laguerre expansion, is proposed. This expansion uses statistical moments to approximate the true statistics, but, unlike the well-known Gaussian approximation, higher order moments can be used as well. The quality of the proposed metric is discussed and the metric is compared with the Gaussian approximation. It is shown that the new metric provides not only a good estimation of the bit error rate in the range of practical interest but, contrary to the Gaussian approximation, correctly estimates optimum decision threshold and accurately pictures the shape of the noise distribution.  相似文献   
54.
Gains in storage density in magnetic recording have fundamentally been achieved by scaling—reduced geometrical dimensions under the assumption that the recording physics does not change if all dimensions are scaled appropriately. It is becoming clear that evidence of the breakdown of scaling is now seen. We will here discuss ways to break the constraints on magnetic recording set by scaling. In particular, we will discuss energy-assisted recording, domain-wall-assisted recording, and bit-patterned media, with some emphasis on recording system considerations.  相似文献   
55.
The haploid–diploid cycle where, under unfavorable conditions the population becomes diploid, is modeled by a Monte-Carlo method in the framework of the Jan–Stauffer–Moseley hypothesis. Diploidy and sex may have first arisen as a way to escape death, when a simple unicellular individual is threatened by too many deleterious mutations. Using a bit string model, we find that in a system where competition is present (through the Verhulst factor), diploids dominate. In this case the transition from haploid to essentially diploid population takes place in a short time interval reminiscent of phase transitions in physical systems.  相似文献   
56.
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids’ binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment.  相似文献   
57.
Spatial and temporal inconsistency of depth video deteriorates encoding efficiency in three dimensional video systems. A depth video processing algorithm based on human perception is presented. Firstly, a just noticeable rendering distortion (JNRD) model is formulated by combining the analyses of the influence of depth distortion on virtual view rendering with human visual perception characteristics. Then, depth video is processed based on the JNRD model from two aspects, spatial and temporal correlation enhancement. During the process of spatial correlation enhancement, depth video is segmented into edge, foreground, and background regions, and smoothened by Gaussian and mean filters. The operations of the temporal correlation enhancement include temporal–spatial transpose (TST), temporal smoothing filter and inverse TST. Finally, encoding and virtual view rendering experiments are conducted to evaluate the proposed algorithm. Experimental results show that the proposed algorithm can greatly reduce the bit rate while it maintains the quality of virtual view.  相似文献   
58.
In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks.  相似文献   
59.
To facilitate the diversity of network and end-user devices, bit allocation technology must be combined with scalable high efficiency video coding (SHVC) to achieve continuous bitrate variation. However, to date, the multilayer coding feature in SHVC has not been fully utilized. In this paper, a bit allocation algorithm is proposed for the enhancement layer in SHVC. The algorithm includes two parts: a bit allocation method for the initial frame and another for subsequent frames. The bit allocation method for the initial frame consists of a bit allocation factor model constructed based on investigation of the influence of the initial target bitrate on the overall coding performance. For the bit allocation of the subsequent frames, alternate GOP coding is designed and implemented to fully exploit the inter layer correlation. In addition, an adaptive frame layer bit allocation ratio model is deduced according to the rate distortion optimization theory. Experimental results show that the proposed algorithm can improve PSNR by 0.44 dB and 0.41 dB under low delay and random-access configurations, respectively, and achieve high bitrate control accuracy. The algorithm also outperforms the state-of-the-art algorithms in term of PSNR improvement.  相似文献   
60.
Understanding how and why consumers engage with mobile apps is critical to the success of ubiquitous mobile marketing. This study proposed and tested a structural model to investigate the antecedents and consequences of mobile app engagement. Results show that time convenience, interactivity, and compatibility positively influenced mobile app engagement, in turn leading to strong relationship commitment and self-brand connections. Furthermore, informational and experiential mobile apps moderated the effects of time convenience, interactivity, and compatibility on mobile app engagement. Theoretical and practical implications for effective app engagement strategies are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号