全文获取类型
收费全文 | 371篇 |
免费 | 28篇 |
国内免费 | 2篇 |
专业分类
化学 | 1篇 |
综合类 | 1篇 |
数学 | 53篇 |
物理学 | 91篇 |
无线电 | 255篇 |
出版年
2023年 | 1篇 |
2022年 | 6篇 |
2021年 | 5篇 |
2020年 | 12篇 |
2019年 | 5篇 |
2018年 | 8篇 |
2017年 | 7篇 |
2016年 | 9篇 |
2015年 | 4篇 |
2014年 | 39篇 |
2013年 | 15篇 |
2012年 | 25篇 |
2011年 | 17篇 |
2010年 | 26篇 |
2009年 | 36篇 |
2008年 | 35篇 |
2007年 | 25篇 |
2006年 | 19篇 |
2005年 | 14篇 |
2004年 | 10篇 |
2003年 | 17篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 11篇 |
1999年 | 7篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有401条查询结果,搜索用时 794 毫秒
51.
利用Bit承诺,单向函数和数字签名算法,对一种安全电子拍卖模型进行改进,提出了一种安全、简单、高效的密封式电子拍卖方案.它可以在注册中心离线的情况下,最大程度地缩小拍卖行的权力实现公共认证.同时,该方案不仅能对除中标者外的其他所有投标者的投标价进行保密,而且能有效防止拍卖行不诚实的行为. 相似文献
52.
We have investigated the return-to-zero (RZ) pulse duty cycle for single-channel Standard Single mode fiber (SSMF), Non Zero Dispersion shifted fibers (normal NZDSF and anomalous NZDSF fiber) for 10 Gbps optical fiber communication system. We give a comprehensive look on the behavior of variable duty cycle optical RZ pulse indicating that lowest bit error rate for duty cycle 0.8 among the duty cycle values 0.2, 0.4, 0.6 and 0.8 investigated for the case of SSMF. The single repeaterless mode fiber length is increased from existing 55 km at duty cycle 0.2 to fiber length 85 km by keeping duty cycle at 0.8. The result is also emphasized through the 10 dB Q value improvement and corresponding improvement in average eye opening diagram. The normal NZDSF show similar improvement but at greater fiber length, it offers BER 10−9 at length 110 km with duty cycle 0.2. NZDSF operating length can further be increased to length 160 km by keeping duty cycle 0.8. The corresponding 8 dB Q value improvement and Average eye opening improvement also supports the result through its graphical variation. Thirdly Anomalous NZDSF for same optical communication system showed that 0.2 duty cycle value give operational length of 130 km which could be extended to 160 km if 0.8 duty cycle is kept. The corresponding 8 dB Q value improvement, average eye-opening improvement endorsed the fact in the graphs. 相似文献
53.
Michal P. Dlubek Andrew J. Phillips Eric C. Larkins 《Optical and Quantum Electronics》2008,40(8):561-575
A new and straightforward optical signal quality metric, which is based on the approximation of the analytical probability
density function by its Laguerre expansion, is proposed. This expansion uses statistical moments to approximate the true statistics,
but, unlike the well-known Gaussian approximation, higher order moments can be used as well. The quality of the proposed metric
is discussed and the metric is compared with the Gaussian approximation. It is shown that the new metric provides not only
a good estimation of the bit error rate in the range of practical interest but, contrary to the Gaussian approximation, correctly
estimates optimum decision threshold and accurately pictures the shape of the noise distribution. 相似文献
54.
Gains in storage density in magnetic recording have fundamentally been achieved by scaling—reduced geometrical dimensions under the assumption that the recording physics does not change if all dimensions are scaled appropriately. It is becoming clear that evidence of the breakdown of scaling is now seen. We will here discuss ways to break the constraints on magnetic recording set by scaling. In particular, we will discuss energy-assisted recording, domain-wall-assisted recording, and bit-patterned media, with some emphasis on recording system considerations. 相似文献
55.
The haploid–diploid cycle where, under unfavorable conditions the population becomes diploid, is modeled by a Monte-Carlo method in the framework of the Jan–Stauffer–Moseley hypothesis. Diploidy and sex may have first arisen as a way to escape death, when a simple unicellular individual is threatened by too many deleterious mutations. Using a bit string model, we find that in a system where competition is present (through the Verhulst factor), diploids dominate. In this case the transition from haploid to essentially diploid population takes place in a short time interval reminiscent of phase transitions in physical systems. 相似文献
56.
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids’ binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment. 相似文献
57.
Spatial and temporal inconsistency of depth video deteriorates encoding efficiency in three dimensional video systems. A depth video processing algorithm based on human perception is presented. Firstly, a just noticeable rendering distortion (JNRD) model is formulated by combining the analyses of the influence of depth distortion on virtual view rendering with human visual perception characteristics. Then, depth video is processed based on the JNRD model from two aspects, spatial and temporal correlation enhancement. During the process of spatial correlation enhancement, depth video is segmented into edge, foreground, and background regions, and smoothened by Gaussian and mean filters. The operations of the temporal correlation enhancement include temporal–spatial transpose (TST), temporal smoothing filter and inverse TST. Finally, encoding and virtual view rendering experiments are conducted to evaluate the proposed algorithm. Experimental results show that the proposed algorithm can greatly reduce the bit rate while it maintains the quality of virtual view. 相似文献
58.
In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks. 相似文献
59.
To facilitate the diversity of network and end-user devices, bit allocation technology must be combined with scalable high efficiency video coding (SHVC) to achieve continuous bitrate variation. However, to date, the multilayer coding feature in SHVC has not been fully utilized. In this paper, a bit allocation algorithm is proposed for the enhancement layer in SHVC. The algorithm includes two parts: a bit allocation method for the initial frame and another for subsequent frames. The bit allocation method for the initial frame consists of a bit allocation factor model constructed based on investigation of the influence of the initial target bitrate on the overall coding performance. For the bit allocation of the subsequent frames, alternate GOP coding is designed and implemented to fully exploit the inter layer correlation. In addition, an adaptive frame layer bit allocation ratio model is deduced according to the rate distortion optimization theory. Experimental results show that the proposed algorithm can improve PSNR by 0.44 dB and 0.41 dB under low delay and random-access configurations, respectively, and achieve high bitrate control accuracy. The algorithm also outperforms the state-of-the-art algorithms in term of PSNR improvement. 相似文献
60.
Understanding how and why consumers engage with mobile apps is critical to the success of ubiquitous mobile marketing. This study proposed and tested a structural model to investigate the antecedents and consequences of mobile app engagement. Results show that time convenience, interactivity, and compatibility positively influenced mobile app engagement, in turn leading to strong relationship commitment and self-brand connections. Furthermore, informational and experiential mobile apps moderated the effects of time convenience, interactivity, and compatibility on mobile app engagement. Theoretical and practical implications for effective app engagement strategies are discussed. 相似文献