全文获取类型
收费全文 | 982篇 |
免费 | 161篇 |
国内免费 | 36篇 |
专业分类
化学 | 32篇 |
力学 | 5篇 |
综合类 | 20篇 |
数学 | 118篇 |
物理学 | 137篇 |
无线电 | 867篇 |
出版年
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 19篇 |
2020年 | 21篇 |
2019年 | 18篇 |
2018年 | 13篇 |
2017年 | 22篇 |
2016年 | 36篇 |
2015年 | 32篇 |
2014年 | 54篇 |
2013年 | 48篇 |
2012年 | 61篇 |
2011年 | 74篇 |
2010年 | 67篇 |
2009年 | 77篇 |
2008年 | 80篇 |
2007年 | 85篇 |
2006年 | 86篇 |
2005年 | 71篇 |
2004年 | 46篇 |
2003年 | 46篇 |
2002年 | 36篇 |
2001年 | 36篇 |
2000年 | 38篇 |
1999年 | 23篇 |
1998年 | 24篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有1179条查询结果,搜索用时 512 毫秒
71.
Bin Wang 《Optics Communications》2011,284(14):3504-3508
72.
Tzonelih Hwang Song-Kong Chong Yi-Ping Luo Tong-Xuan Wei 《Optics Communications》2011,284(12):3144-3148
Recently, Chong et al. [Opt. Comm. 284, (2011) 893-895] pointed out that a dishonest party in Yang and Wen's arbitrated quantum signature scheme [Opt. Comm. 283, (2010) 3198-3201] is able to reveal the other party's secret key without being detected by using the Trojan-horse attacks. However, the solution to avoid the attack still remains open. This work further points out that in Yang and Wen's scheme, the arbitrator is unable to arbitrate the dispute between two users. Consequently, a user can deny that he/she has signed or verified a signature without performing a Trojan-horse attack. A solution is proposed to solve this problem as well as the open problem mentioned earlier. 相似文献
73.
OSHIMA M TOH Y KOIZUMI M KIMURA A Hatsukawa Y MORIKAWA T NAKAMURA M SUGAWARE M KUSAKARI H 《中国科学:物理学 力学 天文学(英文版)》2011,(Z1)
A new rotational band has been identified and assigned to 188Au for the first time using the 173Yb(19F,4nγ) reaction at the beam energies of 86 and 90 MeV. This band is proposed to be built on the πh9/2 νi13/2 configuration by comparing the band properties with known bands in neighboring nuclei. The prolate-to-oblate shape transition through triaxial shape has been proposed to occur around 188Au for the πh9/2 νi13/2 bands in odd-odd Au isotopes on the basis of total Routhian surface (TRS) calculations. 相似文献
74.
CHEN Liang ZHOU XiaoHong ZHANG YuHu ZHANG ShuangQuan & ZHU LiHua Institute of Modern Physics Chinese Academy of Sciences Lanzhou China Graduate University of Chinese Academy of Sciences Beijing State Key Laboratory of Nuclear Physics Technology School of Physics Peking University Beijing China Institute of Atomic Energy Beijing 《中国科学:物理学 力学 天文学(英文版)》2011,(Z1)
High-spin states in 161Er have been studied experimentally via the 150Nd(16O, 5n) reaction at a beam energy of 86 MeV. Three rotational bands built on the 5/2+[642], 3/2-[521], and 11/2-[505] configurations have been extended up to high-spin states, and particularly, the α = -1/2 branch of the ground state 3/2-[521] band has been revised significantly. It is found that signature inversion occurs in the 3/2-[521] band after the band crossing in 161Er. The systematics of the signature inversion associated wit... 相似文献
75.
为支持高速多址网络中二维图像的传输,Kitayama首次提出码分多址并行图像传输系统的概念.作为码分多址并行图像传输系统的首选光地址码,光正交签名码(OOSPC)是一族具有良好相关性的Hamming重量为k的m×n(0,1)-矩阵.用Θ(m,n,k,λ)表示所有参数为(m,n,k,λ)的OOSPC中码字容量可能的最大值,则称码字容量为Θ(m,n,k,λ)的(m,n,k,λ)-OOSPC是最优的.本文将针对满足下列条件之一的正整数m和n:(1)mn≡8,16(mod 24),gcd(m,n,2)=2,且mn≡16(mod 32)和gcd(m,n,4)=2不同时成立,其中m和n的所有奇素因子均模6余1;(2)mn≡0(mod 24)且gcd(m,n,6)=2,证明Θ(m,n,4,1)=|mn-1/12|,即构造码字容量为|mn-1/12|的最优(m,n,4,1)-OOSPC. 相似文献
76.
Since Multivatriate Quadratic (MQ)-based Public Key Cryptosystem (MPKC) has been one of the hot research fields of post-quantum cryptography, it becomes important to analyze the security of new MPKC schemes. Wang et al. proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus (HTTM) in 2011. For this extended MQ-based signature, we can transform it into an SFLASH variant by splitting and merging HT transformation, and solve an equivalent private key corresponding to the public key of HTTM. Thus, the adversary can forge legitimate signature for any message by using this equivalent private key. 相似文献
77.
78.
研究了定义在有限区间(0,l)上的具有一般分离型边条件的不定Sturm—Liouville算子的特征函数的振荡问题.利用Prufer变换,给出了上述Sturm-Liouville算子特征值的符号指标的具体形式;得到了特征值的符号指标与Weyl函数以及Prufer角在该特征值处的罗朗展式(泰勒展式)的首项系数的符号之间的关系;最后,在上述两个结果的基础上给出了上述Sturm—Liouville算子的第n个正特征值所对应的特征函数在[0,l]内的零点个数的计算公式. 相似文献
79.
Zhang Fangguo Wang Changjie Wang Yumin 《电子科学学刊(英文版)》2002,19(4):369-374
E-cash is a type of very important electronic payment systems.The complete anonymity of E-cash can be used for criminal activities,so E-cash should be anonymity controlled.Moreover,Elliptic Curve Cryptography(ECC)has been regard as the mainstream of current public cryptography.In this paper,a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed,and its security and efficiency are analyzed.In our scheme,the coin tracing ,and owner tracing can be implemented. 相似文献
80.
John P. Robinson 《Journal of Electronic Testing》1992,3(1):9-16
Test data reduction for digital systems is often accomplished through the use of a feedback shift register. This method, known as signature analysis, can exhibit error masking or aliasing. Recent analysis has shown that the use of a primitive polynomial for the register feedback can reduce the probability of aliasing. In this work we demonstrate that not all primitive polynomials are created equal. Some primitive polynomials can have very large transients in their aliasing probability. For example, 1 +X
13 +X
33 can exhibit an aliasing probability more than a million times larger than its asymptotic value of 2–33. An evaluation procedure is presented which can identify polynomials with good transient characteristics. Some recommended feedback polynomials are given. 相似文献