全文获取类型
收费全文 | 1009篇 |
免费 | 161篇 |
国内免费 | 36篇 |
专业分类
化学 | 33篇 |
力学 | 5篇 |
综合类 | 20篇 |
数学 | 118篇 |
物理学 | 140篇 |
无线电 | 890篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 15篇 |
2021年 | 19篇 |
2020年 | 26篇 |
2019年 | 22篇 |
2018年 | 14篇 |
2017年 | 22篇 |
2016年 | 38篇 |
2015年 | 36篇 |
2014年 | 55篇 |
2013年 | 50篇 |
2012年 | 61篇 |
2011年 | 74篇 |
2010年 | 67篇 |
2009年 | 77篇 |
2008年 | 80篇 |
2007年 | 85篇 |
2006年 | 86篇 |
2005年 | 71篇 |
2004年 | 46篇 |
2003年 | 46篇 |
2002年 | 36篇 |
2001年 | 36篇 |
2000年 | 38篇 |
1999年 | 23篇 |
1998年 | 24篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有1206条查询结果,搜索用时 15 毫秒
911.
912.
Averbuch Amir Hulata Eyal Zheludev Valery Kozlov Inna 《Multidimensional Systems and Signal Processing》2001,12(1):9-31
In this paper we propose a robustalgorithm that solves two related problems: 1) Classificationof acoustic signals emitted by different moving vehicles. Therecorded signals have to be assigned to pre-existing categoriesindependently from the recording surrounding conditions. 2) Detectionof the presence of a vehicle in a certain class via analysisof its acoustic signature against the existing database of recordedand processed acoustic signals. To achieve this detection withpractically no false alarms we construct the acoustic signatureof a certain vehicle using the distribution of the energies amongblocks which consist of wavelet packet coefficients. We allowno false alarms in the detection even under severe conditions;for example when the acoustic recording of target object is asuperposition of the acoustics emitted from other vehicles thatbelong to other classes. The proposed algorithm is robust evenunder severe noise and a range of rough surrounding conditions.This technology, which has many algorithmic variations, can beused to solve a wide range of classification and detection problemswhich are based on acoustic processing which are not relatedto vehicles. These have numerous applications. 相似文献
913.
ElGamal数字签名方案的发展与应用 总被引:3,自引:0,他引:3
ElGamal数字签名方案作为目前最为重要的数字签名方案之一,极大地促进了现代密码学的发展。分析了几个主要的ElGamal型数字签名方案的优缺点,并阐述了ElGamal型数字签名方案的一些应用状况。 相似文献
914.
915.
V. Dzhunushaliev 《General Relativity and Gravitation》2001,33(1):95-110
Some nondifferentiable quantities (for example, the metric signature) can be the independent physical degrees of freedom. It is supposed that in quantum gravity these degrees of freedom can fluctuate. Two examples of such quantum fluctuation are considered: a quantum interchange of the sign of two components of the 5D metric and a quantum fluctuation between Euclidean and Lorentzian metrics. The first case leads to a spin-like structure on the throat of a composite wormhole and to a possible inner structure of the string. The second case leads to a quantum birth of the non-singular Euclidean Universe with frozen 5th dimension. The probability for such quantum fluctuations is connected with an algorithmical complexity of the Einstein equations. 相似文献
916.
Eu超形变带的自旋指定 总被引:1,自引:1,他引:0
系统分析了142,143,144,147Eu中的8条超形变带.在对跃迁能量进行光滑化处理,采用ab拟合或改进的ab拟合,确切地指定了其中7条超形变带的自旋值.首次指出了147Eu的1,5两带和2,3两带可能都分别构成旋称伙伴带,且均为K=1/2带,脱耦合常数约为–1.讨论了它们可能的组态结构. 相似文献
917.
R. Scheidler 《Designs, Codes and Cryptography》2001,22(3):239-264
We describe severalcryptographic schemes in quadratic function fields of odd characteristic.In both the real and the imaginary representation of such a field,we present a Diffie-Hellman-like key exchange protocol as wellas a public-key cryptosystem and a signature scheme of ElGamaltype. Several of these schemes are improvements of systems previouslyfound in the literature, while others are new. All systems arebased on an appropriate discrete logarithm problem. In the imaginarysetting, this is the discrete logarithm problem in the idealclass group of the field, or equivalently, in the Jacobian ofthe curve defining the function field. In the real case, theproblem in question is the task of computing distances in theset of reduced principal ideals, which is a monoid under a suitableoperation. Currently, the best general algorithms for solvingboth discrete logarithm problems are exponential (subexponentialonly in fields of high genus), resulting in a possibly higherlevel of security than that of conventional discrete logarithmbased schemes. 相似文献
918.
一种信号分选和特征提取联合处理的雷达信号分析方法研究 总被引:2,自引:0,他引:2
研究广度优先搜索邻居的聚类算法和直方图法用于雷达信号分选和特征提取的原理和方法,并将两者相结合用于雷达信号分析使分选和特征提取更加准确.仿真实验证明联合处理法是高效和实用的. 相似文献
919.
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature. 相似文献
920.
洋葱路由技术是指一个在公用网络上广泛运用的基于P2P的匿名通信技术,它使得攻击者既不能进行窃听,也不能实施流量分析,实现了信息发送者和接收者的匿名性,也保护了信息内容本身的安全。针对当下洋葱路由实现的基本模型,结合群签名技术和分布式的概念,文中提出了一种基于群签名的分布式洋葱路由方案,并对其性能做了简单的分析,证明确实在路径的隐蔽性、系统的安全性等方面都有了较好的提升。 相似文献