全文获取类型
收费全文 | 1596篇 |
免费 | 225篇 |
国内免费 | 4篇 |
专业分类
化学 | 11篇 |
力学 | 39篇 |
综合类 | 12篇 |
数学 | 82篇 |
物理学 | 404篇 |
无线电 | 1277篇 |
出版年
2024年 | 10篇 |
2023年 | 39篇 |
2022年 | 66篇 |
2021年 | 83篇 |
2020年 | 68篇 |
2019年 | 39篇 |
2018年 | 49篇 |
2017年 | 88篇 |
2016年 | 63篇 |
2015年 | 75篇 |
2014年 | 166篇 |
2013年 | 99篇 |
2012年 | 103篇 |
2011年 | 105篇 |
2010年 | 77篇 |
2009年 | 90篇 |
2008年 | 96篇 |
2007年 | 89篇 |
2006年 | 90篇 |
2005年 | 76篇 |
2004年 | 46篇 |
2003年 | 60篇 |
2002年 | 21篇 |
2001年 | 23篇 |
2000年 | 21篇 |
1999年 | 22篇 |
1998年 | 18篇 |
1997年 | 12篇 |
1996年 | 12篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有1825条查询结果,搜索用时 15 毫秒
41.
42.
针对图像加密,提出了一种基于Logistic映射和z-映射的图像分组加密算法,该算法在每一轮迭代中,交替使用矩阵置乱、非线性数值替换和数值关联混迭三级操作。经大量实验验证,该算法能够有效抵抗明文攻击、差分攻击、统计分析,密钥空间较大,因而安全性较高,并且加解密速度相当快,适用于数据存储。 相似文献
43.
44.
45.
使用Unicode的主要意义在于可以满足跨平台、跨语言的文本处理和转换。为了提高文本信息在传输中的安全,可采用文本的Unicode编码嵌入图像并进行图像加密的方法,由于文本信息与图像信息在计算机中的存储表达均采用二进制,将文本信息嵌入无规则的图像中,再对图像进行读取,在未知文本位置及编码结构的情况下是难以与像素信息加以区分的。实践证明使用Logistic混沌理论进行图像加密可以达到比较理想的效果,应用图像加密手段加密文本信息可以有效提高信息的安全性。 相似文献
46.
The dynamic string motion, which displacement is unilaterally constrained by the rigid termination condition of an arbitrary geometry has been simulated and analyzed. The treble strings of a grand piano usually terminate at a capo bar, which is situated above the strings. The apex of a V-shaped section of the capo bar defines the end of the speaking length of the strings. A numerical calculation based on the traveling wave solution is proposed for modeling the nonlinearity inducing interactions between the vibrating string and the contact condition at the point of string termination. It was shown that the lossless string vibrates in two distinct vibration regimes. In the beginning the string starts to interact in a nonlinear fashion with the rigid terminator, and the resulting string motion is aperiodic. Consequently, the spectrum of the string motion depends on the amplitude of string vibrations, and its spectral structure changes continuously with the passage of time. The duration of that vibration regime depends on the geometry of the terminator. After some time of aperiodic vibration, the string vibrations settle in a periodic regime where the resulting spectrum remains constant. 相似文献
47.
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images is proposed in this paper. In order to produce a compliant codestream, a 2-byte block encryption procedure including bit-wise exclusive OR and cyclic rotation operations is investigated. Moreover, a repeatedly encryption process is adopted to eliminate the undesirable marker codes during encryption. The repeatedly encryption process only introduces a negligible computational overhead. Both simulations and analysis show that the proposed algorithm is of high security and simplicity. Therefore, these good properties make the algorithm efficient to process and useful for image applications. 相似文献
48.
基于离散对数的EIGamal加密算法体制,提出一种匿名的叛逆者追踪方案。在此方案中,广播信息通过对称加密算法加密后广播给用户,而加密使用的会话密钥是在注册用户通过匿名身份验证后,通过数据提供商发送的数据头传送给用户。由性能分析可知,该方案不仅具有用户的匿名安全性、可撤销性与可恢复性的特点,还能够抵抗线性组合攻击。 相似文献
49.
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security. 相似文献
50.
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is proposed. Two main objectives have guided the design of this scheme: (a) robustness against the most known type of attacks (statistical, chosen/known plaintext, ciphertext-only and brute force attacks) and (b) efficiency in terms of computational complexity (i.e., execution time reduction) in order to meet recent mobiles’ applications’ requirements. First, a dynamic key, changed for every input image is generated and used as the basis to construct the substitution and diffusion processes. Then, the encryption process is performed by the transmitter based on a non-linear S-box (substitution) and a matrix multiplication (diffusion), applied on each sub-matrix of the image. At the destination side, decryption is applied in the reverse order. We have conducted several series of experiments to evaluate the effectiveness of the proposed scheme. The obtained results validated the robustness of our scheme against all considered types of attacks and showed an improvement in terms of execution time reduction compared to the recent existed image-encryption schemes. 相似文献