全文获取类型
收费全文 | 2078篇 |
免费 | 294篇 |
国内免费 | 17篇 |
专业分类
化学 | 65篇 |
晶体学 | 3篇 |
力学 | 29篇 |
综合类 | 55篇 |
数学 | 103篇 |
物理学 | 412篇 |
无线电 | 1722篇 |
出版年
2025年 | 9篇 |
2024年 | 19篇 |
2023年 | 34篇 |
2022年 | 66篇 |
2021年 | 92篇 |
2020年 | 97篇 |
2019年 | 70篇 |
2018年 | 58篇 |
2017年 | 73篇 |
2016年 | 85篇 |
2015年 | 96篇 |
2014年 | 147篇 |
2013年 | 112篇 |
2012年 | 145篇 |
2011年 | 142篇 |
2010年 | 126篇 |
2009年 | 138篇 |
2008年 | 139篇 |
2007年 | 124篇 |
2006年 | 121篇 |
2005年 | 100篇 |
2004年 | 70篇 |
2003年 | 67篇 |
2002年 | 61篇 |
2001年 | 35篇 |
2000年 | 40篇 |
1999年 | 30篇 |
1998年 | 28篇 |
1997年 | 25篇 |
1996年 | 12篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 4篇 |
1986年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有2389条查询结果,搜索用时 15 毫秒
61.
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this problem is the error-correcting code, which is commonly used in communication systems and already appears in some RLWE-based proposals. However, applying error-correcting codes to those cryptographic schemes is far from simply installing an add-on. Firstly, the residue error term derived by decryption has correlated coefficients, whereas most prevalent error-correcting codes with remarkable error tolerance assume the channel noise to be independent and memoryless. This explains why only simple error-correcting methods are used in existing RLWE-based PKE schemes. Secondly, the residue error term has correlated coefficients leaving accurate DFR estimation challenging even for uncoded plaintext. It can be found in the literature that a tighter DFR estimation can effectively create a DFR margin. Thirdly, most error-correcting codes are not well designed for safety considerations, e.g., syndrome decoding has a nonconstant time nature. A code good at error correcting might be weak under a variety of attacks. In this work, we propose a polar coding scheme for RLWE-based PKE. A relaxed “independence” assumption is used to derive an uncorrelated residue noise term, and a wireless communication strategy, outage, is used to construct polar codes. Furthermore, some knowledge about the residue noise is exploited to improve the decoding performance. With the parameterization of NewHope Round 2, the proposed scheme creates a considerable DRF margin, which gives a competitive security improvement compared to state-of-the-art benchmarks. Specifically, the security is improved by , while a DFR of is achieved a for code rate pf 0.25, 12,289, and binomial parameter . Moreover, polar encoding and decoding have a quasilinear complexity and intrinsically support constant-time implementations. 相似文献
62.
Shengjie Xu Yin Li Yijun Wang Yun Mao Xiaodong Wu Ying Guo 《Entropy (Basel, Switzerland)》2021,23(12)
We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum state without Gaussian modulations. With this technique, the quantum states can be prepared precisely to match the high transmission rate. Here, both asymptotic regime and finite-size regime are considered to make a comparison. In the finite-size scenario, we illustrate the passive CV-QKD protocol against collective attacks. Simulation results show that the performance of passive CV-QKD protocol in the finite-size case is more pessimistic than that achieved in the asymptotic case, which indicates that the finite-size effect has a great influence on the performance of the single-mode passive CV-QKD protocol. However, we can still obtain a reasonable performance in the finite-size regime by enhancing the average photon number of the thermal state. 相似文献
63.
Yunwei Niu Ruolin Wang Zuobing Xiao Xiaoxin Sun Pinpin Wang Jiancai Zhu Xueying Cao 《Molecules (Basel, Switzerland)》2021,26(20)
Rosa roxburghii tratt (RRT), widely distributed in the southwest of China, is favored by consumers for its good taste and healthy functions. In this study, thirty-seven compounds of Rosa roxburghii Tratt (RRT) were identified and quantified by gas chromatography–olfactometry (G–O) and gas chromatography–mass spectrometry (GC–MS) analysis. Furthermore, ethyl 2-methylpropanoate, ethyl butanoate, ethyl 2-methylbutyrate, and ethyl hexanoate were present with much higher odor activity values (OAVs) than other compounds. The key notes were confirmed by omission tests. Possible interaction among key notes was investigated through odor intensity determination and sensory analysis. It showed fruity and woody notes had synergistic effects. Full factorial design was used to evaluate the notes contribution to the whole odor. One important finding is the major effect of order interactions, fruity note (X1) and woody note (X4) especially, emphasizing the existence of complex interactions occurring between odor notes. The interaction X1X4 was further investigated. The woody note has a positive effect when the fruity note is also in the mixture but tends to show a negative effect otherwise. 相似文献
64.
Binshan Liu Shiqi Xu Zhizhong Dong Yuping Liu Xiaoming Wei Danqing Shao 《Molecules (Basel, Switzerland)》2021,26(24)
To characterize key odorants in scallion pancake (SP), volatiles were extracted by solvent extraction-solvent assisted flavor evaporation. A total of 51 odor-active compounds were identified by gas chromatography-olfactometry (GC-O) and chromatography–mass spectrometry (GC-MS). (Z/E)-3,6-Diethyl-1,2,4,5-tetrathiane was detected for the first time in scallion food. Application of aroma extract dilution analysis to extracts showed maltol, methyl propyl disulfide, dipropyl disulfide and 2-pentylfuran had the highest flavor dilution (FD) factor of 4096. Twenty-three odorants with FD factors ≥ 8 were quantitated, and their odor active values (OAVs) were calculated. Ten compounds with OAVs ≥ 1 were determined as the key odorants; a recombinate model prepared from the key odorants, including (E,E)-2,4-decadienal, dimethyl trisulfide, methyl propyl disulfide, hexanal, dipropyl trisulfide, maltol, acetoin, 2-methylnaphthalene, 2-pentylfuran and 2(5H)-furanone, successfully simulated the overall aroma profile of SP. The changes in odorants during storage were investigated further. With increasing concentrations and OAVs during storage, hexanal became an off-flavor compound. 相似文献
65.
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology. 相似文献
66.
Hong-Wei Li Yi-Bo Zhao Zhen-Qiang Yin Shuang Wang Zheng-Fu Han Wan-Su Bao Guang-Can Guo 《Optics Communications》2009,282(20):2533-0389
The number of transmitted signals in practical quantum key distribution (QKD) protocol is always finite. We discuss the security of decoy states QKD protocol with finite resources by considering the statistical fluctuation for the yield and error rate of the quantum state in different sources of pulses (signal sources and decoy sources). The number of exchanged quantum signals vs positive key generation rate is given with experiment results. 相似文献
67.
链路持续时间是影响卫星量子密钥分发量子比特率的重要参数.文章分析了影响星-地单光子和纠缠光子量子密钥分发链路持续时间的若干因素,并且进行了数值仿真研究.结果表明,随着轨道高度的增加或者地面最小通信仰角的减小,单光子和纠缠光子链路的持续时间有较大的改善;单光子链路时地面站同卫星星下点轨迹间的距离和纠缠光子链路时两地面站之间的距离也均是影响链路持续时间的重要参数;纠缠光子链路持续时间的影响因素较单光子链路更为复杂,其最终决定于卫星星下点轨迹同两地面站之间的位置关系. 相似文献
68.
WANG ChaoZe GUO Hui REN JiGang CAO Yuan PENG ChengZhi LIU WeiYue 《中国科学:物理学 力学 天文学(英文版)》2014,57(7):1233-1237
Ground-satellite quantum key distribution(QKD)is a feasible way to implement global-scale quantum communication.Herein we propose an approach to dynamically compensate the polarization of the photons when passing through the optical telescope used in ground-satellite QKD.Our results experimentally demonstrate that the fidelity of any polarization state after dynamic compensation can be achieved by more than 99.5%,which fulfills the requirements of ground-satellite QKD. 相似文献
69.
70.