全文获取类型
收费全文 | 22030篇 |
免费 | 4600篇 |
国内免费 | 2071篇 |
专业分类
化学 | 4361篇 |
晶体学 | 74篇 |
力学 | 130篇 |
综合类 | 212篇 |
数学 | 2150篇 |
物理学 | 12346篇 |
无线电 | 9428篇 |
出版年
2024年 | 94篇 |
2023年 | 364篇 |
2022年 | 962篇 |
2021年 | 1037篇 |
2020年 | 913篇 |
2019年 | 700篇 |
2018年 | 607篇 |
2017年 | 814篇 |
2016年 | 1091篇 |
2015年 | 1019篇 |
2014年 | 1524篇 |
2013年 | 1642篇 |
2012年 | 1498篇 |
2011年 | 1621篇 |
2010年 | 1226篇 |
2009年 | 1303篇 |
2008年 | 1569篇 |
2007年 | 1521篇 |
2006年 | 1485篇 |
2005年 | 1267篇 |
2004年 | 1082篇 |
2003年 | 924篇 |
2002年 | 823篇 |
2001年 | 606篇 |
2000年 | 629篇 |
1999年 | 405篇 |
1998年 | 389篇 |
1997年 | 289篇 |
1996年 | 198篇 |
1995年 | 191篇 |
1994年 | 159篇 |
1993年 | 110篇 |
1992年 | 101篇 |
1991年 | 72篇 |
1990年 | 81篇 |
1989年 | 93篇 |
1988年 | 42篇 |
1987年 | 25篇 |
1986年 | 34篇 |
1985年 | 39篇 |
1984年 | 26篇 |
1983年 | 17篇 |
1982年 | 15篇 |
1981年 | 13篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1978年 | 15篇 |
1977年 | 7篇 |
1976年 | 9篇 |
1972年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms, devices and systems. Moreover, we study existing trends, and establish a roadmap for future research in these areas. 相似文献
992.
993.
In a previous article we presented an argument to obtain (or rather infer) Born’s rule, based on a simple set of axioms named “Contexts, Systems and Modalities" (CSM). In this approach, there is no “emergence”, but the structure of quantum mechanics can be attributed to an interplay between the quantized number of modalities that is accessible to a quantum system and the continuum of contexts that are required to define these modalities. The strong link of this derivation with Gleason’s theorem was emphasized, with the argument that CSM provides a physical justification for Gleason’s hypotheses. Here, we extend this result by showing that an essential one among these hypotheses—the need of unitary transforms to relate different contexts—can be removed and is better seen as a necessary consequence of Uhlhorn’s theorem. 相似文献
994.
In present times, barcode decoders on mobile phones can extract the data content of QR codes. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. This new scheme designs the triple module groups based on the concept of the error correction capability. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. This designed scheme can provide secure and reliable applications for the QR system. 相似文献
995.
Obtaining the total wavefunction evolution of interacting quantum systems provides access to important properties, such as entanglement, shedding light on fundamental aspects, e.g., quantum energetics and thermodynamics, and guiding towards possible application in the fields of quantum computation and communication. We consider a two-level atom (qubit) coupled to the continuum of travelling modes of a field confined in a one-dimensional chiral waveguide. Originally, we treated the light-matter ensemble as a closed, isolated system. We solve its dynamics using a collision model where individual temporal modes of the field locally interact with the qubit in a sequential fashion. This approach allows us to obtain the total wavefunction of the qubit-field system, at any time, when the field starts in a coherent or a single-photon state. Our method is general and can be applied to other initial field states. 相似文献
996.
997.
Ping Zhang 《Entropy (Basel, Switzerland)》2022,24(2)
Shinagawa and Iwata are considered quantum security for the sum of Even–Mansour (SoEM) construction and provided quantum key recovery attacks by Simon’s algorithm and Grover’s algorithm. Furthermore, quantum key recovery attacks are also presented for natural generalizations of SoEM. For some variants of SoEM, they found that their quantum attacks are not obvious and left it as an open problem to discuss the security of such constructions. This paper focuses on this open problem and presents a positive response. We provide quantum key recovery attacks against such constructions by quantum algorithms. For natural generalizations of SoEM with linear key schedules, we also present similar quantum key recovery attacks by quantum algorithms (Simon’s algorithm, Grover’s algorithm, and Grover-meet-Simon algorithm). 相似文献
998.
Free-space quantum key distribution (QKD) has attracted considerable attention due to its lower channel loss and link flexibility. It allows two participants share theoretical unconditional secure keys, and can potentially be applied to air-to-ground quantum communication to establish a global quantum network. Free-space QKD using modulating retro-reflectors (MRR-QKD) significantly reduces the pointing requirement and simplifies the structure of the mobile terminal, therefore making it suitable for lightweight aircraft such as unmanned aerial vehicle and Cubesat, etc. Based on intensity modulation of two non-orthogonal states and the B92 protocol, we proposed a scheme to improve the previous work (Optics Express 2018, 26, 11331). Our scheme simplifies the optical structure and shows more robustness in equipment imperfection. The analysis and simulation show that the number of multiple quantum well modulators needed in our scheme decreases from eight to three with similar performance. Additionally, while the previous scheme cannot work due to low modulator extinction ratio or high optical misalignment, our scheme can still operate. 相似文献
999.
关于预测误差平方和最小准则的几点看法 总被引:1,自引:0,他引:1
在应用桃棣荣等提出的预测误差平方和(PRESS)最小准则逐步算法的过程中,发现单纯应用PRESS值来控制引进因子数目有时不很有效。因此建议:1)当引进因子过多时,采用赤池信息准则对因子数做进一步控制。2)当引进因子过少时,取消原算法中关于PRESS值上界的规定和增加候选因子数以增加引进因子数。最后,对应用PRESS准则时所选因子的优良性进行了讨论 相似文献
1000.
基于相对熵的不完全信息群体专家权重的集结 总被引:1,自引:1,他引:1
万树平 《应用数学与计算数学学报》2009,23(1):66-70
针对属性权重信息和属性效用信息都不完全的群体多属性决策问题,运用相对熵理论提出了一种专家权重的确定方法.该方法通过集结各方案的综合评价值向量,客观地得到专家的权重,避免系统聚类方法中由给定相似度水平归类而产生的主观性问题.应用实例表明了方法的有效性和实用性. 相似文献