首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22030篇
  免费   4600篇
  国内免费   2071篇
化学   4361篇
晶体学   74篇
力学   130篇
综合类   212篇
数学   2150篇
物理学   12346篇
无线电   9428篇
  2024年   94篇
  2023年   364篇
  2022年   962篇
  2021年   1037篇
  2020年   913篇
  2019年   700篇
  2018年   607篇
  2017年   814篇
  2016年   1091篇
  2015年   1019篇
  2014年   1524篇
  2013年   1642篇
  2012年   1498篇
  2011年   1621篇
  2010年   1226篇
  2009年   1303篇
  2008年   1569篇
  2007年   1521篇
  2006年   1485篇
  2005年   1267篇
  2004年   1082篇
  2003年   924篇
  2002年   823篇
  2001年   606篇
  2000年   629篇
  1999年   405篇
  1998年   389篇
  1997年   289篇
  1996年   198篇
  1995年   191篇
  1994年   159篇
  1993年   110篇
  1992年   101篇
  1991年   72篇
  1990年   81篇
  1989年   93篇
  1988年   42篇
  1987年   25篇
  1986年   34篇
  1985年   39篇
  1984年   26篇
  1983年   17篇
  1982年   15篇
  1981年   13篇
  1980年   10篇
  1979年   8篇
  1978年   15篇
  1977年   7篇
  1976年   9篇
  1972年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines. In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms, devices and systems. Moreover, we study existing trends, and establish a roadmap for future research in these areas.  相似文献   
992.
993.
In a previous article we presented an argument to obtain (or rather infer) Born’s rule, based on a simple set of axioms named “Contexts, Systems and Modalities" (CSM). In this approach, there is no “emergence”, but the structure of quantum mechanics can be attributed to an interplay between the quantized number of modalities that is accessible to a quantum system and the continuum of contexts that are required to define these modalities. The strong link of this derivation with Gleason’s theorem was emphasized, with the argument that CSM provides a physical justification for Gleason’s hypotheses. Here, we extend this result by showing that an essential one among these hypotheses—the need of unitary transforms to relate different contexts—can be removed and is better seen as a necessary consequence of Uhlhorn’s theorem.  相似文献   
994.
In present times, barcode decoders on mobile phones can extract the data content of QR codes. However, this convenience raises concerns about security issues when using QR codes to transmit confidential information, such as e-tickets, coupons, and other private data. Moreover, current secret hiding techniques are unsuitable for QR code applications since QR codes are module-oriented, which is different from the pixel-oriented hiding manner. In this article, we propose an algorithm to conceal confidential information by changing the modules of the QR Code. This new scheme designs the triple module groups based on the concept of the error correction capability. Additionally, this manner can conceal two secret bits by changing only one module, and the amount of hidden confidential information can be twice the original amount. As a result, the ordinary data content (such as URL) can be extracted correctly from the generated QR code by any barcode decoders, which does not affect the readability of scanning. Furthermore, only authorized users with the secret key can further extract the concealed confidential information. This designed scheme can provide secure and reliable applications for the QR system.  相似文献   
995.
Obtaining the total wavefunction evolution of interacting quantum systems provides access to important properties, such as entanglement, shedding light on fundamental aspects, e.g., quantum energetics and thermodynamics, and guiding towards possible application in the fields of quantum computation and communication. We consider a two-level atom (qubit) coupled to the continuum of travelling modes of a field confined in a one-dimensional chiral waveguide. Originally, we treated the light-matter ensemble as a closed, isolated system. We solve its dynamics using a collision model where individual temporal modes of the field locally interact with the qubit in a sequential fashion. This approach allows us to obtain the total wavefunction of the qubit-field system, at any time, when the field starts in a coherent or a single-photon state. Our method is general and can be applied to other initial field states.  相似文献   
996.
997.
Shinagawa and Iwata are considered quantum security for the sum of Even–Mansour (SoEM) construction and provided quantum key recovery attacks by Simon’s algorithm and Grover’s algorithm. Furthermore, quantum key recovery attacks are also presented for natural generalizations of SoEM. For some variants of SoEM, they found that their quantum attacks are not obvious and left it as an open problem to discuss the security of such constructions. This paper focuses on this open problem and presents a positive response. We provide quantum key recovery attacks against such constructions by quantum algorithms. For natural generalizations of SoEM with linear key schedules, we also present similar quantum key recovery attacks by quantum algorithms (Simon’s algorithm, Grover’s algorithm, and Grover-meet-Simon algorithm).  相似文献   
998.
Free-space quantum key distribution (QKD) has attracted considerable attention due to its lower channel loss and link flexibility. It allows two participants share theoretical unconditional secure keys, and can potentially be applied to air-to-ground quantum communication to establish a global quantum network. Free-space QKD using modulating retro-reflectors (MRR-QKD) significantly reduces the pointing requirement and simplifies the structure of the mobile terminal, therefore making it suitable for lightweight aircraft such as unmanned aerial vehicle and Cubesat, etc. Based on intensity modulation of two non-orthogonal states and the B92 protocol, we proposed a scheme to improve the previous work (Optics Express 2018, 26, 11331). Our scheme simplifies the optical structure and shows more robustness in equipment imperfection. The analysis and simulation show that the number of multiple quantum well modulators needed in our scheme decreases from eight to three with similar performance. Additionally, while the previous scheme cannot work due to low modulator extinction ratio or high optical misalignment, our scheme can still operate.  相似文献   
999.
关于预测误差平方和最小准则的几点看法   总被引:1,自引:0,他引:1  
在应用桃棣荣等提出的预测误差平方和(PRESS)最小准则逐步算法的过程中,发现单纯应用PRESS值来控制引进因子数目有时不很有效。因此建议:1)当引进因子过多时,采用赤池信息准则对因子数做进一步控制。2)当引进因子过少时,取消原算法中关于PRESS值上界的规定和增加候选因子数以增加引进因子数。最后,对应用PRESS准则时所选因子的优良性进行了讨论  相似文献   
1000.
基于相对熵的不完全信息群体专家权重的集结   总被引:1,自引:1,他引:1  
针对属性权重信息和属性效用信息都不完全的群体多属性决策问题,运用相对熵理论提出了一种专家权重的确定方法.该方法通过集结各方案的综合评价值向量,客观地得到专家的权重,避免系统聚类方法中由给定相似度水平归类而产生的主观性问题.应用实例表明了方法的有效性和实用性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号