首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4517篇
  免费   497篇
  国内免费   32篇
化学   45篇
晶体学   1篇
力学   21篇
综合类   53篇
数学   164篇
物理学   276篇
无线电   4486篇
  2024年   11篇
  2023年   61篇
  2022年   115篇
  2021年   188篇
  2020年   221篇
  2019年   129篇
  2018年   101篇
  2017年   181篇
  2016年   185篇
  2015年   219篇
  2014年   382篇
  2013年   275篇
  2012年   374篇
  2011年   323篇
  2010年   253篇
  2009年   250篇
  2008年   296篇
  2007年   264篇
  2006年   265篇
  2005年   203篇
  2004年   192篇
  2003年   180篇
  2002年   115篇
  2001年   63篇
  2000年   56篇
  1999年   29篇
  1998年   32篇
  1997年   24篇
  1996年   20篇
  1995年   12篇
  1994年   6篇
  1993年   5篇
  1992年   4篇
  1991年   4篇
  1990年   2篇
  1989年   2篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
排序方式: 共有5046条查询结果,搜索用时 0 毫秒
131.
USBKey作为一种便携式的安全产品,以其携带方便、体积小、安全性好而得到广泛应用,然而其内部可用资源比较有限,限制了某些应用。为了充分利用其内部资源,能够更加高效地进行工作,研究了COS操作系统的设计和实现方法,重点研究了其中文件系统的设计及其实现。  相似文献   
132.
军工网络安全模拟仿真系统是一个多层次、多方面、多步骤的仿真系统。通过对系统进行VV&A分析,结合层次分析法(AHP)的决策思想,把与仿真可信度有关的评估元素通过划分层次后并计算权重,建立起一种复杂仿真系统可信度评估的综合算法模型,最终得到整个军工网络安全模拟仿真系统的可信度。根据所得到的量化可信度结果,证明该系统具有一定的科学性。  相似文献   
133.
碳酸钙与碳化硅对室温硫化硅橡胶的补强作用   总被引:22,自引:0,他引:22  
在有关硅橡胶补强的研究中,人们已经对SiO2 等补强性填料对硅橡胶的补强作用进行了深入的研究,但对非补强填料对室温硫化硅橡胶的补强作用则相对涉及较少.作者研究了CaCO3 和SiC 两类非补强性填料以及填料的粒径与分布对室温硫化硅橡胶拉伸强度、断裂伸长率和耐温性能等的影响,发现合适粒径的非补强性填料对室温硫化硅橡胶有较好的补强效果,且在填料粒径及分布匹配时有最好的补强效果,选用SiC时还可以有效提高室温硫化硅橡胶的热稳定性.  相似文献   
134.
This work reports the effect of an alkaline environment and ultraviolet (UV) radiation on the physical, thermal, and tensile properties of different fibers selected as potential reinforcing elements to enhance the impact properties of brittle glass/silicate composites. The fibers, which included regenerated cellulosic (viscose and rayon), synthetic (ultrahigh molecular weight polyethylene, polypropylene, polyamide, acrylic), glass, ceramic, and steel, were aged in different alkaline solutions with pH ranging from 11.1 to 13.6 at 70°C for different periods of time and exposed to UV radiation for 330 h. The physical and thermal properties of aged fibers were studied using tensile testing, scanning electron microscopy, and simultaneous differential and thermogravimetric analysis. Results showed that the regenerated cellulosic fibers, acrylic, E‐glass, and A‐glass fibers could not withstand the highly alkaline environment. Overall, ultrahigh molecular weight polyethylene, UV‐stable polypropylene, polyamide 6.6, AR‐glass, ceramic (alumino borosilicate), and steel fibers performed very well under all conditions, indicating that they have the potential to be used as reinforcing elements in glass/silicate composites. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
135.
刚性微粒填充高聚物的宏观本构关系   总被引:9,自引:0,他引:9  
用微观力学和统计方法研究了含损伤过程的刚性粒子填充高聚物的非线性本构关系.在材料的变形过程中,粒子与基体间界面的开裂引发微孔洞的成核与长大,这虽然弱化了材料的宏观力学性能,但是带来了宏观本构的非线性效应,这为材料的增韧奠定了基础.该文分析了刚性粒子对材料的强化作用和微孔洞演化对材料的弱化作用,以及这两种竞争机制的耦合效应对宏观本构关系的影响,并从理论上给出了界面强度,粒径分散度,平均粒径等参量对材料宏观力学行为影响的定量分析结果.  相似文献   
136.
中国的互联网发展到今天,已经拥有近千万的网民和12多万个中文网站。然而中国的电子商务仍然面临着不少问题,如习惯问题、终端产品拥有率低、服务意识淡漠和商业流通中的安全问题。只有通过政府支持和法律保障等,中国的电子商务才能迎来爆炸性增长的未来。北电网络Shasta 5000构筑的功能强大的平台将推动中国电子商务的发展。  相似文献   
137.
At EuroCrypt '99 Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N -residuosity classes in Z N2 * is hard. Similarly the scheme can be proven to be semantically secure under a much stronger decisional assumption: given w ∈ Z N2 * it is impossible to decide if w is an N -residue or not. In this paper we examine the bit security of Paillier's scheme. We prove that if computing residuosity classes is hard, then given a random w it is impossible to predict the least significant bit of its class significantly better than at random. This immediately yields a way to obtain semantic security without relying on the decisional assumption (at the cost of several invocations of Paillier's original function). In order to improve efficiency we then turn to the problem of simultaneous security of many bits. We prove that Paillier's scheme hides n-b (up to O(n) ) bits if one assumes that computing the class c of a random w remains hard even when we are told that c<2 b . We thoroughly examine the security of this stronger version of the intractability of the class problem. An important theoretical implication of our result is the construction of the first trapdoor function that hides super-logarithmically (up to O(n) ) many bits. We generalize our techniques to provide sufficient conditions for a trapdoor function to have this property.  相似文献   
138.
随着高科技的迅猛发展、国际互联网的广泛膨用、经济全球化趋势的同益明显,以及知识创新工程的深入,传统的保密工作正受到巨大的冲击。论文从“窃密与反窃密”、“密与非密界定”、“信息安全”等方面分析入手,提出应以信息安全为重点,从加强涉密计算机保密管理、涉密人员教育、提高人员素质、加大保密工作投入、提高科研人员的保密意识等方面做好新时期保密工作。  相似文献   
139.
We give a careful, fixed-size parameter analysis of a standard (Blum and Micali in SIAM J. Comput. 13(4):850–864, 1984; Goldreich and Levin in Proceedings of 21st ACM Symposium on Theory of Computing, pp. 25–32, 1989) way to form a pseudo-random generator from a one-way function and then pseudo-random functions from said generator (Goldreich et al. in J. Assoc. Comput. Mach. 33(4):792–807, 1986) While the analysis is done in the model of exact security, we improve known bounds also asymptotically when many bits are output each round and we find all auxiliary parameters efficiently, giving a uniform result. These optimizations makes the analysis effective even for security parameters/key-sizes supported by typical block ciphers and hash functions. This enables us to construct very practical pseudo-random generators with strong properties based on plausible assumptions.  相似文献   
140.
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号