全文获取类型
收费全文 | 4517篇 |
免费 | 497篇 |
国内免费 | 32篇 |
专业分类
化学 | 45篇 |
晶体学 | 1篇 |
力学 | 21篇 |
综合类 | 53篇 |
数学 | 164篇 |
物理学 | 276篇 |
无线电 | 4486篇 |
出版年
2024年 | 11篇 |
2023年 | 61篇 |
2022年 | 115篇 |
2021年 | 188篇 |
2020年 | 221篇 |
2019年 | 129篇 |
2018年 | 101篇 |
2017年 | 181篇 |
2016年 | 185篇 |
2015年 | 219篇 |
2014年 | 382篇 |
2013年 | 275篇 |
2012年 | 374篇 |
2011年 | 323篇 |
2010年 | 253篇 |
2009年 | 250篇 |
2008年 | 296篇 |
2007年 | 264篇 |
2006年 | 265篇 |
2005年 | 203篇 |
2004年 | 192篇 |
2003年 | 180篇 |
2002年 | 115篇 |
2001年 | 63篇 |
2000年 | 56篇 |
1999年 | 29篇 |
1998年 | 32篇 |
1997年 | 24篇 |
1996年 | 20篇 |
1995年 | 12篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
排序方式: 共有5046条查询结果,搜索用时 21 毫秒
61.
刘红梅 《武汉大学学报(理学版)》2012,58(6):515-518
针对基于SIM卡安全机制的家庭基站平台完整性无法保护,容易产生通过家庭基站的恶意攻击等安全威胁,提出了基于TPM的家庭基站保护机制,采用TPM的安全计算、安全存储和认证机制,实现了核心网对家庭基站的设备认证、家庭基站软硬件完整性验证、家庭基站身份认证、家庭基站位置认证与锁定、用户接入家庭基站的认证. 相似文献
62.
In this paper two new architectures for optical image verification are proposed. Both architectures are based on conventional joint transform correlators (JTCs) adopting a Fourier hologram and can significantly improve the recovered image quality. First, an input phase-only function is Fourier transformed and then interferes with a reference wave that is diffracted from a plane wave incident on another random phase mask. Second, two phase-only functions are placed at the two input sides of a beamsplitter such that the interference pattern of their Fourier transforms can be detected. To obtain a predefined target image in the output plane, one of the input phase functions is iteratively retrieved by the use of the projection onto constraint sets algorithm. Simulation results show that the less mean squared error and better image quality are obtained for both the binary and grayscale images. 相似文献
63.
A new technique is proposed to improve information confidentiality in optical-fiber communications without bandwidth consumption. A pseudorandom vectorial sequence was generated by a dynamic system algorithm and used to codify a multi-level polarization modulation based on the Stokes vector. Optical-fiber birefringence, usually considered as a disturbance, was exploited to obfuscate the signal transmission. At the receiver end, the same pseudorandom sequence was generated and used to decode the multi-level polarization modulated signal. The proposed scheme, working at the physical layer, provides strong information security without introducing complex processing and thus latency. 相似文献
64.
In this paper, intelligent reflecting surface (IRS) technology is employed to enhance physical layer security (PLS) for spectrum sharing communication systems with orthogonal frequency division multiplexing (OFDM). Aiming to improve the secondary users’ secrecy rates, a design problem for jointly optimizing the transmission beamforming of secondary base station (SBS), the IRS’s reflecting coefficient and the channel allocation is formulated under the constraints of the requirements of minimum data rates of primary users and the interference between users. As the scenario is highly complex, it is quite challenging to address the non-convexity of the optimization problem. Thus, a deep reinforcement learning (DRL) based approach is taken into consideration. Specifically, we use dueling double deep Q networks (D3QN) and soft Actor–Critic (SAC) to solve the discrete and continuous action space optimization problems, respectively, taking full advantage of the maximum entropy RL algorithm to explore all possible optimal paths. Finally, simulation results show that our proposed approach has a great improvement in security transmission rate compared with the scheme without IRS and OFDM, and our proposed D3QN-SAC approach is more effective than other approaches in terms of maximum security transmission rate. 相似文献
65.
A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics.
To imitate these codes is difficult as pure phase objects having complex phase distribution function are used to modulate
the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram.
Lloyd’s folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity
pattern for hologram authenticity verification. Creating the secrete-codes through an interferometric reference beam from
the key hologram facilitates a multi-stage authenticity verification as well as easy repositioning of the security hologram
through a specific Moiré pattern generated during the verification process.
相似文献
66.
江西相山铀矿区与非铀矿区稻谷中天然放射性核素含量对比研究 总被引:2,自引:0,他引:2
文章对比分析研究了江西相山铀矿区和非铀矿区稻谷中天然放射性核素U和Th的含量特征。样品分别采自江西省相山铀矿区及远离铀矿区的抚州市郊丘陵水稻种植区。结果表明相山铀矿区稻谷中天然放射性核素U的含量显著高于非铀矿区的稻谷,铀矿区内稻谷中放射性核素U含量平均值是非铀矿区的5.30倍;但铀矿区内稻谷中放射性核素Th的含量却较非铀矿区稻谷含量低,仅为其Th含量的50%。另外,相山铀矿区内稻谷中放射性核素U和Th之间存在较为显著的线性关系,稻谷中放射性核素Th的含量随U含量的增加而升高。铀矿区内稻谷中放射性核素U含量显著高于非铀矿区的原因还有待于进一步深入研究,然而加强该领域的研究对于保证我国区域稻谷质量和食品安全是非常重要和有意义的。 相似文献
67.
随着国家关键基础设施建设规模和信息化水平的提升,其在高空电磁脉冲、有意电磁干扰和地磁暴等强电磁环境下的电磁安全逐渐受到了国内外的关注。强电磁环境属于小概率、高风险事件,其影响机理和评估方法与雷电、系统内过电压等常规电磁事件有较大不同,采用期望风险指标的常规可靠性分析方法难以有效评估管理强电磁环境相关风险。从电磁恢复力视角出发,提出了关键基础设施电磁安全的三棱锥模型,并重点以电网为例,探讨关键基础设施电磁恢复力的内涵和外延,并对开展电磁恢复力研究提出建议。 相似文献
68.
物理隔离网络的电磁攻击手段, 其主要目标是建立与外部互联网的隐蔽连接通道。近年来跨越物理隔离网络的方法和工具被陆续公开, 相应的分析方法和检测手段也逐步被国内外安全团队提出。掌握漏洞才能掌握网络安全的主动权, 对比网络安全漏洞, 电磁漏洞定义为能对设备或系统造成损害的电磁因素。以物理隔离网络为例, 电磁漏洞主要指的是网络的硬件和系统缺陷, 利用这些缺陷可以直接建立或通过植入恶意软件建立能突破物理隔离的电磁信号的信息收、发隐蔽通道。通过广泛的漏洞挖掘与验证, 从物理信号类型、信息传递方向、信号生成与作用机理、漏洞利用方式以及漏洞检测方法上提出物理隔离网络电磁漏洞分类方法; 通过综合借鉴网络安全漏洞、电磁信息安全检测、物理隔离隐蔽通道等领域的研究方法, 提出电磁漏洞的研究方法; 从深化主动检测、群智漏洞挖掘、网络电磁安全融合、大数据监测等角度, 提出了物理隔离网络电磁漏洞库的建立方法。 相似文献
69.
Hong-Xin Ma Peng Huang Tao Wang Shi-Yu Wang Wan-Su Bao Gui-Hua Zeng 《Physics letters. A》2019,383(36):126005
The state preparation operation of continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol may become imperfect in practical applications. We address the security of the CV-MDI-QKD protocol based on imperfect preparation of the coherent state under realistic conditions of lossy and noisy quantum channel. Specifically, we assume that the imperfection of Alice's and Bob's practical state preparations equal to the amplification of ideal modulators and lasers at both Alice's and Bob's sides by untrusted third-parties Fred and Gray employing phase-insensitive amplifiers (PIAs), respectively. The equivalent excess noise introduced by the imperfect state preparation is comprehensively and quantitatively calculated by adopting the gains of PIAs. Security analysis shows that CV-MDI-QKD is quite sensitive to the imperfection of practical state preparation, which inevitably deteriorates the performance and security of CV-MDI-QKD system. Moreover, a lower bound of the secret key rate is derived under arbitrary collective attacks, and the upper threshold of this imperfection tolerated by the system is obtained in the form of the specific gains of PIAs. In addition, the methods presented will improve and perfect the practical security of CV-MDI-QKD protocol. 相似文献
70.