首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4517篇
  免费   497篇
  国内免费   32篇
化学   45篇
晶体学   1篇
力学   21篇
综合类   53篇
数学   164篇
物理学   276篇
无线电   4486篇
  2024年   11篇
  2023年   61篇
  2022年   115篇
  2021年   188篇
  2020年   221篇
  2019年   129篇
  2018年   101篇
  2017年   181篇
  2016年   185篇
  2015年   219篇
  2014年   382篇
  2013年   275篇
  2012年   374篇
  2011年   323篇
  2010年   253篇
  2009年   250篇
  2008年   296篇
  2007年   264篇
  2006年   265篇
  2005年   203篇
  2004年   192篇
  2003年   180篇
  2002年   115篇
  2001年   63篇
  2000年   56篇
  1999年   29篇
  1998年   32篇
  1997年   24篇
  1996年   20篇
  1995年   12篇
  1994年   6篇
  1993年   5篇
  1992年   4篇
  1991年   4篇
  1990年   2篇
  1989年   2篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
排序方式: 共有5046条查询结果,搜索用时 21 毫秒
61.
针对基于SIM卡安全机制的家庭基站平台完整性无法保护,容易产生通过家庭基站的恶意攻击等安全威胁,提出了基于TPM的家庭基站保护机制,采用TPM的安全计算、安全存储和认证机制,实现了核心网对家庭基站的设备认证、家庭基站软硬件完整性验证、家庭基站身份认证、家庭基站位置认证与锁定、用户接入家庭基站的认证.  相似文献   
62.
In this paper two new architectures for optical image verification are proposed. Both architectures are based on conventional joint transform correlators (JTCs) adopting a Fourier hologram and can significantly improve the recovered image quality. First, an input phase-only function is Fourier transformed and then interferes with a reference wave that is diffracted from a plane wave incident on another random phase mask. Second, two phase-only functions are placed at the two input sides of a beamsplitter such that the interference pattern of their Fourier transforms can be detected. To obtain a predefined target image in the output plane, one of the input phase functions is iteratively retrieved by the use of the projection onto constraint sets algorithm. Simulation results show that the less mean squared error and better image quality are obtained for both the binary and grayscale images.  相似文献   
63.
A new technique is proposed to improve information confidentiality in optical-fiber communications without bandwidth consumption. A pseudorandom vectorial sequence was generated by a dynamic system algorithm and used to codify a multi-level polarization modulation based on the Stokes vector. Optical-fiber birefringence, usually considered as a disturbance, was exploited to obfuscate the signal transmission. At the receiver end, the same pseudorandom sequence was generated and used to decode the multi-level polarization modulated signal. The proposed scheme, working at the physical layer, provides strong information security without introducing complex processing and thus latency.  相似文献   
64.
In this paper, intelligent reflecting surface (IRS) technology is employed to enhance physical layer security (PLS) for spectrum sharing communication systems with orthogonal frequency division multiplexing (OFDM). Aiming to improve the secondary users’ secrecy rates, a design problem for jointly optimizing the transmission beamforming of secondary base station (SBS), the IRS’s reflecting coefficient and the channel allocation is formulated under the constraints of the requirements of minimum data rates of primary users and the interference between users. As the scenario is highly complex, it is quite challenging to address the non-convexity of the optimization problem. Thus, a deep reinforcement learning (DRL) based approach is taken into consideration. Specifically, we use dueling double deep Q networks (D3QN) and soft Actor–Critic (SAC) to solve the discrete and continuous action space optimization problems, respectively, taking full advantage of the maximum entropy RL algorithm to explore all possible optimal paths. Finally, simulation results show that our proposed approach has a great improvement in security transmission rate compared with the scheme without IRS and OFDM, and our proposed D3QN-SAC approach is more effective than other approaches in terms of maximum security transmission rate.  相似文献   
65.
Raj Kumar  D Mohan  A K Aggarwal 《Pramana》2007,68(3):443-450
A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics. To imitate these codes is difficult as pure phase objects having complex phase distribution function are used to modulate the object beam that is recorded in conjunction with an encoded interferometric reference beam derived from a key hologram. Lloyd’s folding mirror interferometer is used to convert phase variations of the reconstructed wave-front into an intensity pattern for hologram authenticity verification. Creating the secrete-codes through an interferometric reference beam from the key hologram facilitates a multi-stage authenticity verification as well as easy repositioning of the security hologram through a specific Moiré pattern generated during the verification process.   相似文献   
66.
文章对比分析研究了江西相山铀矿区和非铀矿区稻谷中天然放射性核素U和Th的含量特征。样品分别采自江西省相山铀矿区及远离铀矿区的抚州市郊丘陵水稻种植区。结果表明相山铀矿区稻谷中天然放射性核素U的含量显著高于非铀矿区的稻谷,铀矿区内稻谷中放射性核素U含量平均值是非铀矿区的5.30倍;但铀矿区内稻谷中放射性核素Th的含量却较非铀矿区稻谷含量低,仅为其Th含量的50%。另外,相山铀矿区内稻谷中放射性核素U和Th之间存在较为显著的线性关系,稻谷中放射性核素Th的含量随U含量的增加而升高。铀矿区内稻谷中放射性核素U含量显著高于非铀矿区的原因还有待于进一步深入研究,然而加强该领域的研究对于保证我国区域稻谷质量和食品安全是非常重要和有意义的。  相似文献   
67.
谢彦召  刘民周  陈宇浩 《强激光与粒子束》2019,31(7):070001-1-070001-8
随着国家关键基础设施建设规模和信息化水平的提升,其在高空电磁脉冲、有意电磁干扰和地磁暴等强电磁环境下的电磁安全逐渐受到了国内外的关注。强电磁环境属于小概率、高风险事件,其影响机理和评估方法与雷电、系统内过电压等常规电磁事件有较大不同,采用期望风险指标的常规可靠性分析方法难以有效评估管理强电磁环境相关风险。从电磁恢复力视角出发,提出了关键基础设施电磁安全的三棱锥模型,并重点以电网为例,探讨关键基础设施电磁恢复力的内涵和外延,并对开展电磁恢复力研究提出建议。  相似文献   
68.
刘文斌  丁建锋  寇云峰  王梦寒  宋滔 《强激光与粒子束》2019,31(10):103215-1-103215-5
物理隔离网络的电磁攻击手段, 其主要目标是建立与外部互联网的隐蔽连接通道。近年来跨越物理隔离网络的方法和工具被陆续公开, 相应的分析方法和检测手段也逐步被国内外安全团队提出。掌握漏洞才能掌握网络安全的主动权, 对比网络安全漏洞, 电磁漏洞定义为能对设备或系统造成损害的电磁因素。以物理隔离网络为例, 电磁漏洞主要指的是网络的硬件和系统缺陷, 利用这些缺陷可以直接建立或通过植入恶意软件建立能突破物理隔离的电磁信号的信息收、发隐蔽通道。通过广泛的漏洞挖掘与验证, 从物理信号类型、信息传递方向、信号生成与作用机理、漏洞利用方式以及漏洞检测方法上提出物理隔离网络电磁漏洞分类方法; 通过综合借鉴网络安全漏洞、电磁信息安全检测、物理隔离隐蔽通道等领域的研究方法, 提出电磁漏洞的研究方法; 从深化主动检测、群智漏洞挖掘、网络电磁安全融合、大数据监测等角度, 提出了物理隔离网络电磁漏洞库的建立方法。  相似文献   
69.
The state preparation operation of continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol may become imperfect in practical applications. We address the security of the CV-MDI-QKD protocol based on imperfect preparation of the coherent state under realistic conditions of lossy and noisy quantum channel. Specifically, we assume that the imperfection of Alice's and Bob's practical state preparations equal to the amplification of ideal modulators and lasers at both Alice's and Bob's sides by untrusted third-parties Fred and Gray employing phase-insensitive amplifiers (PIAs), respectively. The equivalent excess noise introduced by the imperfect state preparation is comprehensively and quantitatively calculated by adopting the gains of PIAs. Security analysis shows that CV-MDI-QKD is quite sensitive to the imperfection of practical state preparation, which inevitably deteriorates the performance and security of CV-MDI-QKD system. Moreover, a lower bound of the secret key rate is derived under arbitrary collective attacks, and the upper threshold of this imperfection tolerated by the system is obtained in the form of the specific gains of PIAs. In addition, the methods presented will improve and perfect the practical security of CV-MDI-QKD protocol.  相似文献   
70.
为应对日益增长的恐怖活动.研制了基于伴随α粒子的中子飞行时间技术的隐藏爆炸物安全检测仪。介绍了该安检仪检测的工作原理.详细阐述了安检仪的伴随α粒子探测器的DT中子管、屏蔽系统、支撑平台、阵列γ探测器、信号获取和处理系统、数据库、传输装置及外壳的研制过程。利用研制的安检仪对常用炸药和化学战剂进行了检测.结果表明该安检仪可以满足实际应用的需求。该仪器不仅可以用于安检通道内的爆炸物检测.通过训练也可以用于毒品和危化品的检测。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号