首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8310篇
  免费   822篇
  国内免费   400篇
化学   582篇
晶体学   2篇
力学   25篇
综合类   61篇
数学   404篇
物理学   1948篇
综合类   6510篇
  2024年   25篇
  2023年   64篇
  2022年   156篇
  2021年   133篇
  2020年   142篇
  2019年   118篇
  2018年   144篇
  2017年   190篇
  2016年   244篇
  2015年   279篇
  2014年   491篇
  2013年   392篇
  2012年   458篇
  2011年   559篇
  2010年   480篇
  2009年   464篇
  2008年   556篇
  2007年   675篇
  2006年   593篇
  2005年   563篇
  2004年   512篇
  2003年   467篇
  2002年   341篇
  2001年   274篇
  2000年   228篇
  1999年   175篇
  1998年   149篇
  1997年   130篇
  1996年   96篇
  1995年   83篇
  1994年   60篇
  1993年   53篇
  1992年   63篇
  1991年   32篇
  1990年   29篇
  1989年   33篇
  1988年   19篇
  1987年   13篇
  1986年   9篇
  1985年   9篇
  1984年   3篇
  1983年   3篇
  1982年   6篇
  1980年   3篇
  1977年   4篇
  1976年   3篇
  1974年   2篇
  1973年   5篇
  1969年   1篇
  1955年   1篇
排序方式: 共有9532条查询结果,搜索用时 11 毫秒
101.
This paper considers a multi-user wireless communication network supported by a multiple-antenna base station (BS), where the users who are located sufficiently close to the BS employ wireless energy harvesting (EH) to replenish their energy needs. The objective of this work is to design an efficient beamforming to maximize the minimum throughput among all the information users (IUs), subject to EH constraints. In this regard, transmit time-switching approach is employed, where energy and information are transmitted over different fractions of a time-slot. To achieve efficient EH, a conjugate beamforming (matched filtering) is applied. To design efficient information beamforming for max–min throughput optimization, conventional zero-forcing (ZF) beamforming can be adopted, however, it will not suppress multi-user interference if the number of users is greater than the number of antennas at the BS. To this end, different from the existing works which employ regularized zero-forcing (RZF) beamforming, this work proposes a new generalized zero-forcing (GZF) beamforming, which promises better max–min throughput compared to that achieved by the RZF beamforming. A new path-following algorithm is developed to achieve max–min throughput optimization by GZF beamforming, which is based on a simple convex quadratic program over each iteration.  相似文献   
102.
We consider an intelligent reflecting surface (IRS)-assisted wireless powered communication network (WPCN) in which a multi antenna power beacon (PB) sends a dedicated energy signal to a wireless powered source. The source first harvests energy and then utilizing this harvested energy, it sends an information signal to destination where an external interference may also be present. For the considered system model, we formulated an analytical problem in which the objective is to maximize the throughput by jointly optimizing the energy harvesting (EH) time and IRS phase shift matrices. The optimization problem is high dimensional non-convex, thus a good quality solution can be obtained by invoking any state-of-the-art algorithm such as Genetic algorithm (GA). It is well-known that the performance of GA is generally remarkable, however it incurs a high computational complexity. To this end, we propose a deep unsupervised learning (DUL) based approach in which a neural network (NN) is trained very efficiently as time-consuming task of labeling a data set is not required. Numerical examples show that our proposed approach achieves a better performance–complexity trade-off as it is not only several times faster but also provides almost same or even higher throughput as compared to the GA.  相似文献   
103.
In view of the distinctive characteristics of satellite communication, the physical random access signals used in the terrestrial mobile communication system have to be modified or redesigned for the satellite communication system. In this paper, we boost the random access signal energy by repeating the short Zadoff–Chu (ZC) sequence based preamble signal used in the terrestrial system. Different long ZC sequences are used to scramble this cascaded sequence to distinguish different random access signals for multiple random access user equipments. For correlation performance optimization, properties of the roots for both the short and long ZC sequences are mathematically analyzed and derived. Finally, we illustrate how to construct a root set for these different long ZC sequences based on the obtained propositions in a practical way. This analytical framework provides a useful insight into ZC sequence-based random access signal design and performance analysis in mobile satellite communication systems.  相似文献   
104.
低串扰的多波长光纤光栅色散补偿器   总被引:1,自引:0,他引:1       下载免费PDF全文
分析了光纤光栅色散补偿系统中的串扰,并比较了几种常用的多波长光纤光栅色散补偿器的串扰特性,结合串联的窄带光纤光栅和取样光纤光栅的优点,提出一种抑制光纤光栅色散补偿系统串扰的方法.它通过在邻近信道间引入随机时延差,既能改善取样光纤光栅的线性串扰特性,又能抑制交叉相位调制效应和四波混频等非线性串扰.使用该方法可以得到具有低串扰的多波长光纤光栅色散补偿器.  相似文献   
105.
We present an efficient entanglement purification protocol (EPP) with controlled-not (CNOT) gates and linear optics. With the CNOT gates, our EPP can reach a higher fidelity than the conventional one. Moreover, it does not require the fidelity of the initial mixed state to satisfy F>1/2. If the initial state is not entangled, it still can be purified. With the linear optics, this protocol can get pure maximally entangled pairs with some probabilities. Meanwhile, it can be used to purify the entanglement between the atomic ensembles in distant locations. This protocol may be useful in long-distance quantum communication.  相似文献   
106.
Enhanced Multiparty Controlled QSDC Using GHZ State   总被引:1,自引:0,他引:1  
Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al.'s multiparty controlled quantum secure directcommunication (CQSDC) protocol [Opt. Commun. 266 (2006)732] has the information leakage problem and proposed an improvedprotocol. However, in the improved protocol, due to the introductionof an additional random sampling to avoid the weakness, the qubitefficiency is decreased. By introducing the base changing techniqueto the random sampling in Wang et al.'s protocol, this study overcomesthe information leakage problem and provides a better qubit efficiency.  相似文献   
107.
108.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the "two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used.  相似文献   
109.
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th~ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.  相似文献   
110.
Based on x-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on x-type entangled states |X00〉3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号