全文获取类型
收费全文 | 1114篇 |
免费 | 120篇 |
国内免费 | 75篇 |
专业分类
化学 | 9篇 |
力学 | 1篇 |
综合类 | 14篇 |
数学 | 46篇 |
物理学 | 367篇 |
综合类 | 872篇 |
出版年
2024年 | 7篇 |
2023年 | 9篇 |
2022年 | 44篇 |
2021年 | 37篇 |
2020年 | 30篇 |
2019年 | 23篇 |
2018年 | 18篇 |
2017年 | 59篇 |
2016年 | 29篇 |
2015年 | 41篇 |
2014年 | 84篇 |
2013年 | 73篇 |
2012年 | 72篇 |
2011年 | 84篇 |
2010年 | 55篇 |
2009年 | 64篇 |
2008年 | 79篇 |
2007年 | 84篇 |
2006年 | 79篇 |
2005年 | 97篇 |
2004年 | 58篇 |
2003年 | 49篇 |
2002年 | 26篇 |
2001年 | 25篇 |
2000年 | 13篇 |
1999年 | 10篇 |
1998年 | 16篇 |
1997年 | 15篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有1309条查询结果,搜索用时 816 毫秒
101.
随着通信与网络的快速发展,能够包含大容量信息的影片得到了广泛应用。利用分数阶傅里叶变换的特点,提出了一种全光学加密解密影片的方法。将现有的影片加密密钥从二重变为了四重,显著增加了影片的安全性。通过改变振幅型正弦光栅的作用位置,将影片的加密解密次数由现有的每帧各一次减小为总共一次,优化了算法。仿真结果验证了该方法的有效性。 相似文献
102.
We complement two papers on supertropical valuation theory ([11], [12]) by providing natural examples of m-valuations (= monoid valuations), and afterwards of supervaluations and transmissions between them. These supervaluations have values in totally ordered supertropical semirings, and the transmissions discussed respect the orderings. We develop the basics of the theory of such semirings and transmissions. 相似文献
103.
Xingyuan Wang Dapeng Luan 《Communications in Nonlinear Science & Numerical Simulation》2013,18(11):3075-3085
In this paper, a novel image encryption scheme is proposed based on reversible cellular automata (RCA) combining chaos. In this algorithm, an intertwining logistic map with complex behavior and periodic boundary reversible cellular automata are used. We split each pixel of image into units of 4 bits, then adopt pseudorandom key stream generated by the intertwining logistic map to permute these units in confusion stage. And in diffusion stage, two-dimensional reversible cellular automata which are discrete dynamical systems are applied to iterate many rounds to achieve diffusion on bit-level, in which we only consider the higher 4 bits in a pixel because the higher 4 bits carry almost the information of an image. Theoretical analysis and experimental results demonstrate the proposed algorithm achieves a high security level and processes good performance against common attacks like differential attack and statistical attack. This algorithm belongs to the class of symmetric systems. 相似文献
104.
Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices 下载免费PDF全文
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack. 相似文献
105.
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting. 相似文献
106.
Liansheng Sui Meiting Xin Ailing Tian Haiyan Jin 《Optics and Lasers in Engineering》2013,51(12):1297-1309
A single-channel color image encryption is proposed based on a phase retrieve algorithm and a two-coupled logistic map. Firstly, a gray scale image is constituted with three channels of the color image, and then permuted by a sequence of chaotic pairs generated by the two-coupled logistic map. Secondly, the permutation image is decomposed into three new components, where each component is encoded into a phase-only function in the fractional Fourier domain with a phase retrieve algorithm that is proposed based on the iterative fractional Fourier transform. Finally, an interim image is formed by the combination of these phase-only functions and encrypted into the final gray scale ciphertext with stationary white noise distribution by using chaotic diffusion, which has camouflage property to some extent. In the process of encryption and decryption, chaotic permutation and diffusion makes the resultant image nonlinear and disorder both in spatial domain and frequency domain, and the proposed phase iterative algorithm has faster convergent speed. Additionally, the encryption scheme enlarges the key space of the cryptosystem. Simulation results and security analysis verify the feasibility and effectiveness of this method. 相似文献
107.
一种基于混沌的图像加密改进方法 总被引:9,自引:0,他引:9
在对现有的两类图像加密方法安全性分析的基础上,提出了一种改进的图像加密方法.这种方法基于传统混沌加密算法,利用混沌系统对初始条件的敏感依赖性,在图像加密过程中引入一个辅助密钥,可有效抵抗已知明文攻击.分析及计算机仿真结果表明,该加密方法具有良好的加密效果,运算量小,易于硬件实现。 相似文献
108.
徐艳 《华北科技学院学报》2005,2(4):42-45
针对蓝牙技术安全性问题分析了蓝牙系统的专全需求和安全威胁,提出了蓝牙安全结构,并钎对蓝牙系统安全的两种主要模式即链路级安全模式和服等级安全模式进行了重点分析,提出了解决蓝牙安全问题的安全策略。 相似文献
109.
为了提高图像加密的安全性, 提出了一种多参数加权类分数傅里叶变换。此类多参数加权类分数傅里叶变换是C.C.Shih提出的四项加权类分数傅里叶变换的一种扩展, 除了分数阶数, 还有四个在四项加权系数之中的自由参数, 称其为向量参数。同时给出此多参数加权类分数傅里叶变换的离散形式, 并把这种算法应用到光学图像加密中。此算法在应用一次二维分数傅里叶变换可以有十个密键:一类为阶数参数; 另一类为向量参数, 因此这种加密算法在增加了安全性的同时, 加密过程的复杂度降低。数值仿真验证了此算法的有效性和可靠性。 相似文献
110.
分析了常用计算机网络安全保护手段的特点,建立了一个互相联系、环环相扣的网络安全体系结构,可以有效保护计算机网络以及网络数据的安全。 相似文献