首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1114篇
  免费   120篇
  国内免费   75篇
化学   9篇
力学   1篇
综合类   14篇
数学   46篇
物理学   367篇
综合类   872篇
  2024年   7篇
  2023年   9篇
  2022年   44篇
  2021年   37篇
  2020年   30篇
  2019年   23篇
  2018年   18篇
  2017年   59篇
  2016年   29篇
  2015年   41篇
  2014年   84篇
  2013年   73篇
  2012年   72篇
  2011年   84篇
  2010年   55篇
  2009年   64篇
  2008年   79篇
  2007年   84篇
  2006年   79篇
  2005年   97篇
  2004年   58篇
  2003年   49篇
  2002年   26篇
  2001年   25篇
  2000年   13篇
  1999年   10篇
  1998年   16篇
  1997年   15篇
  1996年   3篇
  1995年   4篇
  1994年   6篇
  1993年   6篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
排序方式: 共有1309条查询结果,搜索用时 816 毫秒
101.
随着通信与网络的快速发展,能够包含大容量信息的影片得到了广泛应用。利用分数阶傅里叶变换的特点,提出了一种全光学加密解密影片的方法。将现有的影片加密密钥从二重变为了四重,显著增加了影片的安全性。通过改变振幅型正弦光栅的作用位置,将影片的加密解密次数由现有的每帧各一次减小为总共一次,优化了算法。仿真结果验证了该方法的有效性。  相似文献   
102.
We complement two papers on supertropical valuation theory ([11 Izhakian , Z. , Knebusch , M. , Rowen , L. ( 2011 ). Supertropical semirings and supervaluations . J. Pure and Applied Alg. 215 ( 10 ): 24312463 . Preprint at arXiv:1003.1101 .[Crossref], [Web of Science ®] [Google Scholar]], [12 Izhakian , Z. , Knebusch , M. , Rowen , L. ( 2013 ). Dominance and transmissions in supertropical valuation theory . Commun. Algebra 41 ( 7 ): 27362782 .[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]]) by providing natural examples of m-valuations (= monoid valuations), and afterwards of supervaluations and transmissions between them. These supervaluations have values in totally ordered supertropical semirings, and the transmissions discussed respect the orderings. We develop the basics of the theory of such semirings and transmissions.  相似文献   
103.
In this paper, a novel image encryption scheme is proposed based on reversible cellular automata (RCA) combining chaos. In this algorithm, an intertwining logistic map with complex behavior and periodic boundary reversible cellular automata are used. We split each pixel of image into units of 4 bits, then adopt pseudorandom key stream generated by the intertwining logistic map to permute these units in confusion stage. And in diffusion stage, two-dimensional reversible cellular automata which are discrete dynamical systems are applied to iterate many rounds to achieve diffusion on bit-level, in which we only consider the higher 4 bits in a pixel because the higher 4 bits carry almost the information of an image. Theoretical analysis and experimental results demonstrate the proposed algorithm achieves a high security level and processes good performance against common attacks like differential attack and statistical attack. This algorithm belongs to the class of symmetric systems.  相似文献   
104.
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.  相似文献   
105.
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting.  相似文献   
106.
A single-channel color image encryption is proposed based on a phase retrieve algorithm and a two-coupled logistic map. Firstly, a gray scale image is constituted with three channels of the color image, and then permuted by a sequence of chaotic pairs generated by the two-coupled logistic map. Secondly, the permutation image is decomposed into three new components, where each component is encoded into a phase-only function in the fractional Fourier domain with a phase retrieve algorithm that is proposed based on the iterative fractional Fourier transform. Finally, an interim image is formed by the combination of these phase-only functions and encrypted into the final gray scale ciphertext with stationary white noise distribution by using chaotic diffusion, which has camouflage property to some extent. In the process of encryption and decryption, chaotic permutation and diffusion makes the resultant image nonlinear and disorder both in spatial domain and frequency domain, and the proposed phase iterative algorithm has faster convergent speed. Additionally, the encryption scheme enlarges the key space of the cryptosystem. Simulation results and security analysis verify the feasibility and effectiveness of this method.  相似文献   
107.
一种基于混沌的图像加密改进方法   总被引:9,自引:0,他引:9  
在对现有的两类图像加密方法安全性分析的基础上,提出了一种改进的图像加密方法.这种方法基于传统混沌加密算法,利用混沌系统对初始条件的敏感依赖性,在图像加密过程中引入一个辅助密钥,可有效抵抗已知明文攻击.分析及计算机仿真结果表明,该加密方法具有良好的加密效果,运算量小,易于硬件实现。  相似文献   
108.
针对蓝牙技术安全性问题分析了蓝牙系统的专全需求和安全威胁,提出了蓝牙安全结构,并钎对蓝牙系统安全的两种主要模式即链路级安全模式和服等级安全模式进行了重点分析,提出了解决蓝牙安全问题的安全策略。  相似文献   
109.
张海莹  冉启文  张晋 《光学学报》2008,28(s2):117-120
为了提高图像加密的安全性, 提出了一种多参数加权类分数傅里叶变换。此类多参数加权类分数傅里叶变换是C.C.Shih提出的四项加权类分数傅里叶变换的一种扩展, 除了分数阶数, 还有四个在四项加权系数之中的自由参数, 称其为向量参数。同时给出此多参数加权类分数傅里叶变换的离散形式, 并把这种算法应用到光学图像加密中。此算法在应用一次二维分数傅里叶变换可以有十个密键:一类为阶数参数; 另一类为向量参数, 因此这种加密算法在增加了安全性的同时, 加密过程的复杂度降低。数值仿真验证了此算法的有效性和可靠性。  相似文献   
110.
分析了常用计算机网络安全保护手段的特点,建立了一个互相联系、环环相扣的网络安全体系结构,可以有效保护计算机网络以及网络数据的安全。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号