首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   160篇
  免费   20篇
  国内免费   7篇
化学   43篇
综合类   20篇
数学   61篇
物理学   63篇
  2024年   1篇
  2023年   4篇
  2022年   9篇
  2021年   6篇
  2020年   5篇
  2019年   5篇
  2018年   4篇
  2017年   8篇
  2016年   4篇
  2015年   1篇
  2014年   10篇
  2013年   10篇
  2012年   10篇
  2011年   9篇
  2010年   8篇
  2009年   14篇
  2008年   10篇
  2007年   12篇
  2006年   9篇
  2005年   10篇
  2004年   6篇
  2003年   2篇
  2002年   1篇
  2001年   5篇
  2000年   5篇
  1999年   3篇
  1998年   10篇
  1997年   3篇
  1996年   1篇
  1995年   2篇
排序方式: 共有187条查询结果,搜索用时 15 毫秒
1.
本文研究带仲裁认证码(亦称A^2-码)。一个A^2-码,当它的欺骗攻击成功概率达到信息论下界且密钥长度也达到最小时称为是最优的。本文给出最优A^2-码的组合结构的特征,从而将构造最优A^2-码的问题归结为构造相应的一类组合设计的问题。  相似文献   
2.
Isotopic ratios of δ13CVPDB and δ18OVSMOW have been used as an additional parameter to ensure the authenticity of the aging time of 100% agave tequila. For this purpose, 120 samples were isotopically analyzed (40 silver class, 40 aged class, and 40 extra-aged classes). The samples were obtained through a stratified sampling by proportional allocation, considering tequila producers from the main different regions of Jalisco, Mexico (Valles 41%, Altos Sur 31%, Cienega 16%, and Centro 12%). The results showed that the δ13CVPDB was found in an average of −12.85 ‰ for all the analyzed beverages, with no significant difference between them. Since for all the tested samples the Agave tequilana Weber blue variety was used as source of sugar to obtain alcohol, those results were foreseeable, and confirm the origin of the sugar source. Instead, the results for δ18OVSMOW showed a positive slope linear trend for the aging time (silver class 19.52‰, aged class 20.54‰, extra-aged class 21.45‰), which is associated with the maturation process, there are oxidation reactions that add congeneric compounds to the beverage, these can be used as tracers for the authenticity of the aging time. Additionally, the experimental data showed homogeneity in the beverages regardless of the production region, evidencing the tequila industry’s high-quality standards. However, a particular case occurs with the δ18OVSMOW data for the silver class samples, in which a clear trend is noted with the altitude of the region of origin; therefore, this information suggests that this analytical parameter could be useful to authenticate the regional origin of beverage.  相似文献   
3.
Currently, the authentication analysis of edible fats and oils is an emerging issue not only by producers but also by food industries, regulators, and consumers. The adulteration of high quality and expensive edible fats and oils as well as food products containing fats and oils with lower ones are typically motivated by economic reasons. Some analytical methods have been used for authentication analysis of food products, but some of them are complex in sampling preparation and involving sophisticated instruments. Therefore, simple and reliable methods are proposed and developed for these authentication purposes. This review highlighted the comprehensive reports on the application of infrared spectroscopy combined with chemometrics for authentication of fats and oils. New findings of this review included (1) FTIR spectroscopy combined with chemometrics, which has been used to authenticate fats and oils; (2) due to as fingerprint analytical tools, FTIR spectra have emerged as the most reported analytical techniques applied for authentication analysis of fats and oils; (3) the use of chemometrics as analytical data treatment is a must to extract the information from FTIR spectra to be understandable data. Next, the combination of FTIR spectroscopy with chemometrics must be proposed, developed, and standardized for authentication and assuring the quality of fats and oils.  相似文献   
4.
我国油料产品品质的近红外光谱快速检测技术研究进展   总被引:1,自引:0,他引:1  
近红外光谱技术是一种快速无损检测技术,具有操作简单、检测成本低、无需化学试剂、绿色环保,以及可实现多品质参数同步检测等优点。该文综述了我国油料和食用植物油品质的近红外光谱速测技术研究进展,包括油料含油量、粗蛋白含量、脂肪酸含量等品质指标,食用油的理化指标,以及脂肪酸和食用油的真实性鉴别,并对油料产品品质的近红外光谱速测技术的发展前景进行了展望。  相似文献   
5.
Direct infusion electrospray ionization mass spectrometry in the positive ion mode [ESI(+)‐MS] is used to obtain fingerprints of aqueous–methanolic extracts of two types of olive oils, extra virgin (EV) and ordinary (OR), as well as of samples of EV olive oil adulterated by the addition of OR olive oil and other edible oils: corn (CO), sunflower (SF), soybean (SO) and canola (CA). The MS data is treated by the partial least squares discriminant analysis (PLS‐DA) protocol aiming at discriminating the above‐mentioned classes formed by the genuine olive oils, EV (1) and OR (2), as well as the EV adulterated samples, i.e. EV/SO (3), EV/CO (4), EV/SF (5), EV/CA (6) and EV/OR (7). The PLS‐DA model employed is built with 190 and 70 samples for the training and test sets, respectively. For all classes (1–7), EV and OR olive oils as well as the adulterated samples (in a proportion varying from 0.5 to 20.0% w/w) are properly classified. The developed methodology required no ions identification and demonstrated to be fast, as each measurement lasted about 3 min including the extraction step and MS analysis, and reliable, because high sensitivities (rate of true positives) and specificities (rate of true negatives) were achieved. Finally, it can be envisaged that this approach has potential to be applied in quality control of EV olive oils. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
6.
A new modified remote user authentication scheme using smart cards   总被引:1,自引:0,他引:1  
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.  相似文献   
7.
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer.  相似文献   
8.
Holographic watermarking for authentication of cut images   总被引:3,自引:0,他引:3  
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).  相似文献   
9.
This paper is devoted to constructing an authentication code with arbitration using subspaces of vector spaces over finite fields.Moreover,if we choose the encoding rules of the transmitter and the decoding rules of the receiver according to a uniform probability distribution,then some parameters and the probabilities of successful attacks are computed.  相似文献   
10.
2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号