首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29篇
  免费   48篇
  国内免费   34篇
数理化   111篇
  2017年   5篇
  2014年   2篇
  2013年   1篇
  2012年   1篇
  2009年   6篇
  2008年   7篇
  2007年   16篇
  2006年   12篇
  2005年   11篇
  2004年   8篇
  2003年   9篇
  2002年   5篇
  2001年   2篇
  2000年   5篇
  1999年   1篇
  1998年   3篇
  1997年   3篇
  1996年   1篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   4篇
  1991年   1篇
  1989年   1篇
  1985年   1篇
  1982年   1篇
排序方式: 共有111条查询结果,搜索用时 15 毫秒
91.
We present two schemes for multiparty quantum remote secret conference in which each legitimate conferee can read out securely the secret message announced by another, but a vicious eavesdropper can get nothing about it. The first one is based on the same key shared efficiently and securely by all the parties with Greenberger-Horne- Zeilinger (GHZ) states, and each conferee sends his secret message to the others with one-time pad crypto-system. The other one is based on quantum encryption with a quantum key~ a sequence of GHZ states shared among all the conferees and used repeatedly after confirming their security. Both these schemes are optimal as their intrinsic efficiency for qubits approaches the maximal value.  相似文献   
92.
实验测量了7Li+11B 体系的弹性散射角分布,其中弹核7Li 的入射能量分别为9.85,13.3,18.3,23.3 和28.3 MeV,测量的角度范围为θc:m: ≈ 15◦ ∼ 80◦。通过对本次实验数据以及文献中34 MeV 的数据拟合,抽取了该体系的唯象光学势参数。结果表明,在固定作用势形状因子下,势深度与能量具有线性相依的关系:实部深度随着弹核能量的增加而线性减小,而虚部深度则在平均值10.35 MeV 附近变化。Angular distributions of 7Li+11B elastic scattering were measured at Elab(7Li)=9.85, 13.3, 18.3, 23.3 and 28.3 MeV within the angular range of θc:m: ≈ 15◦ s 80◦. The analyse of these angular distributions together with the data taken from literatures at Elab(7Li) = 34 MeV have been performed to extract the parameters of optical model potential. With the fixed geometrical shapes, the potential strengths show a concise relation to the reaction energy: the depths of real potential decrease linearly with energy increasing, whereas the depths of imaginary part just slightly vary around the average value of 10.35 MeV.  相似文献   
93.
刘祖华  周宏余 《中国物理》2005,14(8):1544-1548
恒星能量下俘获截面很难直接测量。10Be(n,γ)11Be俘获反应涉及到非均匀宇宙大爆炸核合成,无直接测量实验截面数据。利用转移反应10Be(d,p)11Be的渐近归一化系数(ANC)方法,计算了10Be(n,γ)11Be俘获反应截面和反应率。11Be是中子晕核。研究表明,在恒星能量下俘获到晕态的截面和反应率显著增大。  相似文献   
94.
用双光子激光扫描显微镜技术观测200keV V+离子从不同方向注入花生干种子的 深度-浓度 分布,发现沿纵向和横向注入的离子在样品中的深度-浓度分布有显著差别,即分布具有方 向效应.初步分析了造成注入离子分布出现方向效应的原因. 关键词: 离子注入 植物种子 深度-浓度分布 方向效应  相似文献   
95.
测量了^Li ^208Pb熔合反应近垒能区全熔合截面,并与考虑非弹道耦合和不考虑耦合的CCFU5程序计算做了比较。结果表明在垒上能区,破裂使熔合截面减小,在垒下能区,破裂对熔合截面的影响基本上可以忽略。  相似文献   
96.
如今社会,商品琳琅满目,绝大多数商品供过于求,漫步大街上,各商家促销手段多种多样,“节假日促销”上大做文章对商家来说更是费尽心机:打折、赠送礼物、抽奖、赠送现金券等.那么,这些促销方式中有什么学问呢?商家所得利润,商家心中有数,作为消费者的  相似文献   
97.
系统总结了研究近垒和垒下重离子熔合裂变反应碎片各向异性的异常的结果 ,提出一个新的预平衡裂变模型,成功地解释了碎片各向异性的异常现象 .但对异常宽峰结构不能说明 ,有待进一步研究. Systematic summary on the anomalous anisotropies of fission fragments in near and sub barrier fusion fission reactions is presented. A new version of the preequilibrium fission model is put forward to explain the anomalous anisotropies of fission fragments, except the bump of anomaly. Further study is still needed.  相似文献   
98.
重离子生物分子作用中的电子能损   总被引:1,自引:1,他引:0  
对重离子与生物分子相互作用中能量损失的物理机制进行了分析和讨论, 对现有电子能量损失的研究进展进行了评述, 指出将要研究的方向。  相似文献   
99.
This paper presents a scheme for faithfully distributing a pure entanglement between two parties over an arbitrary collective-noise channel with linear optics. The transmission is assisted by an additional qubit against collective noise. The receiver can take advantage of the time discrimination and the measurement results of the assistant qubit to reconstruct a pure entanglement with the sender. Although the scheme succeeds probabilistically, the resource used to get a pure entanglement state is finite, and so is easier to establish entanglement in practice than quantum entanglement purification.  相似文献   
100.
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号