首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113269篇
  免费   3449篇
  国内免费   1721篇
工业技术   118439篇
  2024年   134篇
  2023年   490篇
  2022年   879篇
  2021年   1224篇
  2020年   976篇
  2019年   741篇
  2018年   15171篇
  2017年   14227篇
  2016年   10729篇
  2015年   1720篇
  2014年   1568篇
  2013年   1924篇
  2012年   4975篇
  2011年   11318篇
  2010年   10050篇
  2009年   7187篇
  2008年   8355篇
  2007年   9390篇
  2006年   1753篇
  2005年   2703篇
  2004年   2134篇
  2003年   2058篇
  2002年   1441篇
  2001年   803篇
  2000年   993篇
  1999年   910篇
  1998年   761篇
  1997年   594篇
  1996年   608篇
  1995年   433篇
  1994年   378篇
  1993年   292篇
  1992年   235篇
  1991年   181篇
  1990年   104篇
  1989年   107篇
  1988年   100篇
  1987年   52篇
  1986年   38篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Big data technologies and a range of Government open data initiatives provide the basis for discovering new insights into cities; how they are planned, how they managed and the day-to-day challenges they face in health, transport and changing population profiles. The Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) project is one example of such a big data initiative that is currently running across Australia. AURIN provides a single gateway providing online (live) programmatic access to over 2000 data sets from over 70 major and typically definitive data-driven organizations across federal and State government, across industry and across academia. However whilst open (public) data is useful to bring data-driven intelligence to cities, more often than not, it is the data that is not-publicly accessible that is essential to understand city challenges and needs. Such sensitive (unit-level) data has unique requirements on access and usage to meet the privacy and confidentiality demands of the associated organizations. In this paper we highlight a novel geo-privacy supporting solution implemented as part of the AURIN project that provides seamless and secure access to individual (unit-level) data from the Department of Health in Victoria. We illustrate this solution across a range of typical city challenges in localized contexts around Melbourne. We show how unit level data can be combined with other data in a privacy-protecting manner. Unlike other secure data access and usage solutions that have been developed/deployed, the AURIN solution allows any researcher to access and use the data in a manner that meets all of the associated privacy and confidentiality concerns, without obliging them to obtain ethical approval or any other hurdles that are normally put in place on access to and use of sensitive data. This provides a paradigm shift in secure access to sensitive data with geospatial content.  相似文献   
992.
993.
In this paper some results associated with a new type of Yang–Baxter equation (YBE) are reviewed. The braiding matrix of Kauffman–Lomonaco has been extended to the solution (called type-II) of Yang–Baxter equation (YBE) and the related chain Hamiltonian is given. The Lorentz additivity for spectral parameters is found, rather than the Galilean rule for the familiar solutions (called type-I) of YBE associated with the usually exact solvable models. Based on the topological basis, the N-dimensional solution of YBE is found to be the Wigner D-functions. The explicit examples for spin-\(\frac{1}{2}\) and spin-1 have been shown. The extremes of \(\ell _1\)-norm of \(D\)-functions are introduced to distinguish the type-I from type-II of braiding matrices that also correspond to those of von Neumann entropy for quantum information.  相似文献   
994.
995.
We propose a four-state quantum key distribution (QKD) scheme using generalized measurement of nonorthogonal states, the maximum mutual information measurement strategy. Then, we analyze the eavesdropping process in intercept–resend and photon number splitting attack scenes. Our analysis shows that in the intercept–resend and photon number splitting attack eavesdropping scenes, our scheme is more secure than BB84 protocol and has higher key generation rate which may be applied to high-density QKD.  相似文献   
996.
In this work, we explore the accuracy of quantum error correction depending of the order of the implemented syndrome measurements. CSS codes require that bit-flip and phase-flip syndromes be measured separately. To comply with fault-tolerant demands and to maximize accuracy, this set of syndrome measurements should be repeated allowing for flexibility in the order of their implementation. We examine different possible orders of Shor-state and Steane-state syndrome measurements for the [[7,1,3]] quantum error correction code. We find that the best choice of syndrome order, determined by the fidelity of the state after noisy error correction, will depend on the error environment. We also compare the fidelity when syndrome measurements are done with Shor states versus Steane states and find that Steane states generally, but not always, lead to final states with higher fidelity. Together, these results allow a quantum computer programmer to choose the optimal syndrome measurement scheme based on the system’s error environment.  相似文献   
997.
In this paper, a nonlinear entanglement witness criterion based on continuous-variable local orthogonal observables for bipartite states is established, which is strictly stronger than the the linear entanglement witnesses criterion introduced by Zhang et al. (Phys. Rev. Lett. 111:190501, 2013). This criterion is particularly applied to two-mode Gaussian states yielding a criterion in terms of the covariance matrix. Comparison with CCNR criterion is discussed.  相似文献   
998.
Based on the quantum Zeno dynamics, a scheme is presented to implement a Toffoli gate of three separated superconducting qubits (SQs) by one step. Three separated SQs are connected by two resonators. The scheme is insensitive to the resonator decay because the Zeno subspace does not include the state of the resonators being excited. Numerical simulations indicate that the scheme is robust to the fluctuation of the parameters and the Toffoli gate can be implemented with high fidelity.  相似文献   
999.
Employing a polarization-entangled \(\chi \) state, which is a four-photon genuine entangled state, we propose a protocol teleporting a general two-photon polarization state. Firstly, the sender needs to perform one Controlled-NOT gate, one Hadamard gate, and one Controlled-NOT gate on the state to be teleported in succession. Secondly, the sender performs local nondemolition parity analyses based on cross-Kerr nonlinearities and publicizes the achieved outcomes. Finally, conditioned on the sender’s analysis outcomes, the receiver executes the single-photon unitary transformation operations on his own photons to obtain the state originally sit in the sender’s location. Due to the employment of nondemolition parity analyses rather than four-qubit joint measurement, it can be realized more feasible with currently available technologies. Moreover, the resources of Bell states can be achieved because the nondestructive measurement is exploited, which facilitates other potential tasks of quantum information processing.  相似文献   
1000.
A scheme is proposed to generate three-atom GHZ states by applying the inversely engineered control method on the basis of Lewis–Riesenfeld invariants. In the proposal, three atoms that have different configurations are trapped in a bimodal cavity. Numerical simulations indicate that our protocol has an obvious improvement of speed for the generation of GHZ states. Moreover, the present scheme is robust against both parameter fluctuations and dissipation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号