首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   260篇
  免费   0篇
数理化   260篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2020年   9篇
  2019年   7篇
  2018年   2篇
  2017年   7篇
  2016年   5篇
  2015年   2篇
  2014年   7篇
  2013年   6篇
  2012年   9篇
  2011年   10篇
  2010年   13篇
  2009年   8篇
  2008年   16篇
  2007年   12篇
  2006年   9篇
  2005年   6篇
  2004年   10篇
  2003年   10篇
  2002年   13篇
  2001年   8篇
  2000年   5篇
  1999年   7篇
  1998年   6篇
  1997年   12篇
  1996年   8篇
  1995年   1篇
  1992年   2篇
  1991年   2篇
  1990年   5篇
  1987年   1篇
  1986年   2篇
  1985年   3篇
  1983年   2篇
  1982年   8篇
  1981年   1篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1976年   5篇
  1975年   3篇
  1973年   2篇
  1971年   2篇
  1969年   3篇
  1968年   1篇
排序方式: 共有260条查询结果,搜索用时 531 毫秒
1.
The coding of quantum communication channels in real time is considered as applied to the situation when information is coded into continuous quantum degrees of freedom (into the shape of the amplitude of quantum states with an arbitrary number of photons). It is shown that the nonlocalizability of states in quantum field theory requires that the identity of particles should be taken into account. This, together with the finiteness of the limit speed of propagation, leads to the fact that the formulas for the transmission rate of nonrelativistic communication channels have an asymptotic character; i.e., these formulas are formally valid only when the separation between messages is infinite (when the identity of particles can be neglected) and, hence, when the transmission rate in [bit/message s] is infinitely small. A real-time information capacity of a sequential relativistic quantum communication channel is obtained that takes into account the identity of particles for pure signal states with an arbitrary number of photons. An explicit analytic expression is obtained for the transmission rate of a quantum channel of finite bandwidth for one-photon input states.  相似文献   
2.
A “collective” attack on the key is considered, and its connection with the classical capacity of a quantum communication channel is analyzed. It has been shown that the allowable error probability for legitimate users to which the secure key can be extracted is less than half the value for “translucent” eavesdropping and individual measurements.  相似文献   
3.
A principally new approach ensuring secure key distribution via an open quantum communication channel is proposed. In contrast to the existing schemes, in which the security is based upon special properties of nonorthogonal states in the Hilbert space, the security of the proposed scheme relies on a spacetime structure of states and on certain constraints imposed by special relativity. Using these factors, it is possible to provide for secure key transmission using practically arbitrary quantum states.  相似文献   
4.
A new relativistic quantum cryptosystem is proposed in which the information is carried by the extended single-photon states with orthogonal polarizations and effective length exceeding the communication channel length. The light “arrest” effect is used as a procedure for the detection and preparation of extended states. The cryptosystem is secure against any eavesdropping attempts, because its states are quantized and the propagation velocity is limited. In this scheme, the preparation and detection procedures are local in space but require a finite time, depending on the extension of the states. The preparation for detecting at the receiver end begins before the state left the source at the input end.  相似文献   
5.
6.
Theoretical and Mathematical Physics - We construct a quantum kinetic theory of a weakly interacting critical boson gas using the expectation values of products of Heisenberg field operators in the...  相似文献   
7.
Balygin  K. A.  Kulik  S. P.  Molotkov  S. N. 《JETP Letters》2022,116(2):128-132
JETP Letters - A simple fundamental modification of quantum key distribution protocols has been proposed: it is not required to protect the results of avalanche detectors from an eavesdropper, but...  相似文献   
8.
To investigate the propagation of normal waves in a free, transversally isotropic, elastic layer it is necessary to determine the roots of the corresponding dispersion equation. It is shown that with increasing wave number the roots move monotonically along the axis of the phase velocity. The initial and final points of the roots are found. Examples of computations of the roots are given.Translated from Zapiski Nauchnykh Seminarov Leningradskogo Otdeleniya Matematicheskogo Instituta im. V. A. Steklova AN SSSR, Vol. 99, pp. 85–103, 1980.  相似文献   
9.
For a medium in which porous and elastic layers alternate and there is slide contact on the interfaces, an effective model is established. This model is of three phases and includes two elastic phases and one fluid phase. Specific features of this effective model are that two waves with triangular front sets propagate and the second (slow) longitudinal wave is absent in it. In the special case where the thickness of elastic layers is very small but they continue to work as barriers for fluid particles from porous layers, the effective model is of two phases, and one of the triangular front sets disappears. Bibliography: 14 titles.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号