全文获取类型
收费全文 | 160篇 |
免费 | 20篇 |
国内免费 | 7篇 |
专业分类
化学 | 43篇 |
综合类 | 20篇 |
数学 | 61篇 |
物理学 | 63篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 9篇 |
2021年 | 6篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 4篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 10篇 |
2013年 | 10篇 |
2012年 | 10篇 |
2011年 | 9篇 |
2010年 | 8篇 |
2009年 | 14篇 |
2008年 | 10篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 5篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 10篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 2篇 |
排序方式: 共有187条查询结果,搜索用时 156 毫秒
51.
It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a content-based image hashing scheme using wave atoms is proposed, which satisfies the above criteria. Compared with traditional transforms like wavelet transform and discrete cosine transform (DCT), wave atom transform is adopted for the sparser expansion and better characteristics of texture feature extraction which shows better performance in both robustness and fragility. In addition, multi-frequency detection is presented to provide an application-defined trade-off. To ensure the security of the proposed approach and its resistance to a chosen-plaintext attack, a randomized pixel modulation based on the R′enyi chaotic map is employed, combining with the nonliner wave atom transform. The experimental results reveal that the proposed scheme is robust against content-preserving manipulations and has a good discriminative capability to malicious tampering. 相似文献
52.
运用公开密钥基础设施非对称密码算法原理和技术,设计了基于PKI的移动应用身份认证系统.详细阐述了该身份认证系统的模块结构、模块功能以及数字证书的验证流程,可为相关应用提供参考. 相似文献
53.
针对目前Web站点的身份认证安全问题,提出了一种基于手机令牌和近距离无线通信(NFC,near field communication)技术的身份认证方法,并在Android平台上实现了该系统.该系统利用手机使用手机令牌实现了USBKey的主要功能,当用户访问站点进行注册时,将获得惟一的手机令牌并存于带有加解密功能的手机中.在下次访问站点进行身份认证时,用户可通过手机直接在Web站点进行身份认证,也可通过NFC技术将手机令牌传于PC机,使得用户可在PC机上利用手机进行身份认证.该系统将手机作为类USBKey设备,在增强Web站点身份认证安全的同时,省去了为用户颁发USBKey的流程和成本,具有较强的实用价值. 相似文献
54.
55.
为了提高视频手写签名认证的准确率,确保身份认证的严谨性,需要对HMM模型下视频手写签名认证算法进行改进设计。使用当前算法对视频手写签名进行认证时,存在认证判断误差大、效率低的问题。提出基于HMM模型下视频手写签名认证算法。该算法将使用Wacom手写板采集手写签名特征点及压力数据,对采集到的手写签名特征与压力数据进行预处理,消除采集过程中环境和手写板产生的影响,并且规范采集的视频手写签名特征位置、尺寸,提取手写签名特征与压力数据,再以HMM模型对已提取的视频手写签名特征点与压力数据进行认证与计算,确定签名的真实度。实验仿真证明,所提算法提高了视频签名认证的性能。 相似文献
56.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献
57.
蛋白质组学作为后基因组时代的一个新研究方向,近几年发展迅速,目前已应用于多个领域,在食品品质检测和安全控制方面成为有力的研究工具。蛋白质组学为食品科学的相关研究打开了新思路,不仅可以鉴定蛋白质种类,还可进行蛋白质定量,为分析不同物种、产地、成熟阶段的食品蛋白质组分和含量提供了可能。蛋白质组学研究手段多样,质谱是常用技术之一。该文介绍了蛋白质组学的概念、分类、研究技术以及常见蛋白质数据库,综述了基于质谱的蛋白质组学技术在真伪鉴别和品质检测方面的应用,涉及海鲜、肉制品、奶制品、保健食品及高附加值食品等多种食品,并对蛋白质组学的发展进行了展望。 相似文献
58.
Ahmed Farouk J. Batle M. Elhoseny Mosayeb Naseri Muzaffar Lone Alex Fedorov Majid Alkhambashi Syed Hassan Ahmed M. Abdel-Aty 《Frontiers of Physics》2018,13(2):130306
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General Nuser authentication protocol based on N-particle Greenberger–Horne–Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero. 相似文献
59.
分析了质量管理体系要求中的内部审核与《电子元器件质量保证大纲》中的内部质量审核的异同,论述了在执行《电子元器件质量保证大纲》中的内部质量审核的实施。 相似文献
60.
Two simple quantum broadcast communication schemes are proposed.A central party can broadcast his secret message to all the legitimate receivers simultaneously.Compared with the three schemes proposed recently (Wang et al.2007 Chin.Phys.16 1868),the proposed schemes have the advantages of consuming fewer quantum and classical resources,lessening the difficulty and intensity of necessary operations,and having higher efficiency. 相似文献