全文获取类型
收费全文 | 480篇 |
免费 | 107篇 |
国内免费 | 1篇 |
专业分类
化学 | 10篇 |
力学 | 14篇 |
综合类 | 16篇 |
数学 | 49篇 |
物理学 | 27篇 |
无线电 | 472篇 |
出版年
2025年 | 2篇 |
2024年 | 8篇 |
2023年 | 7篇 |
2022年 | 10篇 |
2021年 | 12篇 |
2020年 | 17篇 |
2019年 | 17篇 |
2018年 | 10篇 |
2017年 | 18篇 |
2016年 | 23篇 |
2015年 | 19篇 |
2014年 | 34篇 |
2013年 | 18篇 |
2012年 | 38篇 |
2011年 | 23篇 |
2010年 | 26篇 |
2009年 | 34篇 |
2008年 | 25篇 |
2007年 | 34篇 |
2006年 | 30篇 |
2005年 | 22篇 |
2004年 | 22篇 |
2003年 | 26篇 |
2002年 | 16篇 |
2001年 | 11篇 |
2000年 | 13篇 |
1999年 | 3篇 |
1998年 | 13篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有588条查询结果,搜索用时 15 毫秒
101.
PCM/PPK telemetry system is a multinary pulse modulation system. It is commonly used to transmit high-accuracy time information and some express signals. To the issue of security that telemetry data is transmitted in the open space, a data encryption scheme in the PCM/PPK telemetry system is proposed. In this scheme, the PCM data of signal source are encrypted by stream cipher in which key streams are generated with clock control LSFR. The scheme can save system resource in the dual-modulation compound telemetry system. A backward key synchronization scheme is also proposed, which has the property of strong real-time and easy to implement. A simplified simulation model of PCM/PPK remote system is established based on the actual framework of telemetry system, and the model is simple and easy to simulate. The error performance of the system is analyzed in theory and tested by computer simulation. Also the security of the system is analyzed. The simulation and analysis results show that the encryption scheme can ensure the security of the telemetry data and does not cause error-diffusion. 相似文献
102.
随着智能移动设备的广泛普及,家庭用户逐渐渴望能够在智能终端上收看数字电视节目。由于传统家庭内部的机顶盒只能提供有线数字电视信号,因此本文研究了一种基于UDP协议的室内无线接收DVB-C信号的方法,并分析了MPEG-2 TS的相关原理及室内无线传输损耗,在此基础上讨论了方案的可行性。 相似文献
103.
模2n+1乘法(n=8、16)在分组密码算法中比较常见,如IDEA算法,但由于其实现逻辑复杂,往往被视为密码算法性能的瓶颈。提出了一种适用于分组密码算法运算特点的基于Radix-4 Booth编码的模2n+1乘法器实现方法,其输入/输出均无需额外的转换电路,并通过简化部分积生成、采用重新定义的3-2和4-2压缩器等措施以减少路径时延和硬件复杂度。比较其他同类设计,该方法具有较小的面积、时延,可有效提高分组密码算法的加解密性能。 相似文献
104.
本文建立了一种以聚氨酯泡沫富集-ICP-AES法测定土壤及水系沉积物中铊含量的分析方法,利用正交实验,确定最佳实验条件,方法的检出限为0.01mg/L,经对土壤及水系沉积物成分分析标准物质的检测,结果与推荐值相符,相对误差小于10%,相对标准偏差(RSD,n=10)在1.9%-4.9%之间。 相似文献
105.
为确保IPTV的安全播出和服务质量(QoS),需要对IPTV关键节点进行码流监测,同时监测的告警信息要准确、及时地通知相关技术人员,以便问题的快速定位和故障排除.为此,详细介绍了广州珠江数码集团有限公司IPTV码流监测系统的设计及主要实现的功能. 相似文献
106.
107.
WANG Lin 《中国邮电高校学报(英文版)》2001,8(2)
1 IntroductionRijndaelisakindofiteratedblockalgorithmdevelopedbyBelgiancryptographersJoanDaemenandVincentRijmeninordertorespondthecallofNISTforadvancedencryptionstandard (anewsub stituteforDES) .Rijndaelis,infact,avariantofanotheralgorithmcalledSquare ,wh… 相似文献
108.
Alasdair McAndrew 《International Journal of Mathematical Education in Science & Technology》2013,44(7):967-979
The Hill cipher is the simplest example of a block cipher, which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although these topics are central to modern cryptography, it is hard to find good simple examples of their use. The conceptual and computational simplicity of the Hill cipher means that students can experiment with these topics, see them in action, and obtain a better understanding that would be possible from a theoretical discussion alone. In this article, we define the Hill cipher and demonstrate its use with different modes of encryption, and also show how cryptographic hash functions can be both designed and broken. Finally, we look at some pedagogical considerations. 相似文献
109.
This paper mainly focuses on the security of Zodiac against integral cryptanalysis. Firstly, a systematic method is given to extend an integral distinguisher of Feistel ciphers with PS or SP round functions into a higher order integral distinguisher. Secondly, this method is applied to Zodiac, and a full-round (16-round) integral distinguisher is given. Taking the properties of the linear transformation into consideration, it is showed that extending an integral distinguisher into a higher order one can be reduced into decomposition of linear spaces into direct sums. At last, some key-recovery attacks against full round Zodiac are applied using distinguishers with 15-/13- round, respectively. 相似文献
110.
Algebraic attacks on stream ciphers exploit annihilators of low degree. From another point of view, we concentrate on annihilators in fewer variables in this paper. This work consists of two parts. Firstly, the concept of singular annihilators is proposed and the basic theory is established. Secondly we present two applications of singular annihilators. We propose a variant of the Filter states guessing attack (FSGA) introduced by Pasalic (2009). Our attack outperforms the FSGA in many cases. Moreover, we put forward a probabilistic algorithm, which can screen out a large number of Boolean functions with annihilators of low degree at a lower cost for the resistance against algebraic attacks. 相似文献