全文获取类型
收费全文 | 1604篇 |
免费 | 217篇 |
国内免费 | 4篇 |
专业分类
化学 | 11篇 |
力学 | 39篇 |
综合类 | 12篇 |
数学 | 82篇 |
物理学 | 404篇 |
无线电 | 1277篇 |
出版年
2024年 | 10篇 |
2023年 | 39篇 |
2022年 | 66篇 |
2021年 | 83篇 |
2020年 | 68篇 |
2019年 | 39篇 |
2018年 | 49篇 |
2017年 | 88篇 |
2016年 | 63篇 |
2015年 | 75篇 |
2014年 | 166篇 |
2013年 | 99篇 |
2012年 | 103篇 |
2011年 | 105篇 |
2010年 | 77篇 |
2009年 | 90篇 |
2008年 | 96篇 |
2007年 | 89篇 |
2006年 | 90篇 |
2005年 | 76篇 |
2004年 | 46篇 |
2003年 | 60篇 |
2002年 | 21篇 |
2001年 | 23篇 |
2000年 | 21篇 |
1999年 | 22篇 |
1998年 | 18篇 |
1997年 | 12篇 |
1996年 | 12篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有1825条查询结果,搜索用时 0 毫秒
1.
In order to improve the transmission efficiency and security of image encryption, we combined a ZUC stream cipher and chaotic compressed sensing to perform image encryption. The parallel compressed sensing method is adopted to ensure the encryption and decryption efficiency. The ZUC stream cipher is used to sample the one-dimensional chaotic map to reduce the correlation between elements and improve the randomness of the chaotic sequence. The compressed sensing measurement matrix is constructed by using the sampled chaotic sequence to improve the image restoration effect. In order to reduce the block effect after the parallel compressed sensing operation, we also propose a method of a random block of images. Simulation analysis shows that the algorithm demonstrated better encryption and compression performance. 相似文献
2.
Xin Meng Jinqing Li Xiaoqiang Di Yaohui Sheng Donghua Jiang 《Entropy (Basel, Switzerland)》2022,24(7)
Today, with the rapid development of the Internet, improving image security becomes more and more important. To improve image encryption efficiency, a novel region of interest (ROI) encryption algorithm based on a chaotic system was proposed. First, a new 1D -cos-cot (1D-ECC) with better chaotic performance than the traditional chaotic system is proposed. Second, the chaotic system is used to generate a plaintext-relate keystream based on the label information of a medical image DICOM (Digital Imaging and Communications in Medicine) file, the medical image is segmented using an adaptive threshold, and the segmented region of interest is encrypted. The encryption process is divided into two stages: scrambling and diffusion. In the scrambling stage, helical scanning and index scrambling are combined to scramble. In the diffusion stage, two-dimensional bi-directional diffusion is adopted, that is, the image is bi-directionally diffused row by column to make image security better. The algorithm offers good encryption speed and security performance, according to simulation results and security analysis. 相似文献
3.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. 相似文献
4.
5.
数据脱敏,是指对数据中包含的一些涉及机密或隐私的敏感信息进行特殊处理,以达到保护私密及隐私信息不被恶意攻击者非法获取的目的.保形加密是众多数据脱敏技术的一种,但其具有保持原始数据格式不变的重要优势,从而在一定程度上对上层应用透明.随着大数据时代的到来以及Hadoop平台的广泛应用,传统的基于关系型数据库的数据脱敏技术已不能满足实际的生产需要.针对Hadoop大数据平台实现了一种基于保形加密的数据脱敏系统,支持对多种数据存储格式以及纯数字、纯字母或数字一字母混合等多种数据类型敏感数据的加密脱敏处理.然后对3种不同的实现方式进行了探讨,并开展了一系列实验对系统的加密脱敏性能进行详细的评估比较. 相似文献
6.
Tong Jiang Yi‐Fei Zhu Jun‐Cheng Zhang Jiajie Zhu Min Zhang Jianrong Qiu 《Advanced functional materials》2019,29(51)
Visually readable codes play a crucial role in anticounterfeiting measures. However, current coding approaches do not enable time‐dependent codes to be visually read, adjusted, and differentiated in bright and dark fields. Here, using a combined strategy of piezoelectric lattice selection, oxygen vacancy engineering, and activator doping, a lanthanide ion‐doped titanate is developed that integrates mechano‐, thermo‐, and photo‐responsive color change (>18 h for bright field), persistent luminescence (>6 h for dark field), and stimulus‐triggered multimodal luminescence. The feasibility of optical encoding, visual displaying, and stimulus‐responsive encrypting of time‐dependent, dual‐field information by using the developed material is demonstrated. In particular, the differentiated display of dual‐field modes is achieved by combining mechanostimulated abolition of only the persistent luminescence and thermo‐ and photostimulated reversal of both the color change and persistent luminescence. The results provide new insights for designing advanced materials and encryption technologies for photonic displays, information security, and intelligent anticounterfeiting. 相似文献
7.
An open question about the asymptotic
cost of connecting many processors to a
large memory using three dimensions for wiring
is answered, and this result is used
to find the full cost of several
cryptanalytic attacks. In many cases this full
cost is higher than the accepted complexity
of a given algorithm based on the number of processor
steps. The full costs of several
cryptanalytic attacks are determined, including
Shanks method for computing discrete
logarithms in cyclic groups of prime order n,
which requires n1/2+o(1) processor steps, but,
when all factors are taken into account, has full
cost n2/3+o(1). Other attacks analyzed are
factoring with the number field sieve, generic
attacks on block ciphers, attacks on double
and triple encryption, and finding hash collisions.
In many cases parallel collision search
gives a significant asymptotic advantage over
well-known generic attacks. 相似文献
8.
针对图像加密,提出了一种基于Logistic映射和z-映射的图像分组加密算法,该算法在每一轮迭代中,交替使用矩阵置乱、非线性数值替换和数值关联混迭三级操作。经大量实验验证,该算法能够有效抵抗明文攻击、差分攻击、统计分析,密钥空间较大,因而安全性较高,并且加解密速度相当快,适用于数据存储。 相似文献
9.
曾俊强 《电信工程技术与标准化》2011,24(2):15-21
近年来,随着人们对移动通信业务的各种需求与日俱增,移动通信市场规模的不断扩大.在巨大的经济利益的驱使下,出现了大量利用移动通信网络的缺陷进行话费欺诈的现象,使电信运营商蒙受了巨大的经济损失.本文将对SIM卡复制的原理及利用复制SIM卡发送垃圾短信等话费欺诈行为进行深入的分析,提出针对此类问题的防范措施,以期提高移动通信... 相似文献
10.