全文获取类型
收费全文 | 1252篇 |
免费 | 206篇 |
国内免费 | 18篇 |
专业分类
化学 | 70篇 |
晶体学 | 2篇 |
力学 | 62篇 |
综合类 | 16篇 |
数学 | 44篇 |
物理学 | 129篇 |
无线电 | 1153篇 |
出版年
2024年 | 4篇 |
2023年 | 26篇 |
2022年 | 44篇 |
2021年 | 52篇 |
2020年 | 60篇 |
2019年 | 43篇 |
2018年 | 42篇 |
2017年 | 59篇 |
2016年 | 63篇 |
2015年 | 75篇 |
2014年 | 119篇 |
2013年 | 89篇 |
2012年 | 94篇 |
2011年 | 99篇 |
2010年 | 79篇 |
2009年 | 66篇 |
2008年 | 98篇 |
2007年 | 76篇 |
2006年 | 58篇 |
2005年 | 48篇 |
2004年 | 48篇 |
2003年 | 31篇 |
2002年 | 22篇 |
2001年 | 11篇 |
2000年 | 22篇 |
1999年 | 12篇 |
1998年 | 3篇 |
1997年 | 6篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1476条查询结果,搜索用时 15 毫秒
81.
分析了连续波半主动雷达制导导弹导引头工作电磁环境和对武器系统攻击区的影响,建立了热噪声和杂波干扰环境下导引头截获距离方程,分析推导了直波泄漏干扰,地杂波干扰的计算公式,并在此基础上给出了导弹允许攻击区计算公式。 相似文献
82.
流密码的设计与分析在现代密码学中占有重要地位。简要介绍了流密码分析的基本原理和模型,主要包括:折中攻击、猜测和决定攻击、相关攻击、最佳仿射攻击、代数攻击和边信道攻击。然后基于Mathematica平台,使用简易密钥流发生器为测试对象,对其中的折中攻击、猜测和决定攻击及相关攻击进行了仿真实现。通过实验,揭示了流密码算法的一个重要设计原则:避免内部状态演变的线性性以及输出序列统计性质的偏向性。最后对流密码分析方法给予了总结和展望。 相似文献
83.
介绍了卫星制导武器直接瞄准攻击方式在对地精确打击中占据的关键位置,阐述了卫星制导武器直接瞄准攻击方法的原理。由于卫星制导武器直接瞄准攻击对目标定位要求较高,采用常用定位手段已不能满足系统对目标定位的要求,分析了使用相对GPS制导成为卫星制导武器直接瞄准攻击的关键的原因。相对GPS制导误差主要包括采用载机和武器相对GPS定位误差以及传感器对目标的相对定位误差,分别对两者的定位精度进行了分析和推导。仿真结果表明:这两者的综合误差理论值小于7.5 m,满足卫星制导武器在直接瞄准攻击中对目标定位的需求。 相似文献
84.
This paper presents a method for differential collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242 .84-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. The time complexities of 5, 6 and 7-round FOX64 are approximate to 2106 .8, 2170 .8and 2234 .8, respectively. The attack on reduced FOX128 demands 11 chosen plain-texts, requires 2192one round encryptions in precomputation, performs approximately 276 .5 one round encryptions on 4-round FOX128, and is 2204 .5against 5-round FOX128. 相似文献
85.
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to construct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is determined for the number of Boolean functions with maximum algebraic immunity. 相似文献
86.
To improve the watermark benchmarks database, a new BRA (Block Replacement Attack) method is introduced in this paper. Unlike the typical BRA which exploits the self similarity among blocks in image, the scheme utilizes the self similarity in various scale and orientation bands in the wavelet domain of the image. They search the replacement blocks from the blocks of the smaller sub image at the next lower resolution. The most important advantage of this scheme is that the pyramid sub band decomposition acts as an automatic block classifier, with the result of simplifying the block search and block matching procedures and thus making the block replacement more effective. Furthermore, an improved algorithm based on Fuzzy set theory is introduced in which the number of blocks chosen for combination are modified adaptively to obtain the candidate replacement blocks. It simplifies the procedure for searching the candidate replacement blocks. These advantages are confirmed by the experimental results, which show that the performance of the scheme is superior to typical BRA methods. 相似文献
87.
88.
89.
M. Araceli Snchez-Snchez Cristina Conde Beatriz Gmez-Aylln David Ortega-DelCampo Aristeidis Tsitiridis Daniel Palacios-Alonso Enrique Cabello 《Entropy (Basel, Switzerland)》2020,22(11)
Automated border control systems are the first critical infrastructure point when crossing a border country. Crossing border lines for unauthorized passengers is a high security risk to any country. This paper presents a multispectral analysis of presentation attack detection for facial biometrics using the learned features from a convolutional neural network. Three sensors are considered to design and develop a new database that is composed of visible (VIS), near-infrared (NIR), and thermal images. Most studies are based on laboratory or ideal conditions-controlled environments. However, in a real scenario, a subject’s situation is completely modified due to diverse physiological conditions, such as stress, temperature changes, sweating, and increased blood pressure. For this reason, the added value of this study is that this database was acquired in situ. The attacks considered were printed, masked, and displayed images. In addition, five classifiers were used to detect the presentation attack. Note that thermal sensors provide better performance than other solutions. The results present better outputs when all sensors are used together, regardless of whether classifier or feature-level fusion is considered. Finally, classifiers such as KNN or SVM show high performance and low computational level. 相似文献
90.
研究了网络编码中的污染攻击问题,提出了一种抗污染攻击的自适应网络编码传输机制ASNC (adaptive secure network coding)。在编码数据分组的传输过程中,该机制利用网络编码的时间和空间特性有效控制污染数据分组的传播。同时,ASNC机制创新性地促使网络编码系统动态调整安全策略,自适应于当前网络安全态势。此外,为了达到更好的实用性,ASNC机制有效利用网络编码的编码空间特性,不需要额外的安全数据通道和数据分组加密操作。ASNC机制的安全分析和仿真结果表明,其能够有效抵抗污染攻击,与不具有自适应能力的机制相比具有更好的安全效率。 相似文献