全文获取类型
收费全文 | 1165篇 |
免费 | 135篇 |
国内免费 | 8篇 |
专业分类
化学 | 43篇 |
综合类 | 20篇 |
数学 | 61篇 |
物理学 | 63篇 |
无线电 | 1121篇 |
出版年
2024年 | 1篇 |
2023年 | 15篇 |
2022年 | 14篇 |
2021年 | 15篇 |
2020年 | 36篇 |
2019年 | 30篇 |
2018年 | 35篇 |
2017年 | 61篇 |
2016年 | 44篇 |
2015年 | 49篇 |
2014年 | 92篇 |
2013年 | 70篇 |
2012年 | 95篇 |
2011年 | 78篇 |
2010年 | 63篇 |
2009年 | 72篇 |
2008年 | 84篇 |
2007年 | 58篇 |
2006年 | 62篇 |
2005年 | 61篇 |
2004年 | 49篇 |
2003年 | 51篇 |
2002年 | 35篇 |
2001年 | 25篇 |
2000年 | 25篇 |
1999年 | 21篇 |
1998年 | 31篇 |
1997年 | 17篇 |
1996年 | 11篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1991年 | 1篇 |
排序方式: 共有1308条查询结果,搜索用时 123 毫秒
31.
随着当今移动互联网的快速发展,Wi Fi设备成为人们生活当中不可缺少的组成部分,而传统的无线网络在接入稳定性和安全性方面有待进一步提高。为了解决上述问题,设计了基于FH-AC系统的Portal认证系统。该系统通过对原有Portal协议进行改进并且采用Socket/HTTP通信和CHAP认证技术等一系列技术来提升系统性能,使整个系统在使用过程中能够更快更稳定地接入当前无线网络,其系统安全性也得到进一步的提升。 相似文献
32.
33.
Abdul Rohman Mohd AlIkhsan B. Ghazali Anjar Windarsih Irnawati Sugeng Riyanto Farahwahida Mohd Yusof Shuhaimi Mustafa 《Molecules (Basel, Switzerland)》2020,25(22)
Currently, the authentication analysis of edible fats and oils is an emerging issue not only by producers but also by food industries, regulators, and consumers. The adulteration of high quality and expensive edible fats and oils as well as food products containing fats and oils with lower ones are typically motivated by economic reasons. Some analytical methods have been used for authentication analysis of food products, but some of them are complex in sampling preparation and involving sophisticated instruments. Therefore, simple and reliable methods are proposed and developed for these authentication purposes. This review highlighted the comprehensive reports on the application of infrared spectroscopy combined with chemometrics for authentication of fats and oils. New findings of this review included (1) FTIR spectroscopy combined with chemometrics, which has been used to authenticate fats and oils; (2) due to as fingerprint analytical tools, FTIR spectra have emerged as the most reported analytical techniques applied for authentication analysis of fats and oils; (3) the use of chemometrics as analytical data treatment is a must to extract the information from FTIR spectra to be understandable data. Next, the combination of FTIR spectroscopy with chemometrics must be proposed, developed, and standardized for authentication and assuring the quality of fats and oils. 相似文献
34.
蜂窝网和Ad Hoc网是提供接入服务的重要技术.由于两者互补的特性,融合蜂窝网和Ad Hoc网能提供在热点地区和通信盲区的持续接入.但两者的融合涉及到许多问题.针对安全问题,在Ad Hoc辅助式的融合网络模型上提出一种基于混合加密的安全认证计费方案.此方案使用对称加密和非对称加密的混合加密机制,另外还采用了散列函数和数字签名技术.安全分析表明所提方案可以防止扮演攻击、重播攻击和中间人攻击,并具有反拒认特性. 相似文献
35.
本文系统地介绍了当前光纤到户(FTTH)的主流实现方案--基于以太无源光网络(EPON)的认证和安全保密技术.特别是针对EPON系统自身的安全隐患及解决方案进行了比较,并对当前设备提供商的解决方案做了介绍. 相似文献
36.
一种基于身份的多信任域网格认证模型 总被引:16,自引:0,他引:16
分析了现有的网格认证框架中存在的问题,提出了一种基于身份的多信任域网格认证模型.该模型以基于身份的PKI为基础,避免了基于传统PKI的认证框架的诸多缺点.同时,该模型提供了跨信任域的双向实体认证功能.模拟试验表明,该认证模型比基于传统PKI的认证框架更轻量、更高效.而且由于该模型可以在多信任域的环境下工作,故而比W Mao提出的只能在单一信任域中工作的认证框架更符合网格认证的实际需要. 相似文献
37.
38.
Junia O. Alves Bruno G. Botelho Marcelo M. Sena Rodinei Augusti 《Journal of mass spectrometry : JMS》2013,48(10):1109-1115
Direct infusion electrospray ionization mass spectrometry in the positive ion mode [ESI(+)‐MS] is used to obtain fingerprints of aqueous–methanolic extracts of two types of olive oils, extra virgin (EV) and ordinary (OR), as well as of samples of EV olive oil adulterated by the addition of OR olive oil and other edible oils: corn (CO), sunflower (SF), soybean (SO) and canola (CA). The MS data is treated by the partial least squares discriminant analysis (PLS‐DA) protocol aiming at discriminating the above‐mentioned classes formed by the genuine olive oils, EV (1) and OR (2), as well as the EV adulterated samples, i.e. EV/SO (3), EV/CO (4), EV/SF (5), EV/CA (6) and EV/OR (7). The PLS‐DA model employed is built with 190 and 70 samples for the training and test sets, respectively. For all classes (1–7), EV and OR olive oils as well as the adulterated samples (in a proportion varying from 0.5 to 20.0% w/w) are properly classified. The developed methodology required no ions identification and demonstrated to be fast, as each measurement lasted about 3 min including the extraction step and MS analysis, and reliable, because high sensitivities (rate of true positives) and specificities (rate of true negatives) were achieved. Finally, it can be envisaged that this approach has potential to be applied in quality control of EV olive oils. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
39.
40.
Zhong-hua Shen 《高校应用数学学报(英文版)》2008,23(3):371-376
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented. 相似文献