首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   420篇
  免费   82篇
  国内免费   8篇
化学   12篇
力学   12篇
综合类   5篇
数学   123篇
物理学   76篇
无线电   282篇
  2024年   3篇
  2023年   6篇
  2022年   16篇
  2021年   21篇
  2020年   22篇
  2019年   26篇
  2018年   12篇
  2017年   18篇
  2016年   19篇
  2015年   15篇
  2014年   29篇
  2013年   26篇
  2012年   49篇
  2011年   46篇
  2010年   22篇
  2009年   32篇
  2008年   22篇
  2007年   19篇
  2006年   22篇
  2005年   11篇
  2004年   15篇
  2003年   13篇
  2002年   4篇
  2001年   3篇
  2000年   8篇
  1999年   3篇
  1998年   5篇
  1997年   5篇
  1996年   2篇
  1995年   5篇
  1994年   5篇
  1991年   1篇
  1989年   2篇
  1986年   2篇
  1982年   1篇
排序方式: 共有510条查询结果,搜索用时 15 毫秒
61.
Almost all natural, social and man-made-engineered systems can be represented by a complex network to describe their dynamic behaviors. To make a real-world complex network controllable with its desired topology, the study on network controllability has been one of the most critical and attractive subjects for both network and control communities. In this paper, based on a given directed–weighted network with both state and control nodes, a novel optimization tool with extremal dynamics to generate an optimal network topology with minimum control nodes and complete controllability under Kalman’s rank condition has been developed. The experimental results on a number of popular benchmark networks show the proposed tool is effective to identify the minimum control nodes which are sufficient to guide the whole network’s dynamics and provide the evolution of network topology during the optimization process. We also find the conclusion: “the sparse networks need more control nodes than the dense, and the homogeneous networks need fewer control nodes compared to the heterogeneous” (Liu et al., 2011  [18]), is also applicable to network complete controllability. These findings help us to understand the network dynamics and make a real-world network under the desired control. Moreover, compared with the relevant research results on structural controllability with minimum driver nodes, the proposed solution methodology may also be applied to other constrained network optimization problems beyond complete controllability with minimum control nodes.  相似文献   
62.
This paper proposes a new interference cancellation/avoidance scheme for secondary spectrum usage, which takes advantage of the features of Time Division Duplex (TDD) based primary systems. We focus on the co-existence between the heterogeneous systems, where the primary and the secondary are using the same spectrum simultaneously. The secondary systems have to accurately find the possible interference from/to the primary systems for discreet and efficient secondary transmission. In order to judge the arrival of interference from/to the primary system, the secondary access point (AP) compares the difference in power between the up and downlink signals in TDD-based primary systems. This scheme enables the secondary AP to know the level of interference from the primary systems that arrives at the AP without employing complex signal detection. The proposed scheme also determines the level of interference induced to the primary system by measuring the difference in power. To cancel and avoid interference in the proposed scheme, we introduce an adaptive array at only the AP that creates a null toward the interference with a higher power level between the up and downlink signals. Moreover, new algorithms by using scheduling information of the multiple primary nodes are introduced in the proposed method, in order to enhance the transmission quality of a secondary mobile station (MS) while maintaining a simple control scheme for the MS. Finally, we verify the effectiveness of the proposed method based on computer simulations.
S. KubotaEmail:
  相似文献   
63.
叶子  李若凡 《电子科技》2019,32(6):54-57
随着通信技术以及移动终端的发展,Android系统由于其本身的开源性,滋生了大量的恶意代码。为了满足Android手机用户的安全需求,文中基于Android,采用SVM机器学习思想,构建了恶意代码检测模型,并开发了一套手机恶意代码检测与防护系统,可以对其进行快速检测和深度检测。系统经Android手机测试结果表明,其具有较好的检测精度以及较低的恶意代码漏报率。  相似文献   
64.
针对在海洋环境监测系统中水声传感网高传输速率、高可靠性、长时间工作的要求,文中设计了一种低功耗的微型水下传感器节点。设计采用较高的能量转换率和接收灵敏度的换能器T235,并且在发送单元使用变压器进行阻抗匹配以使信号功率最大化传输。接收单元采用8阶巴特沃斯带通滤波器,可以更好地滤除噪声。软件上,移植并且优化了MAC协议,减少撞包和重发的概率。测试结果显示,在小规模范围内,传输速率在19 200 bit·s -1时,系统的总功耗低于20 W,能达到90%以上的通信传输成功率。  相似文献   
65.
Botnet is a distributed platform for illegal activities severely threaten the security of the Internet. Fortunately, although their complicated nature, bots leave some footprints during the C&C communication that have been utilized by security researchers to design detection mechanisms. Nevertheless, botnet designers are always trying to evade detection systems by leveraging the legitimate P2P protocol as C&C channel or even mimicking legitimate peer‐to‐peer (P2P) behavior. Consequently, detecting P2P botnet in the presence of normal P2P traffic is one of the most challenging issues in network security. However, the resilience of P2P botnet detection systems in the presence of normal P2P traffic is not investigated in most proposed schemes. In this paper, we focused on the footprint as the most essential part of a detection system and presented a taxonomy of footprints utilized in behavioral P2P botnet detection systems. Then, the resilience of mentioned footprints is analyzed using three evaluation scenarios. Our experimental and analytical investigations indicated that the most P2P botnet footprints are not resilient to the presence of legitimate P2P traffic and there is a pressing need to introduce more resilient footprints.  相似文献   
66.
The aim of wireless sensor networks (WSNs) is to gather sensor data from a monitored environment. However, the collected or reported information might be falsified by faults or malicious nodes. Hence, identifying malicious nodes in an effective and timely manner is essential for the network to function properly and reliably. Maliciously behaving nodes are usually detected and isolated by reputation and trust‐based schemes before they can damage the network. In this paper, we propose an efficient weighted trust‐based malicious node detection (WT‐MND) scheme that can detect malicious nodes in a clustered WSN. The node behaviors are realistically treated by accounting for false‐positive and false‐negative instances. The simulation results confirm the timely identification and isolation of maliciously behaving nodes by the WT‐MND scheme. The effectiveness of the proposed scheme is afforded by the adaptive trust‐update process, which implicitly performs trust recovery of temporarily malfunctioning nodes and computes a different trust‐update factor for each node depending on its behavior. The proposed scheme is more effective and scalable than the related schemes in the literature, as evidenced by its higher detection ratio (DR) and lower misdetection ratio (MDR), which only slightly vary with the network's size. Moreover, the scheme sustains its efficient characteristics without significant power consumption overheads.  相似文献   
67.
68.
张涛 《通信技术》2020,(3):728-732
在新技术、新应用的不断刺激下,各类网站应用服务如雨后春笋般不断涌现。伴随着互联网+产业的蓬勃发展,网络安全形势日益严峻。钓鱼电子邮件攻击持续高发、仿冒网站窃取用户个人隐私信息及诈骗用户钱财等时刻威胁着用户的合法权益。这种情况下,迫切需要建立一套全网恶意网址综合防范治理体系。因此,提出了一种针对多种应用场景下的恶意网址拦截方法,通过基于DNS Forward的恶意网址拦截、恶意短网址拦截、“拆链”技术在恶意网址拦截中的应用等技术手段,综合治理全网恶意网址访问行为。不仅提升了全网防护效果,而且有效减少了全网恶意访问流量。  相似文献   
69.
Recently, the application of Wireless Sensor Networks (WSNs) has been increasing rapidly. It requires privacy preserving data aggregation protocols to secure the data from compromises. Preserving privacy of the sensor data is a challenging task. This paper presents a non-linear regression-based data aggregation protocol for preserving privacy of the sensor data. The proposed protocol uses non-linear regression functions to represent the sensor data collected from the sensor nodes. Instead of sending the complete data to the cluster head, the sensor nodes only send the coefficients of the non-linear function. This will reduce the communication overhead of the network. The data aggregation is performed on the masked coefficients and the sink node is able to retrieve the approximated results over the aggregated data. The analysis of experiment results shows that the proposed protocol is able to minimize communication overhead, enhance data aggregation accuracy, and preserve data privacy.  相似文献   
70.
In response to the HTTP malicious traffic detection problem,a preprocessing method based on cutting mechanism and statistical association was proposed to perform statistical information correlation as well as normalization processing of traffic.Then,a hybrid neural network was proposed based on the combination of raw data and empirical feature engineering.It combined convolutional neural network (CNN) and multilayer perceptron (MLP) to process text and statistical information.The effect of the model was significantly improved compared with traditional machine learning algorithms (e.g.,SVM).The F1value reached 99.38% and had a lower time complexity.At the same time,a data set consisting of more than 450 000 malicious traffic and more than 20 million non-malicious traffic was created.In addition,prototype system based on model was designed with detection precision of 98.1%~99.99% and recall rate of 97.2%~99.5%.The application is excellent in real network environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号