全文获取类型
收费全文 | 5825篇 |
免费 | 729篇 |
国内免费 | 57篇 |
专业分类
化学 | 44篇 |
晶体学 | 2篇 |
力学 | 36篇 |
综合类 | 90篇 |
数学 | 304篇 |
物理学 | 583篇 |
无线电 | 5552篇 |
出版年
2024年 | 14篇 |
2023年 | 81篇 |
2022年 | 134篇 |
2021年 | 225篇 |
2020年 | 238篇 |
2019年 | 145篇 |
2018年 | 120篇 |
2017年 | 218篇 |
2016年 | 232篇 |
2015年 | 262篇 |
2014年 | 476篇 |
2013年 | 345篇 |
2012年 | 474篇 |
2011年 | 427篇 |
2010年 | 317篇 |
2009年 | 336篇 |
2008年 | 397篇 |
2007年 | 365篇 |
2006年 | 346篇 |
2005年 | 283篇 |
2004年 | 251篇 |
2003年 | 244篇 |
2002年 | 177篇 |
2001年 | 110篇 |
2000年 | 104篇 |
1999年 | 62篇 |
1998年 | 61篇 |
1997年 | 45篇 |
1996年 | 40篇 |
1995年 | 25篇 |
1994年 | 15篇 |
1993年 | 10篇 |
1992年 | 9篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有6611条查询结果,搜索用时 15 毫秒
951.
为了提高信息传输过程中的安全性,对当前的加密方法进行了研究,并介绍了通过对密钥进行处理增加加密安全性的研究现状。根据数据在发送和加密过程中要进行分段和分组的原理,设计了一种多密钥加密的方法:由源密钥和随机数生成分段密钥组和分组密钥组,由序号按匹配算法为每个分段和分组的数据选取相应密钥,实现多个密钥对信息传输过程中的加密。最后,一方面通过MATLAB测试验证该方法的加密效率,另一方面从理论和数学角度分析该方法的安全性并和传统方法进行对比,得到结论:该方法不需要太多开销即可在传统方法的基础上增加安全性。 相似文献
952.
953.
A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment. 相似文献
954.
To alleviate the spectrum shortage problem and security threats in heterogeneous network (HetNet),multi-antenna full-duplex relay was introduced for communication between femto base station (FBS) and legitimate user.With the aid of multi-antenna full-duplex relay in FBS network,the secrecy performance of HetNets could be improved.Under a stochastic geometry framework,the fundamental analysis model to evaluate the secrecy performance in multi-antenna full-duplex relay aided HetNet was set up.To be specific,the exact expressions for the secrecy outage probability of the typical user,serving relays and HetNet were derived respectively.Then,based on the theoretical analyses and simulation results,the influences of transmit power and antenna number of both macro base station and FBS on secrecy performance in HetNet were examined.Finally,the results show that introducing multi-antenna full-duplex relay for FBS networks improves the secrecy performance of HetNet. 相似文献
955.
In physical layer security,considering imperfect time synchronization,a power allocation scheme was proposed to maximize the system secrecy capacity.By analyzing the residual interference power at the authorized receiver caused by imperfect time synchronization,the optimal power distribution method was given,and the relationship between the optimal interference power and the relative channel quality was discussed.Theory and simulation analysis show that when the synchronization error is small,the synchronization error consumes extra power to reach the preset secrecy capacity,and the interference power increases with its increase.As the synchronization error increases,the secrecy capacity of the system gradually fails to reach the preset target,and may even drop to zero. 相似文献
956.
加油站如果发生油气泄漏将造成巨大危害。针对加油枪泄漏油气具有的浓度低、动态发展等特性,提出一种基于红外视频的加油枪油气泄漏检测方法:利用红外相机采集加油枪工作区域的视频信号,针对其建立混合高斯背景模型,联合帧差法和背景消除法得到疑似泄漏图像;对该图像进行形态学和滤波运算,提取帧图像的形状和扩散特征,根据油气泄漏的特征范围,消除信号噪声干扰;建立图像灰度与油气浓度间的映射方程,按照国家油气泄漏浓度标准的相关规定,判断是否泄漏超标。本研究以水蒸气为模拟实验对象进行测试,结果表明该方法能较为精准的判断泄漏情况。 相似文献
957.
Physically Unclonable Functions (PUFs) are a promising technology and have been proposed as central building blocks in many cryptographic protocols and security architectures. Among other uses, PUFs enable chip identifier/authentication, secret key generation/storage, seed for a random number generator and Intellectual Property (IP) protection. Field Programmable Gate Arrays (FPGAs) are re-configurable hardware systems which have emerged as an interesting trade-off between the versatility of standard microprocessors and the efficiency of Application Specific Integrated Circuits (ASICs). In FPGA devices, PUFs may be instantiated directly from FPGA fabric components in order to exploit the propagation delay differences of signals caused by manufacturing process variations. PUF technology can protect the individual FPGA IP cores with less overhead. In this article, we first provide an extensive survey on the current state-of-the-art of FPGA based PUFs. Then, we provide a detailed performance evaluation result for several FPGA based PUF designs and their comparisons. Subsequently, we briefly report on some of the known attacks on FPGA based PUFs and the corresponding countermeasures. Finally, we conclude with a brief overview of the FPGA based PUF application scenarios and future research directions. 相似文献
958.
Visual Cryptography Scheme (VCS) is a secret-sharing scheme which aims to encrypt a secret message into multiple shares and transmit them to participants over an untrusted communication channel. Although human vision can easily reveal the secret message by stacking a sufficient number of shares, this scheme reduces the visual quality of recovered images. This paper presents a novel high-quality and printer-friendly VCS. When providing high-quality recovery, this scheme keeps the size of the shares the same as the secret image. Experimental results show that, compared with previous work, the proposed scheme significantly improves the performance of recovered images. 相似文献
959.
Nathalie Destouches Nipun Sharma Marie Vangheluwe Nicolas Dalloz Francis Vocanson Matthieu Bugnet Mathieu Hébert Jan Siegel 《Advanced functional materials》2021,31(18):2010430
Printed image multiplexing based on the design of metasurfaces has attracted much interest in the past decade. Optical switching between different images displayed directly on the metasurface is performed by altering the parameters of the incident light such as polarization, wavelength, or incidence angle. When using white light, only two-image multiplexing is implemented with polarization switching. Such metasurfaces are made of nanostructures perfectly controlled individually, which provide high-resolution pixels but small images and involve long fabrication processes. Here, it is demonstrated that laser processing of nanocomposites offers a versatile low-cost, high-speed method with large area processing capabilities for controlling the statistical properties of random metasurfaces, allowing up to three-image multiplexing under white light illumination. By independently controlling absorption and interference effects, colors in reflection and transmission can be varied independently yielding two-image multiplexing under white light. Using anisotropy of plasmonic nanoparticles, a third image can be multiplexed and revealed through polarization changes. The design strategy, the fundamental properties, and the versatility of implementation of these laser-empowered random metasurfaces are discussed. The technique, applied on flexible substrate, can find applications in information encryption or functional switchable optical devices, and offers many advantages for visual security and anticounterfeiting. 相似文献
960.
大数据网络和互联网平台、物联网平台、计算机技术等存在紧密联系,大数据环境为人们正常生产和生活提供了便利,也带来一些网络安全问题。在大数据背景下,需要重点分析网络安全相关问题,强化安全技术的研究力度,借助先进技术提升网络安全性,为大数据环境下的网络系统良好运行发展夯实基础。 相似文献