全文获取类型
收费全文 | 4507篇 |
免费 | 506篇 |
国内免费 | 32篇 |
专业分类
化学 | 45篇 |
晶体学 | 1篇 |
力学 | 21篇 |
综合类 | 53篇 |
数学 | 164篇 |
物理学 | 276篇 |
无线电 | 4485篇 |
出版年
2024年 | 11篇 |
2023年 | 61篇 |
2022年 | 115篇 |
2021年 | 187篇 |
2020年 | 221篇 |
2019年 | 129篇 |
2018年 | 101篇 |
2017年 | 181篇 |
2016年 | 185篇 |
2015年 | 219篇 |
2014年 | 382篇 |
2013年 | 275篇 |
2012年 | 374篇 |
2011年 | 323篇 |
2010年 | 253篇 |
2009年 | 250篇 |
2008年 | 296篇 |
2007年 | 264篇 |
2006年 | 265篇 |
2005年 | 203篇 |
2004年 | 192篇 |
2003年 | 180篇 |
2002年 | 115篇 |
2001年 | 63篇 |
2000年 | 56篇 |
1999年 | 29篇 |
1998年 | 32篇 |
1997年 | 24篇 |
1996年 | 20篇 |
1995年 | 12篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
排序方式: 共有5045条查询结果,搜索用时 0 毫秒
991.
随着信息化技术的不断发展和普及,构建信息网络系统提高了人们的工作效率,也改变了人们的工作方式,在各个行业中都起到了非常好的促进作用.本文就电力信息网络安全存在的问题,对主动防御技术进行相应的分析,并对主动防御技术在电力信息网络安全中的应用进行相应的探讨.希望为电力网络安全的发展提供一些有用的建议. 相似文献
992.
文章对大数据下的计算机网络信息安全进行概述,指出计算机网络信息安全问题,并对相关防范策略进行研究. 相似文献
993.
大数据网络和互联网平台、物联网平台、计算机技术等存在紧密联系,大数据环境为人们正常生产和生活提供了便利,也带来一些网络安全问题.在大数据背景下,需要重点分析网络安全相关问题,强化安全技术的研究力度,借助先进技术提升网络安全性,为大数据环境下的网络系统良好运行发展夯实基础. 相似文献
994.
Dharminder Dharminder Dheerendra Mishra 《International Journal of Communication Systems》2023,36(12):e4116
Human-centered systems play an important role in the modern world, for example, driverless car, autonomous and smart vehicles, drones, and robotics. The internet of things environment demands a faster real-time response depending on the applications processed in a particular duration. Mobile edge computing (MEC) allows a user to get a real-time response as compared with cloud computing (CC), although ensuring a number of security attributes in MEC environment remains challenging. In this article, a protocol is designed to achieve mutual authentication, anonymous communication, and security against traceability, as these are very crucial factors to ensure the security of data and user's privacy. Moreover, the proposed scheme ensures mutual authentication between a mobile user and an edge server along with the user's anonymity and untraceability. The proof of security and evaluation of performance of the scheme validates that it ensures security attributes and improves efficiency in terms of communication and computation overheads. 相似文献
995.
随着物联网(IoT)技术的快速发展,数据处理和实时分析需求也随之增长。边缘计算作为一种新兴技术,为物联网提供了一种高效、实时的数据处理方法。文中重点探讨了边缘计算在物联网中的主要作用与技术优势。首先,讨论了边缘计算如何在数据源近处进行处理以降低延迟,提供即时反馈。其次,探讨了边缘计算如何提高数据安全性,通过局部处理降低数据传输和暴露的风险。最后,介绍了边缘计算如何提高资源利用率,降低数据中心的压力。这些技术点明确表明,边缘计算显著地促进了物联网领域的技术进步。 相似文献
996.
Abraham Sanenga Galefang Allycan Mapunda Tshepiso Merapelo Ludo Jacob Leatile Marata Bokamoso Basutli Joseph Monamati Chuma 《Entropy (Basel, Switzerland)》2020,22(11)
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. 相似文献
997.
针对混合输入输出(HIO)等数值攻击算法攻击联合变换相关器(JTC)加密系统运行时间长、攻击效率低的问题,设计了一种基于光路迭代的光学唯密文攻击系统。该系统充分利用了光学系统高速并行处理的特点,通过光束在光学系统中的光学傅里叶变换取代在计算机上的数字傅里叶变换,显著缩短了攻击算法的运行时间,有效提高了对JTC加密系统的攻击效率。仿真结果表明,相较于HIO攻击算法,在迭代次数相同的条件下,基于光路迭代的光学唯密文攻击系统有效减少了算法的运行时间,显著提高了对JTC加密系统的攻击效率。 相似文献
998.
《Digital Communications & Networks》2019,5(4):205-213
Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms. Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices. Machine-learning-based frameworks are effective for active authentication. However, the success of any machine-learning-based techniques depends highly on the relevancy of the data in hand for training. In addition, the training time should be very efficient. Keeping in view both issues, we’ve explored a novel fraudulent user detection method based solely on the app usage patterns of legitimate users. We hypothesized that every user has a unique pattern hidden in his/her usage of apps. Motivated by this observation, we’ve designed a way to obtain training data, which can be used by any machine learning model for effective authentication. To achieve better accuracy with reduced training time, we removed data instances related to any specific user from the training samples which did not contain any apps from the user-specific priority list. An information theoretic app ranking scheme was used to prepare a user-targeted apps priority list. Predictability of each instance related to a candidate app was calculated by using a knockout approach. Finally, a weighted rank was calculated for each app specific to every user. Instances with low ranked apps were removed to derive the reduced training set. Two datasets as well as seven classifiers for experimentation revealed that our reduced training data significantly lowered the prediction error rates in the context of classifying the legitimate user of a smartphone. 相似文献
999.
By the method of the optical spectrsocopy of diffuse reflection in the region 0.5–5.0 eV, accelerated aging of pigment compositions
with synthetic materials used in restoration of paint layers of paintings is investigated. Composition containing pigments
zinc and titanium oxides (white pigments), chromium oxide and copper carbonate (green pigments), and iron oxide (brown pigment)
and reinforcing materials vinyl acetate-ethylene copolymer, fluorolon F-42L, and polyvinyl alcohol are investigated. It is
established that the appearance of color in pigment impregnation and subsequent heating is observed only in the compositions
of reinforcing materials with white pigments and occurs as a result of heterogeneous reactions that lead to the formation
in the pigment of color centers bonded by oxygen vacancies.
Translated from Zhurnal Prikladnoi Spektroskopii, Vol. 64, No. 4, pp. 518–522, July–August, 1997. 相似文献
1000.
无线网络中的信息传输方式和安全保护 总被引:1,自引:0,他引:1
在介绍无线网络的同时,试图从网络各分层协议的角度,系统地归纳和比较了一些常见的适用于无线网络数据传输的优化技术。还针对各层协议,描述了无线网络中现有的安全机制,提出了一个比较全面的信息安全保护解决方案。采用RADIUS和ESSID认证、MAC地址过滤、WEP加密等机制来保护用户数据的私密性。 相似文献