首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4355篇
  免费   502篇
  国内免费   15篇
化学   24篇
晶体学   1篇
力学   7篇
综合类   51篇
数学   162篇
物理学   261篇
无线电   4366篇
  2024年   8篇
  2023年   48篇
  2022年   99篇
  2021年   177篇
  2020年   201篇
  2019年   106篇
  2018年   89篇
  2017年   170篇
  2016年   172篇
  2015年   211篇
  2014年   376篇
  2013年   270篇
  2012年   370篇
  2011年   322篇
  2010年   250篇
  2009年   249篇
  2008年   295篇
  2007年   263篇
  2006年   264篇
  2005年   200篇
  2004年   189篇
  2003年   176篇
  2002年   115篇
  2001年   62篇
  2000年   55篇
  1999年   27篇
  1998年   31篇
  1997年   23篇
  1996年   20篇
  1995年   9篇
  1994年   5篇
  1993年   5篇
  1992年   4篇
  1991年   4篇
  1990年   2篇
  1989年   2篇
  1984年   2篇
  1983年   1篇
排序方式: 共有4872条查询结果,搜索用时 156 毫秒
51.
提出了处理库中多媒体数据的技术和方法,讨论了数据库的安全问题。  相似文献   
52.
针对通信系统工作过程中受到外界电磁干扰而无法通信的问题,研究了基于软件无线电的电磁干扰效应及误码特征。通过分析典型软件无线电电磁信号传输特性及其信息链路电磁干扰耦合路径,设计了软件无线电通信干扰实验系统。该系统利用Simulink软件观测、记录通信信号眼图、星座图信息等受扰特征,并通过分析接收信号的误码率,给出了不同干扰信号对通信系统的影响规律:当同频干扰功率达到-40 dBm时通信开始出现误码,干扰功率每增加5 dB,误码率增加一个量级,干扰功率增加到-18 dBm时,误码率达到阈值0.25;邻频干扰误码率随干扰功率变化趋势与同频干扰一致,但出现误码的最小干扰功率更大;带外强干扰信号也会影响通信系统可靠性,在相同误码率情况下,需要更大的干扰信号功率且大小与信号频偏成正比。  相似文献   
53.
In this paper, an advanced and optimized Light Gradient Boosting Machine (LGBM) technique is proposed to identify the intrusive activities in the Internet of Things (IoT) network. The followings are the major contributions: i) An optimized LGBM model has been developed for the identification of malicious IoT activities in the IoT network; ii) An efficient evolutionary optimization approach has been adopted for finding the optimal set of hyper-parameters of LGBM for the projected problem. Here, a Genetic Algorithm (GA) with k-way tournament selection and uniform crossover operation is used for efficient exploration of hyper-parameter search space; iii) Finally, the performance of the proposed model is evaluated using state-of-the-art ensemble learning and machine learning-based model to achieve overall generalized performance and efficiency. Simulation outcomes reveal that the proposed approach is superior to other considered methods and proves to be a robust approach to intrusion detection in an IoT environment.  相似文献   
54.
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.  相似文献   
55.
Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.  相似文献   
56.
针对传统人工噪声辅助的安全传输方法无法适用于发射天线数等于接收天线数的多用户(Multiuser, MU)多输入多输出(Multiple-Input Multiple-Output, MIMO)系统的问题,提出了一种人工噪声辅助的多用户安全传输新方法。通过合理设计人工噪声与预编码矩阵,该方法可在同时满足所有用户传输需求的基础上,显著提升发射天线数等于接收天线数的MU-MIMO系统的安全性。同时,针对提出的方法进行了检测算法与平均保密速率的推导与分析。理论分析与仿真结果表明,所提方法可有效提升无线通信系统的安全性,在信噪比为20 dB时,该方法较传统方法的平均保密速率提升达到120%。  相似文献   
57.
近年来,国内外数据泄露事件频发,大量企业的商业利益、声誉受损。数据安全法律法规相继颁布,监管力度不断升级,企业逐渐意识到数据安全治理的重要性与紧迫性。通过对2021年开展的企业数据安全治理能力评估现状进行整理,总结企业数据安全治理工作在组织建设、人才培养、技术工具等方面的现状与趋势,提供能力提升思路,以供业界参考。  相似文献   
58.
数据要素是数字经济时代的全新生产要素,数据要素市场化在数字经济推进经济高质量发展中具有显著的战略意义.目前,全球对于数据要素的认识仍然处在积极探索中,正确把握数据要素市场化的新内涵、新特征、新要求、新挑战至关重要.在对数据要素市场化的理论内涵和重大意义进行系统阐述的基础上,通过数据要素市场化指数测度发现我国当前数据要素市场化起步晚、起步缓,面临数据产权确权难、数据价值评估难、数据交易流通难、数据保护监管难等挑战,从而从加快数据汇聚、推动数据流通、深化数据应用、强化数据安全等方面提出具有实践价值的解决路径.  相似文献   
59.
针对被动式太赫兹安检系统因环境影响导致图像质量波动,从而影响识别算法,导致准确率大幅降低的问题,提出了基于Focal-EIOU损失函数的改进YOLOv4算法,并用被动式太赫兹人体安检图像对刀、枪违禁物品进行模型训练获得模型。建立不同环境、不同位置角度携带刀枪嫌疑物人员的太赫兹图像数据库,采用图像增广的方法构建丰富数据集;将YOLOv4的CIOU loss改进为Focal-EIOU loss,提高算法对太赫兹图像识别的鲁棒性,进而经过训练获得较优的模型。在本文的测试集中,使用改进后的算法训练的模型平均检测精确度(mAP)达到96.4%,检测速度在28 ms左右,交并比(IOU)平均值为0.95,在同等条件下高于常规算法,改善了检测识别的效果。实验结果表明,本文方法能够有效提高被动式太赫兹人体安检系统的嫌疑物识别准确率,有利于该项技术在人体安检领域的推广应用。  相似文献   
60.
Privacy protection is the key to maintaining the Internet of Things (IoT) communication strategy. Steganography is an important way to achieve covert communication that protects user data privacy. Steganalysis technology is the key to checking steganography security, and its ultimate goal is to extract embedded messages. Existing methods cannot extract under known cover images. To this end, this paper proposes a method of extracting embedded messages under known cover images. First, the syndrome-trellis encoding process is analyzed. Second, a decoding path in the syndrome trellis is obtained by using the stego sequence and a certain parity-check matrix, while the embedding process is simulated using the cover sequence and parity-check matrix. Since the decoding path obtained by the stego sequence and the correct parity-check matrix is optimal and has the least distortion, comparing the path consistency can quickly filter the coding parameters to determine the correct matrices, and embedded messages can be extracted correctly. The proposed method does not need to embed all possible messages for the second time, improving coding parameter recognition significantly. The experimental results show that the proposed method can identify syndrome-trellis coding parameters in stego images embedded by adaptive steganography quickly to realize embedded message extraction.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号