首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5835篇
  免费   621篇
  国内免费   75篇
化学   271篇
晶体学   5篇
力学   30篇
综合类   62篇
数学   332篇
物理学   345篇
无线电   5486篇
  2024年   14篇
  2023年   73篇
  2022年   138篇
  2021年   215篇
  2020年   255篇
  2019年   159篇
  2018年   134篇
  2017年   231篇
  2016年   246篇
  2015年   280篇
  2014年   511篇
  2013年   419篇
  2012年   492篇
  2011年   432篇
  2010年   318篇
  2009年   303篇
  2008年   370篇
  2007年   332篇
  2006年   324篇
  2005年   258篇
  2004年   240篇
  2003年   227篇
  2002年   142篇
  2001年   86篇
  2000年   71篇
  1999年   43篇
  1998年   41篇
  1997年   35篇
  1996年   29篇
  1995年   24篇
  1994年   16篇
  1993年   14篇
  1992年   15篇
  1991年   8篇
  1990年   4篇
  1989年   4篇
  1987年   3篇
  1986年   2篇
  1985年   4篇
  1984年   5篇
  1983年   2篇
  1981年   1篇
  1980年   3篇
  1979年   2篇
  1978年   3篇
  1977年   3篇
排序方式: 共有6531条查询结果,搜索用时 15 毫秒
71.
In this paper, an advanced and optimized Light Gradient Boosting Machine (LGBM) technique is proposed to identify the intrusive activities in the Internet of Things (IoT) network. The followings are the major contributions: i) An optimized LGBM model has been developed for the identification of malicious IoT activities in the IoT network; ii) An efficient evolutionary optimization approach has been adopted for finding the optimal set of hyper-parameters of LGBM for the projected problem. Here, a Genetic Algorithm (GA) with k-way tournament selection and uniform crossover operation is used for efficient exploration of hyper-parameter search space; iii) Finally, the performance of the proposed model is evaluated using state-of-the-art ensemble learning and machine learning-based model to achieve overall generalized performance and efficiency. Simulation outcomes reveal that the proposed approach is superior to other considered methods and proves to be a robust approach to intrusion detection in an IoT environment.  相似文献   
72.
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.  相似文献   
73.
Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.  相似文献   
74.
针对传统人工噪声辅助的安全传输方法无法适用于发射天线数等于接收天线数的多用户(Multiuser, MU)多输入多输出(Multiple-Input Multiple-Output, MIMO)系统的问题,提出了一种人工噪声辅助的多用户安全传输新方法。通过合理设计人工噪声与预编码矩阵,该方法可在同时满足所有用户传输需求的基础上,显著提升发射天线数等于接收天线数的MU-MIMO系统的安全性。同时,针对提出的方法进行了检测算法与平均保密速率的推导与分析。理论分析与仿真结果表明,所提方法可有效提升无线通信系统的安全性,在信噪比为20 dB时,该方法较传统方法的平均保密速率提升达到120%。  相似文献   
75.
近年来,国内外数据泄露事件频发,大量企业的商业利益、声誉受损。数据安全法律法规相继颁布,监管力度不断升级,企业逐渐意识到数据安全治理的重要性与紧迫性。通过对2021年开展的企业数据安全治理能力评估现状进行整理,总结企业数据安全治理工作在组织建设、人才培养、技术工具等方面的现状与趋势,提供能力提升思路,以供业界参考。  相似文献   
76.
数据要素是数字经济时代的全新生产要素,数据要素市场化在数字经济推进经济高质量发展中具有显著的战略意义.目前,全球对于数据要素的认识仍然处在积极探索中,正确把握数据要素市场化的新内涵、新特征、新要求、新挑战至关重要.在对数据要素市场化的理论内涵和重大意义进行系统阐述的基础上,通过数据要素市场化指数测度发现我国当前数据要素市场化起步晚、起步缓,面临数据产权确权难、数据价值评估难、数据交易流通难、数据保护监管难等挑战,从而从加快数据汇聚、推动数据流通、深化数据应用、强化数据安全等方面提出具有实践价值的解决路径.  相似文献   
77.
针对被动式太赫兹安检系统因环境影响导致图像质量波动,从而影响识别算法,导致准确率大幅降低的问题,提出了基于Focal-EIOU损失函数的改进YOLOv4算法,并用被动式太赫兹人体安检图像对刀、枪违禁物品进行模型训练获得模型。建立不同环境、不同位置角度携带刀枪嫌疑物人员的太赫兹图像数据库,采用图像增广的方法构建丰富数据集;将YOLOv4的CIOU loss改进为Focal-EIOU loss,提高算法对太赫兹图像识别的鲁棒性,进而经过训练获得较优的模型。在本文的测试集中,使用改进后的算法训练的模型平均检测精确度(mAP)达到96.4%,检测速度在28 ms左右,交并比(IOU)平均值为0.95,在同等条件下高于常规算法,改善了检测识别的效果。实验结果表明,本文方法能够有效提高被动式太赫兹人体安检系统的嫌疑物识别准确率,有利于该项技术在人体安检领域的推广应用。  相似文献   
78.
手持终端设备属于一种嵌入式系统,特别在工业应用领域对其供电持续性的要求很高。为了解决单电池供电下设备续航能力不足导致传输数据丢失的问题,本文设计一种主备电池控制系统,提高了整机的续航能力和电源系统的可靠性。方案设计对切换灵敏度、功耗和可靠性方面进行了综合考虑,已经应用到实际产品中,取得了良好的效果。  相似文献   
79.
Privacy protection is the key to maintaining the Internet of Things (IoT) communication strategy. Steganography is an important way to achieve covert communication that protects user data privacy. Steganalysis technology is the key to checking steganography security, and its ultimate goal is to extract embedded messages. Existing methods cannot extract under known cover images. To this end, this paper proposes a method of extracting embedded messages under known cover images. First, the syndrome-trellis encoding process is analyzed. Second, a decoding path in the syndrome trellis is obtained by using the stego sequence and a certain parity-check matrix, while the embedding process is simulated using the cover sequence and parity-check matrix. Since the decoding path obtained by the stego sequence and the correct parity-check matrix is optimal and has the least distortion, comparing the path consistency can quickly filter the coding parameters to determine the correct matrices, and embedded messages can be extracted correctly. The proposed method does not need to embed all possible messages for the second time, improving coding parameter recognition significantly. The experimental results show that the proposed method can identify syndrome-trellis coding parameters in stego images embedded by adaptive steganography quickly to realize embedded message extraction.  相似文献   
80.
近场通信(NFC)已成为无线终端的标配功能,工作范围小、抗干扰性和安全性较高的特性使其被广泛应用于终端的移动支付和虚拟卡片等领域。由于近场天线产生的感应磁场会在临近的金属上耦合出反向涡流,并且金属屏蔽物覆盖会降低收发天线间的磁场耦合,紧凑终端中的电池、主板、外壳等金属元件将大幅影响NFC天线性能。本文从近场通信的历史、标准、系统结构出发,以终端NFC天线工作环境中的金属覆盖情况作为分类依据,对终端近场通信天线的研究进展进行了简要介绍。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号