全文获取类型
收费全文 | 246篇 |
免费 | 13篇 |
国内免费 | 1篇 |
专业分类
化学 | 18篇 |
数学 | 25篇 |
物理学 | 6篇 |
无线电 | 211篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 2篇 |
2018年 | 6篇 |
2017年 | 8篇 |
2016年 | 12篇 |
2015年 | 5篇 |
2014年 | 12篇 |
2013年 | 5篇 |
2012年 | 15篇 |
2011年 | 12篇 |
2010年 | 4篇 |
2009年 | 17篇 |
2008年 | 13篇 |
2007年 | 12篇 |
2006年 | 17篇 |
2005年 | 13篇 |
2004年 | 16篇 |
2003年 | 7篇 |
2002年 | 4篇 |
2001年 | 7篇 |
2000年 | 6篇 |
1999年 | 13篇 |
1998年 | 10篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 6篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1988年 | 2篇 |
排序方式: 共有260条查询结果,搜索用时 0 毫秒
1.
3D video for tele-medicine applications is gradually gaining momentum since the 3D technology can provide precise location information. However, the weak link for 3D video streaming is the necessary wireless link of the communication system. Neglecting the wireless impairments can severely degrade the performance of 3D video streaming that communicates complex critical medical data. In this paper, we propose systematic methodology for ensuring high performance of the 3D medical video streaming system. First, we present a recursive end-to-end distortion estimation approach for MVC (multiview video coding)-based 3D video streaming over error-prone networks by considering the 3D inter-view prediction. Then, based on the previous model, we develop a cross-layer optimization scheme that considers the LTE wireless physical layer (PHY). In this optimization, the authentication requirements of 3D medical video are also taken into account. The proposed cross-layer optimization approach jointly controls and manages the authentication, video coding quantization of 3D video, and the modulation and channel coding scheme (MCS) of the LTE wireless PHY to minimize the end-to-end video distortion. Experimental results show that the proposed approach can provide superior 3D medical video streaming performance in terms of peak signal-to-noise ratio (PSNR) when compared to state-of-the-art approaches that include joint source-channel optimized streaming with multi-path hash-chaining based-authentication, and also conventional video streaming with single path hash-chaining-based authentication. 相似文献
2.
In this paper, area-efficient and high-throughput multi-mode architectures for the SHA-1 and SHA-2 hash families are proposed and implemented in several FPGA technologies. Additionally a systematic flow for designing multi-mode architectures (implementing more than one function) of these families is introduced. Compared to the corresponding architectures that are produced by a commercial synthesis tool, the proposed ones are better in terms of both area (at least 40%) and throughput/area (from 32% up to 175%). Finally, the proposed architectures outperform similar existing ones in terms of throughput and throughput/area, from 4.2× up to 279.4× and from 1.2× up to 5.5×, respectively. 相似文献
3.
4.
安全协议和网络攻击分析 总被引:1,自引:0,他引:1
安全协议提供安全服务,是保证网络安全的基础。文章通过形式化分析方法,采用AVISPA分析工具对安全协议进行分析,总结出网络攻击方式的类型及其相应的解决办法。 相似文献
5.
6.
移动Ad Hoc网络是一种特殊的自组织无中心多跳的无线网络,网内节点所具有的移动和分布特性使得安全成为网络设计的重点。本文首先对移动Ad Hoc网络的特点进行了介绍,然后结合移动Ad Hoc网络的特点分析了移动Ad Hoc网络面临的安全威胁,最后从系统体系结构的角度对移动Ad Hoc网络的安全问题进行了详细讨论。 相似文献
7.
物联网作为一种新型的网络架构,被称为继计算机和互联网后信息产业界的第三次革命浪潮。但传统的物联网中没有很好的将安全机制进行阐述和定义,因此,本文通过研究和分析现有的物联网中存在的安全问题,将保护层的概念引入到传统意义的物联网架构中,并对保护层的工作原理和机制进行深入的分析和研究。 相似文献
8.
9.
数字版权保护是网络远程教育中多媒体课件点播必须解决的问题。通过对数字版权管理技术进行研究。设计实现的课件点播数字权限管理系统功能包括:多媒体课件加密、打包、用户权限设定、许可证产生和分发。 相似文献
10.
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is cryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the certificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and check whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate. 相似文献