全文获取类型
收费全文 | 542篇 |
免费 | 57篇 |
国内免费 | 2篇 |
专业分类
化学 | 7篇 |
综合类 | 3篇 |
数学 | 27篇 |
物理学 | 14篇 |
无线电 | 550篇 |
出版年
2023年 | 3篇 |
2022年 | 10篇 |
2021年 | 24篇 |
2020年 | 17篇 |
2019年 | 13篇 |
2018年 | 10篇 |
2017年 | 12篇 |
2016年 | 16篇 |
2015年 | 16篇 |
2014年 | 40篇 |
2013年 | 41篇 |
2012年 | 43篇 |
2011年 | 46篇 |
2010年 | 41篇 |
2009年 | 29篇 |
2008年 | 27篇 |
2007年 | 29篇 |
2006年 | 26篇 |
2005年 | 32篇 |
2004年 | 25篇 |
2003年 | 31篇 |
2002年 | 29篇 |
2001年 | 17篇 |
2000年 | 16篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 2篇 |
排序方式: 共有601条查询结果,搜索用时 437 毫秒
1.
电信企业信息化的实质就是赋予电信企业精细化的企业资源整合能力,本以此认识为出发点,通过定义基本的信息化业务元素,需求参数和基本信息处理机制,构建出带有行业共性的电信企业信息化统一模型,该模型针对目前电信企业信息化中常见的和潜在的问题提供了有效的解决措施。 相似文献
2.
通过对电信运营企业多渠道融资的必要性的阐述,论证了项目融资是电信运营企业可选的一种融资方式,并有针对性地提出了电信运营企业实施项目融资的模式及应注意的问题。 相似文献
3.
4.
对雷电的发生及危害,尤其对通信电源设备的危害进行了分析,并论述了怎样对设备进行防雷保护。同时介绍了接地系统的分类、技术要求与建造方法等。 相似文献
5.
6.
7.
8.
量子互联网是实现多方量子通信、分布式量子计算等量子信息技术的重要基础,量子存储器作为实现互联网的重要部件,对量子信息技术的发展、应用具有举足轻重的作用。如今遍布全球的光纤网络已经是信息传输的有力载体,通信波段的量子存储器因容易嵌入到当前的光纤网络中而备受重视。聚焦于稀土离子掺杂固态体系的通信波段光量子存储,首先介绍稀土离子掺杂固态量子存储的基本原理,包括稀土掺杂材料特性以及存储协议等,然后介绍目前的研究现状,最后简要分析其未来的发展趋势,并对量子互联网的构建做出展望。 相似文献
9.
The complexity of different quality standards can, in principle, be covered by different approaches and strategies. In-depth
process mapping of quality control (QC) work streams was used by the analytical laboratories of Lonza AG to show up the principle
differences in being compliant to different quality systems. The results identified two main drivers for all necessary actions:
process-related activities and infrastructure-related activities. In addition, a clear indication of the economic impact of
these driving forces was gained, which led the laboratories to decide on a process-oriented approach. This approach has the
advantage of being able to reflect the different demands of different quality assurance (QA) regulations within the same QC
organizational structure. Following the process helps avoid unnecessary efforts in analytical work and represents a very economical
approach, at the same time, providing high flexibility to react to different QA or customer demands.
Received: 5 July 2002 Accepted: 12 November 2002
Acknowledgements The process-oriented approach resulted from many, very challenging discussions for which I would like to thank the staff
of my organization (Analytics & QC), especially, the QA staff and the LIMS team.
Presented at Analytica Conference, 23–26 April 2002, Munich, Germany
Correspondence to B. Ciommer 相似文献
10.
Advanced metering infrastructure (AMI) provides 2‐way communications between the utility and the smart meters. Developing authenticated key exchange (AKE) and broadcast authentication (BA) protocols is essential to provide secure communications in AMI. The security of all existing cryptographic protocols is based on the assumption that secret information is stored in the nonvolatile memories. In the AMI, the attackers can obtain some or all of the stored secret information from memories by a great variety of inexpensive and fast side‐channel attacks. Thus, all existing AKE and BA protocols are no longer secure. In this paper, we investigate how to develop secure AKE and BA protocols in the presence of memory attacks. As a solution, we propose to embed a physical unclonable function (PUF) in each party, which generates the secret values as required without the need to store them. By combining PUFs and 2 well‐known and secure protocols, we propose PUF‐based AKE and BA protocols. We show that our proposed protocols are memory leakage resilient. In addition, we prove their security in the standard model. Performance analysis of both protocols shows their efficiency for AMI applications. The proposed protocols can be easily implemented. 相似文献