全文获取类型
收费全文 | 158篇 |
免费 | 26篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 6篇 |
综合类 | 9篇 |
机械仪表 | 4篇 |
无线电 | 79篇 |
一般工业技术 | 9篇 |
冶金工业 | 1篇 |
自动化技术 | 96篇 |
出版年
2023年 | 3篇 |
2022年 | 9篇 |
2021年 | 8篇 |
2020年 | 6篇 |
2019年 | 9篇 |
2018年 | 2篇 |
2017年 | 17篇 |
2016年 | 8篇 |
2015年 | 18篇 |
2014年 | 15篇 |
2013年 | 23篇 |
2012年 | 32篇 |
2011年 | 15篇 |
2010年 | 14篇 |
2009年 | 7篇 |
2008年 | 4篇 |
2007年 | 1篇 |
2006年 | 1篇 |
2005年 | 1篇 |
2004年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 4篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
排序方式: 共有204条查询结果,搜索用时 15 毫秒
1.
《Microelectronics Reliability》2015,55(11):2276-2283
Reliability of embedded electronic products is a challenging issue regarding ElectroStatic Discharge (ESD) events into real live applications. This is strongly related to the increased number of embedded systems and to technologies shrinking that result in less robust chips. To ensure the safety of electronic systems, the ESD events have to be taken into account at first design phase. But equipment manufacturers are facing the dilemma that no information is provided by the semiconductor manufacturers. At the same time Integrated Circuit (IC) designers have to take into account the final application environment to build the ESD protection strategy. Depending on the external components (external means around the chip) the on-chip current path could change. Understanding how the system environment impacts the current path within the chip is needed. This paper deals with on-chip oscilloscope developed for in-situ measurement of real ESD event in 65 nm CMOS technology. The measurement bandwidth of the embedded sampler is 100 GHz, and 20 GHz for the probes. Thanks to this technique, impact of the system on the current path of the on-chip ESD strategy will be observed. Some measurement results during an ESD stress on an I/O structure will be presented and analyzed showing that PCB trace and package induce the creation of new current paths. 相似文献
2.
FrequentItemsetMining (FIM) is one of the most important data mining tasks and is the foundation of many data mining tasks. In Big Data era, centralized FIM algorithms cannot meet the needs of FIM for big data in terms of time and space, so Distributed Frequent Itemset Mining (DFIM) algorithms have been designed to meet the above challenges. In this paper, LocalGlobal and RedistributionMining which are two main paradigms of DFIM algorithm are discussed; Two algorithms of these paradigms on MapReduce named LG and RM are proposed while MapReduce is a popular distributed computing model, and also the related work is discussed. The experimental results show that the RM algorithm has better performance in terms of computation and scalability of sites, and can be used as the basis for designing the DFIM algorithm based on MapReduce. This paper also discusses the main ideas of improving the DFIM algorithms based on MapReduce. 相似文献
3.
提出一种可进行数据完整性和隐私保护的无线传感器网络安全数据融合算法IPPDA。通过在感知数据中附加一组同余数, 使汇聚节点能通过中国剩余定理进行数据完整性检测; 以时间和密钥为参数计算基于杂凑函数的消息验证码, 保证数据的新鲜性; 利用同态加密算法对数据进行隐私保护。仿真结果表明, IPPDA可以有效保护融合数据的隐私性、完整性和新鲜性, 能花费比iCPDA和iPDA算法更少的数据通信量和计算量, 得到更加精确的数据融合结果。 相似文献
4.
给出了一个在低码率图像描述中应用最优支持向量(SV)描述的编码算法,提出一个训练样本集缩减策略,在支持向量机(SVM)模型中用于快速拟合重要的交流(AC)系数,它能够在基本保持原有精度的前提下,有效地提高SVM的回归速度,减少输出参数;提出了直流(DC)系数的按位差分预测编码方法和压缩性能更好的码流产生方法。实验结果表明,该方法不仅缩减了编码时间,而且在相同码率下能获得更好的图像质量。以往基于SV的编码未提及码流结构的描述方法,而快速SV拟合和数据组织方法克服了以往算法可行性差的缺点。 相似文献
5.
MIMO多跳无线网络 总被引:1,自引:0,他引:1
综述了多跳无线网络MIMO(multiple-input multiple-output)技术的研究进展,分析了MIMO技术的引入对多跳无线网络各层及整体设计的影响.以跨层协议设计为重点,详细介绍了当前典型的基于MIMO的多跳无线网络协议算法的核心机制,并比较分析了这些算法的特点和性能差异与存在的缺陷.最后,结合本领域内的研究现状,指出了基于MIMO的多跳无线网络走向实际工程应用环境所亟待解决的关键问题,指出了基于MIMO技术设计自适应调整、高性能多跳无线网络跨层模型及协议的重要性. 相似文献
6.
7.
As typical applications in the field of the cloud computing, cloud storage services are popular in the development of smart cities for their low costs and huge storage capacity. Proofs-of-ownership (PoW) is an important cryptographic primitive in cloud storage to ensure that a client holds the whole file rather than part of it in secure client side data deduplication. The previous PoW schemes worked well when the file is in plaintext. However, the privacy of the clients’ data may be vulnerable to honest-but-curious attacks. To deal with this issue, the clients tend to encrypt files before outsourcing them to the cloud, which makes the existing PoW schemes inapplicable any more. In this paper, we first propose a secure zero-knowledge based client side deduplication scheme over encrypted files. We prove that the proposed scheme is sound, complete and zero-knowledge. The scheme can achieve a high detection probability of the clients’ misbehavior. Then we introduced a proxy re-encryption based key distribution scheme. This scheme ensures that the server knows nothing about the encryption key even though it acts as a proxy to help distributing the file encryption key. It also enables the clients who have gained the ownership of a file to share the file with the encryption key generated without establishing secure channels among them. It is proved that the clients’ private key cannot be recovered by the server or clients collusion attacks during the key distribution phase. Our performance evaluation shows that the proposed scheme is much more efficient than the existing client side deduplication schemes. 相似文献
8.
9.
针对目前对于病毒的行为分析工具只能在单机系统中分析一条程序执行的路径,误报率很高的问题,提出了一种行为分析模型。该模型利用云计算海量资源,将病毒多条执行路径的分析移植到云计算虚拟机结点上完成。对每条病毒的执行路径分别在不同的虚拟机结点上并行同时执行分析,通过对虚拟机结点中系统调用的监控找出病毒在某种特定的条件下触发的恶意行为。在开源云平台Eucalyptus的实验表明,该模型可以检测出病毒的条件触发行为,找出触发恶意行为的条件和可以满足这些条件的输入数据,并且性能比单机系统有了很大提升。 相似文献
10.