首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   158篇
  免费   26篇
  国内免费   20篇
电工技术   6篇
综合类   9篇
机械仪表   4篇
无线电   79篇
一般工业技术   9篇
冶金工业   1篇
自动化技术   96篇
  2023年   3篇
  2022年   9篇
  2021年   8篇
  2020年   6篇
  2019年   9篇
  2018年   2篇
  2017年   17篇
  2016年   8篇
  2015年   18篇
  2014年   15篇
  2013年   23篇
  2012年   32篇
  2011年   15篇
  2010年   14篇
  2009年   7篇
  2008年   4篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  2000年   1篇
  1999年   1篇
  1998年   4篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
排序方式: 共有204条查询结果,搜索用时 15 毫秒
1.
《Microelectronics Reliability》2015,55(11):2276-2283
Reliability of embedded electronic products is a challenging issue regarding ElectroStatic Discharge (ESD) events into real live applications. This is strongly related to the increased number of embedded systems and to technologies shrinking that result in less robust chips. To ensure the safety of electronic systems, the ESD events have to be taken into account at first design phase. But equipment manufacturers are facing the dilemma that no information is provided by the semiconductor manufacturers. At the same time Integrated Circuit (IC) designers have to take into account the final application environment to build the ESD protection strategy. Depending on the external components (external means around the chip) the on-chip current path could change. Understanding how the system environment impacts the current path within the chip is needed. This paper deals with on-chip oscilloscope developed for in-situ measurement of real ESD event in 65 nm CMOS technology. The measurement bandwidth of the embedded sampler is 100 GHz, and 20 GHz for the probes. Thanks to this technique, impact of the system on the current path of the on-chip ESD strategy will be observed. Some measurement results during an ESD stress on an I/O structure will be presented and analyzed showing that PCB trace and package induce the creation of new current paths.  相似文献   
2.
FrequentItemsetMining (FIM) is one of the most important data mining tasks and is the foundation of many data mining tasks. In Big Data era, centralized FIM algorithms cannot meet the needs of FIM for big data in terms of time and space, so Distributed Frequent Itemset Mining (DFIM) algorithms have been designed to meet the above challenges. In this paper, LocalGlobal and RedistributionMining which are two main paradigms of DFIM algorithm are discussed; Two algorithms of these paradigms on MapReduce named LG and RM are proposed while MapReduce is a popular distributed computing model, and also the related work is discussed. The experimental results show that the RM algorithm has better performance in terms of computation and scalability of sites, and can be used as the basis for designing the DFIM algorithm based on MapReduce. This paper also discusses the main ideas of improving the DFIM algorithms based on MapReduce.  相似文献   
3.
周强  杨庚 《计算机应用研究》2013,30(7):2100-2104
提出一种可进行数据完整性和隐私保护的无线传感器网络安全数据融合算法IPPDA。通过在感知数据中附加一组同余数, 使汇聚节点能通过中国剩余定理进行数据完整性检测; 以时间和密钥为参数计算基于杂凑函数的消息验证码, 保证数据的新鲜性; 利用同态加密算法对数据进行隐私保护。仿真结果表明, IPPDA可以有效保护融合数据的隐私性、完整性和新鲜性, 能花费比iCPDA和iPDA算法更少的数据通信量和计算量, 得到更加精确的数据融合结果。  相似文献   
4.
给出了一个在低码率图像描述中应用最优支持向量(SV)描述的编码算法,提出一个训练样本集缩减策略,在支持向量机(SVM)模型中用于快速拟合重要的交流(AC)系数,它能够在基本保持原有精度的前提下,有效地提高SVM的回归速度,减少输出参数;提出了直流(DC)系数的按位差分预测编码方法和压缩性能更好的码流产生方法。实验结果表明,该方法不仅缩减了编码时间,而且在相同码率下能获得更好的图像质量。以往基于SV的编码未提及码流结构的描述方法,而快速SV拟合和数据组织方法克服了以往算法可行性差的缺点。  相似文献   
5.
MIMO多跳无线网络   总被引:1,自引:0,他引:1  
综述了多跳无线网络MIMO(multiple-input multiple-output)技术的研究进展,分析了MIMO技术的引入对多跳无线网络各层及整体设计的影响.以跨层协议设计为重点,详细介绍了当前典型的基于MIMO的多跳无线网络协议算法的核心机制,并比较分析了这些算法的特点和性能差异与存在的缺陷.最后,结合本领域内的研究现状,指出了基于MIMO的多跳无线网络走向实际工程应用环境所亟待解决的关键问题,指出了基于MIMO技术设计自适应调整、高性能多跳无线网络跨层模型及协议的重要性.  相似文献   
6.
7.
As typical applications in the field of the cloud computing, cloud storage services are popular in the development of smart cities for their low costs and huge storage capacity. Proofs-of-ownership (PoW) is an important cryptographic primitive in cloud storage to ensure that a client holds the whole file rather than part of it in secure client side data deduplication. The previous PoW schemes worked well when the file is in plaintext. However, the privacy of the clients’ data may be vulnerable to honest-but-curious attacks. To deal with this issue, the clients tend to encrypt files before outsourcing them to the cloud, which makes the existing PoW schemes inapplicable any more. In this paper, we first propose a secure zero-knowledge based client side deduplication scheme over encrypted files. We prove that the proposed scheme is sound, complete and zero-knowledge. The scheme can achieve a high detection probability of the clients’ misbehavior. Then we introduced a proxy re-encryption based key distribution scheme. This scheme ensures that the server knows nothing about the encryption key even though it acts as a proxy to help distributing the file encryption key. It also enables the clients who have gained the ownership of a file to share the file with the encryption key generated without establishing secure channels among them. It is proved that the clients’ private key cannot be recovered by the server or clients collusion attacks during the key distribution phase. Our performance evaluation shows that the proposed scheme is much more efficient than the existing client side deduplication schemes.  相似文献   
8.
分析基于围界防入侵应用的带状无线传感器网络的特性。在这个基础上,提出了一种适用于带状无线传感器网络的分簇路由机制。该路由机制利用局部信息来优化分簇机制和簇头选择机制,同时提出了一种基于感知范围的节点休眠方法,节省网络消耗的能量。仿真结果表明:在带状传感器网络中,该路由机制与HEED算法相比在能量利用率和平均能耗上都有明显的优势,能够延长网络生存期。  相似文献   
9.
针对目前对于病毒的行为分析工具只能在单机系统中分析一条程序执行的路径,误报率很高的问题,提出了一种行为分析模型。该模型利用云计算海量资源,将病毒多条执行路径的分析移植到云计算虚拟机结点上完成。对每条病毒的执行路径分别在不同的虚拟机结点上并行同时执行分析,通过对虚拟机结点中系统调用的监控找出病毒在某种特定的条件下触发的恶意行为。在开源云平台Eucalyptus的实验表明,该模型可以检测出病毒的条件触发行为,找出触发恶意行为的条件和可以满足这些条件的输入数据,并且性能比单机系统有了很大提升。  相似文献   
10.
针对目前密文区间检索多次断言存在信息泄露等问题,有单断言的密文区间检索方案(SRQSAE方案),并证明方案在唯密文攻击下的隐私安全性。对SRQSAE方案的安全性进行了分析,分析结果表明SRQSAE方案并不能隐藏搜索关键字的大小关系排序。通过在每次生成搜索索引或陷门消息时引入不同随机数的方法,提出了单断言的密文区间检索新方案。新方案对搜索关键字、区间的大小关系提供了很好的隐私保护;而且新方案在安全性提高的同时,并不以损失效率为代价。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号