首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11535篇
  免费   1679篇
  国内免费   1018篇
电工技术   1058篇
综合类   1220篇
化学工业   92篇
金属工艺   58篇
机械仪表   495篇
建筑科学   71篇
矿业工程   105篇
能源动力   55篇
轻工业   79篇
水利工程   38篇
石油天然气   49篇
武器工业   80篇
无线电   3302篇
一般工业技术   183篇
冶金工业   58篇
原子能技术   24篇
自动化技术   7265篇
  2024年   6篇
  2023年   65篇
  2022年   129篇
  2021年   147篇
  2020年   218篇
  2019年   279篇
  2018年   171篇
  2017年   243篇
  2016年   262篇
  2015年   397篇
  2014年   697篇
  2013年   679篇
  2012年   970篇
  2011年   1038篇
  2010年   899篇
  2009年   862篇
  2008年   989篇
  2007年   1214篇
  2006年   902篇
  2005年   893篇
  2004年   715篇
  2003年   650篇
  2002年   474篇
  2001年   351篇
  2000年   294篇
  1999年   204篇
  1998年   116篇
  1997年   85篇
  1996年   68篇
  1995年   70篇
  1994年   38篇
  1993年   37篇
  1992年   25篇
  1991年   10篇
  1990年   8篇
  1989年   6篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   4篇
  1984年   3篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Most of the internet users connect through wireless networks. Major part of internet traffic is carried by Transmission Control Protocol (TCP). It has some design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestion in the network, TCP used acknowledgment to delivery of packets by the end host. In wired network, packet loss signals congestion in the network. But rather in wireless networks, loss is mainly because of the wireless characteristics such as fading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory faces problem during handshake between them. This paper focuses on finding this misinterpretation of the losses using cross layer approach. This paper focuses on increasing bandwidth usage by improving TCP throughput in wireless environments using cross layer approach and hence named the proposed system as CRLTCP. TCP misinterprets wireless loss as congestion loss and unnecessarily reduces congestion window size. Using the signal strength and frame error rate, the type of loss is identified and accordingly the response of TCP is modified. The results show that there is a significant improvement in the throughput of proposed TCP upon which bandwidth usage is increased.  相似文献   
2.
连宜新  陈韬  李伟  南龙梅 《计算机工程》2022,48(2):156-163+172
为解决对称密码中s盒和非线性布尔函数(NBF)在实现密码专用处理器时采用异构化设计导致的资源浪费问题,提出一种类AESs盒和NBF的可重构电路结构方法。分析s盒问题中的原有非线性布尔函数模块(NBFM),4-4、6-4的s盒电路能够提供更好的适配性,但不能很好地支持8-8的s盒电路。基于塔域分解理论,论证不同的类AESs盒电路差异在于输入前后的转换矩阵。采用混合基的方法将类AESs盒电路分解成GF (16)上的各个运算模块,并推导出模块比特级别表达式,在具体适配运算模块时采取门级实现、NBFM适配实现或对NBFM进行改进3种方案,实现类AESs盒和NBF的可重构电路。实验结果表明,该方法在不影响原有NBF功能的基础上,利用4个NBFM与22.7%的s盒电路面积即可实现一个完整的类AESs盒电路。  相似文献   
3.
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Station. The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS. In order to increase the transfer speed and efficiency, the Mavlink does not encrypt the messages. As a result, the protocol is vulnerable to various security attacks such as Eavesdropping, GPS Spoofing, and DDoS. In this study, we tackle the problem and secure the Mavlink communication protocol. By leveraging the Mavlink packet’s vulnerabilities, this research work introduces an experiment in which, first, the Mavlink packets are compromised in terms of security requirements based on our threat model. The results show that the protocol is insecure and the attacks carried out are successful. To overcome Mavlink security, an additional security layer is added to encrypt and secure the protocol. An encryption technique is proposed that makes the communication between the UAV and GCS secure. The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency. The results are validated in terms of transfer speed, performance, and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol. Our achieved results have significant improvement over the literature and Mavlink in terms of security.  相似文献   
4.
为解决当前电子发票防伪困难、隐私泄露、验证效率低等问题,针对全程无纸化的电子发票文件,提出了一种基于国密签名算法的电子发票公开验证架构。面向电子发票文件数据来源复杂、票面用户信息敏感、数据流转频繁等特征及电子发票高效公开查验需求,在电子发票服务架构下设计电子发票生成及查验协议,基于无证书联合签名提出发票防伪签名码生成方案,实现开票方与税务主管部门的多重数据核验与签名,支持各类型的发票持有者对电子发票的真伪及数据完整性进行公开查验。融合数据加密算法对电子发票中的用户隐私数据进行保护,同时可满足各类发票应用场景下的真伪或状态验证需求,解决了当前电子发票文件中用户消费信息等敏感数据在传递中泄露的问题,突破了电子发票仅能通过在线系统核对真伪的局限。查验方仅需验证单次签名即可确认开票方及主管部分等双方签名的电子发票真伪性,同时利用公钥加密实现了隐私数据,方案中使用国密算法符合电子发票应用需求。调用Scyther 安全仿真工具对方案安全性进行分析,在各类攻击下可安全验证数据的完整性及来源真实性并保证隐私数据的保密性。在查验计算开销及发票文件数据量两方面,与国外已实行的典型电子发票查验方案及同类型基于数字签名的电子发票查验方案进行对比,所提电子发票公开查验方案在查验效率及发票文件大小等两方面具有明显的优势。  相似文献   
5.
In this paper, a new filtering fusion problem is studied for nonlinear cyber-physical systems under error-variance constraints and denial-of-service attacks. To prevent data collision and reduce communication cost, the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors. Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identically-distributed random variables. From the defenders’ view, the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence. At the local filtering stage, a set of variance-constrained local filters are designed where the upper bounds (on the filtering error covariances) are first acquired and later minimized by appropriately designing filter parameters. At the fusion stage, all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule. Furthermore, the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance. A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator.   相似文献   
6.
在传统密码学应用中,人们总假定终端是安全的,并且敌手只存在于通信信道上。然而,主流的恶意软件和系统漏洞给终端安全带来了严重和直接的威胁和挑战,例如容易遭受存储内容被病毒破坏、随机数发生器被腐化等各种攻击。更糟糕的是,协议会话通常有较长的生存期,因此需要在较长的时间内存储与会话相关的秘密信息。在这种情况下,有必要设计高强度的安全协议,以对抗可以暴露存储内容和中间计算结果(包括随机数)的敌手。棘轮密钥交换是解决这一问题的一个基本工具。文中综述了密码本原——棘轮密钥交换,包括单向、半双向和双向等棘轮密钥交换的定义、模型及构造,并展望了棘轮密钥交换的未来发展趋势。  相似文献   
7.
针对现有工业信息安全研究主要集中在工业以太网方面,缺少对串行链路协议防护的研究等问题,提出一种基于离散时间马尔可夫链(Discrete Time Markov Chain,DTMC)的工业串行协议状态检测算法。该算法利用工业控制系统(Industrial Control System,ICS)行为有限和状态有限的特征,根据串行链路协议历史流量数据,自动构建ICS正常行为模型——DTMC。模型包含状态事件、状态转移、状态转移概率和状态转移时间间隔等行为信息,使用该模型所包含的状态信息作为状态检测规则集。当检测阶段生成的状态信息与状态检测规则集中的信息不同或偏差超过阈值时,产生告警或拒绝等动作。同时,结合综合包检测(Comprehensive Packet Inspection,CPI)技术来扩大协议载荷数据的可检测范围。实验结果表明,所提算法能有效检测语义攻击,保护串行链路安全,且算法误报率为5.3%,漏报率为0.6%。  相似文献   
8.
为简化嵌入式开发人员更新RISC-V处理器固件的操作流程,提出了一种易操作、高效且稳定的固件更新系统设计方法,包括BootROM引导流程设计和在应用中编程(in-application programming,IAP)设计。在BootROM引导流程设计中,通过启动参数再配置的方法,可使此引导流程兼容多种启动模式,如SRAM启动、主内存启动。在IAP设计中,处理器先通过通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接收从上位机发送过来的新固件,该固件采用Ymodem协议发送,再通过串行外设接口(serial peripheral interface,SPI)进行片外Flash的重新烧写,以完成对系统固件的更新,同时,为保证接收新固件的可靠性,加入了循环冗余校验(cyclic redundancy check,CRC)算法。在现场可编程门阵列(field programmable gate array,FPGA)上对该系统进行了多次测试,均完成了对系统固件的更新,验证了该设计的可行性与稳定性。  相似文献   
9.
针对物联网中优先级业务和实时性的需求,提出一种连续时间两级完全轮询接入MAC协议。在连续时间的基础上,将用户划分为优先级用户和普通用户,采用完全服务规则对用户提供服务来降低平均等待时延。当优先级用户向普通用户切换时,将服务时间和切换时间并行处理来提高系统的服务效率。使用随机过程和概率母函数的方法建立数学模型,对该协议用户的平均排队队长和平均等待时延进行了精确解析,并通过仿真实验验证。实验结果表明,理论值与实验值一致,该协议能对不同优先级的业务进行区分,用户的平均等待时延较低。  相似文献   
10.
The development of IP-based Internet of Things (IoT) networks would facilitate more effective end-to-end IP network architectures, but it remains a challenge. Network routing needs to be effectively addressed in the IoT environments of scarce computational and energy resources. Accordingly, the Internet Engineering Task Force (IETF) has specified the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to provide a bespoke IPv6-based routing framework for IoT networks. However, RPL comes with no Quality of Service (QoS) support which is an essential requirement for many IoT applications. The network research community has introduced a number of research proposals enhancing RPL with different QoS solutions. This paper presents a review of these proposed solutions and aims to establish a firm understanding of recent QoS developments for RPL and possible areas for future IoT routing research. The focus is on comprehending the protocol and networking properties that can affect QoS performance in RPL networks. Consideration is also given to different objective functions developed for addressing varying QoS aspects such as throughput, delay, and packet loss. RPL is also extended in a number of QoS solutions following different approaches at the MAC, network, and application layers. However, there is still a need for further developments to address effective QoS support, particularly for dynamic RPL networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号