全文获取类型
收费全文 | 798篇 |
免费 | 180篇 |
国内免费 | 159篇 |
专业分类
电工技术 | 15篇 |
综合类 | 130篇 |
机械仪表 | 9篇 |
矿业工程 | 4篇 |
轻工业 | 11篇 |
石油天然气 | 5篇 |
武器工业 | 2篇 |
无线电 | 278篇 |
一般工业技术 | 25篇 |
自动化技术 | 658篇 |
出版年
2024年 | 3篇 |
2023年 | 18篇 |
2022年 | 33篇 |
2021年 | 43篇 |
2020年 | 37篇 |
2019年 | 33篇 |
2018年 | 39篇 |
2017年 | 35篇 |
2016年 | 24篇 |
2015年 | 35篇 |
2014年 | 55篇 |
2013年 | 65篇 |
2012年 | 69篇 |
2011年 | 69篇 |
2010年 | 62篇 |
2009年 | 52篇 |
2008年 | 61篇 |
2007年 | 89篇 |
2006年 | 57篇 |
2005年 | 47篇 |
2004年 | 37篇 |
2003年 | 27篇 |
2002年 | 19篇 |
2001年 | 24篇 |
2000年 | 28篇 |
1999年 | 17篇 |
1998年 | 12篇 |
1997年 | 10篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 6篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1982年 | 2篇 |
1980年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有1137条查询结果,搜索用时 15 毫秒
1.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective. 相似文献
2.
3.
With the development of battery vehicles, vehicle‐to‐grid (V2G) networks are becoming more and more important in smart grid. Although battery vehicles are environmentally friendly and flexible to use two‐way communication and two‐way electricity flow, they also raise privacy‐preservation challenges, such as location and movement privacy. On the one hand, utility companies have to monitor the grid and analyze user data to control the power production, distribution, scheduling, and billing process, while typical users need to access their data later online. On the other hand, users are not willing to provide their personal data because they do not trust the system security of the utility companies where their data stored, and it may potentially expose their privacy. Therefore, in this paper, we study data management of V2G networks in smart grid with privacy‐preservation to benefit both the customers and the utility companies. Both data aggregation and data publication of V2G networks are protected in the proposed architecture. To check its security, we analyze this architecture in several typical V2G networks attacks. We conduct several experiments to show that the proposed architecture is effective and efficient, and it can enhance user privacy protection while providing enough information for utility companies to analyze and monitor the grid. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
4.
针对水声信道中窄带信号的多途时延估计问题,本文在对复倒谱时延估计方法进行研究的基础上,提出了一种基于对数域同态滤波的时延估计算法.结合复倒谱与同态滤波思想,将接收的窄带信号首先变换到对数域,然后与本地存储的信号进行谱减法,再对相减后的信号进行滤波以消除残余的信号与噪声成分,最后将其恢复到时域以获取多途时延估计.与传统的匹配滤波/相关处理以及复倒谱分析方法相比,本文算法具有时延估计精度高、噪声抑制能力较强等特点.仿真与湖试数据处理结果证明了该方法的有效性. 相似文献
5.
DNA序列承载着人体重要的生物学信息,如何在保护隐私的情况下正确地对不同的DNA序列进行比对,成为亟待研究的科学问题。汉明距离在一定程度上刻画了两个DNA序列的相似程度,在保护隐私的情况下,研究DNA序列的汉明距离计算问题。首先定义了DNA序列的0-1编码规则,该规则将长度为n的DNA序列编码成长度为4n的0-1串,证明了两个DNA序列的汉明距离等于它们的0-1编码串的汉明距离的一半。以此结论为基础,以GM加密算法为主要密码学工具,构造了计算DNA序列汉明距离的一个安全两方计算协议。在半诚实攻击者模型下,证明了协议的正确性,给出了基于模拟器的安全性证明,并对协议的效率进行了分析。 相似文献
6.
7.
8.
为了提高光照不均图像的增强速率,提出了基于GPU平台的同态滤波并行算法.根据同态滤波算法的并行性,利用CUDA软硬件体系架构,实现了同态滤波算法向GPU上的移植.利用多幅不同分辨率图像作为测试数据,对比CPU和GPU方案的计算效率.实验结果表明,GPU实现方案大幅度提升了计算效率. 相似文献
9.
针对矿用齿轮箱振动信号的特点,提出了一种基于经验模态分解(empirical mode decomposition,简称EMD)与同态滤波相结合的故障解调方法.利用EMD对某矿用皮带机齿轮箱故障信号进行分解,得到若干个本征模态函数(intrinsic mode functions,简称IMFs)分量,然后对其中较突出的IMFs进行同态滤波解调分析,提取出了频率为7.0Hz的调制故障信号.研究表明,EMD与同态滤波解调相结合是一种有效的齿轮箱故障诊断方法. 相似文献
10.
In order to achieve fine-grained access control in cloud computing, existing digital rights management (DRM) schemes adopt attribute-based encryption as the main encryption primitive. However, these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud. In this paper, we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing. We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption. Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content. The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users, and also enables the license server to implement immediate attribute and user revocation. Moreover, our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption, which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext. Extensive analytical results indicate that our proposed scheme is secure and efficient. 相似文献