全文获取类型
收费全文 | 2777篇 |
免费 | 393篇 |
专业分类
电工技术 | 199篇 |
综合类 | 283篇 |
化学工业 | 70篇 |
金属工艺 | 4篇 |
机械仪表 | 57篇 |
建筑科学 | 132篇 |
矿业工程 | 79篇 |
能源动力 | 24篇 |
轻工业 | 53篇 |
水利工程 | 31篇 |
石油天然气 | 26篇 |
武器工业 | 17篇 |
无线电 | 654篇 |
一般工业技术 | 57篇 |
冶金工业 | 26篇 |
原子能技术 | 6篇 |
自动化技术 | 1452篇 |
出版年
2023年 | 24篇 |
2022年 | 39篇 |
2021年 | 38篇 |
2020年 | 59篇 |
2019年 | 41篇 |
2018年 | 32篇 |
2017年 | 45篇 |
2016年 | 44篇 |
2015年 | 71篇 |
2014年 | 229篇 |
2013年 | 197篇 |
2012年 | 273篇 |
2011年 | 295篇 |
2010年 | 244篇 |
2009年 | 273篇 |
2008年 | 215篇 |
2007年 | 216篇 |
2006年 | 167篇 |
2005年 | 165篇 |
2004年 | 149篇 |
2003年 | 141篇 |
2002年 | 80篇 |
2001年 | 43篇 |
2000年 | 33篇 |
1999年 | 17篇 |
1998年 | 4篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有3170条查询结果,搜索用时 15 毫秒
1.
Providing security to Mobile Ad-hoc Networks (MANET) is a challenging and demanding task. It is important to secure the network against intrusions in MANET for assuring the development of services. For this purpose, some intrusion-detection systems (IDSs) have been developed in traditional works. However, these have some drawbacks, such as that there is no assurance for public key authentication, certificate validation between two nodes is not possible, and they require a large amount of time for processing. To overcome all these issues, a Trust-Based Authentication Routing with Bio-Inspired Intrusion Detection System (TRAB-IDS) is developed in this article. The main aim of this article is to provide security to the network against harmful intrusions. Here, the trust and deep packet inspection (DPI) concepts are integrated for improving the security. Moreover, the certificate authority generates a public and private key pair for initiating the route agent and authenticating the neighboring nodes. Based on the trust of the node, the packet is forwarded to the intermediate node by calculating a bogus key. Then, the DPI is initiated for extracting the packet features and the similarity between the features is estimated. If the packet is matched with the attacker, an error report will be forwarded to the certificate authority; otherwise, the packet will be forwarded to the other node. The experimental results evaluate the performance of the proposed TRAB-IDS in terms of delivery ratio, delay, security cost, and misdetection ratio. 相似文献
2.
Ogechukwu N. Iloanusi Celestine A. Ezema 《Information Security Journal: A Global Perspective》2017,26(6):267-275
Two goals of this study are to determine the extent of fingerprint distortion on recognition performance and establish if varying levels of distortion in acquired fingerprints linearly impact recognition performance. The first goal was achieved by determining the performance metrics: false accept and reject rates, equal error rates and detection trade-off curves for six categories of fingerprints of 201 individuals acquired under one normal and five other varying degrees of distortion. The second goal was achieved by first determining if a relationship exists between genuine scores and levels of distortion from the p-value, and second establishing a linear relationship equation using regression analysis. The results reveal that the increase in fingerprint distortion linearly impacts the recognition performance. The results of this study are beneficial to the academia, where theoretically sound fingerprint algorithms robust to distortions are yet to be designed for the secure use of fingerprint biometrics. 相似文献
3.
TD-LTE小基站的部署场景、覆盖策略与传统宏基站不同,站址的规划也与宏基站有较大区别,采用传统宏基站PTN回传网络承载TD-LTE小基站将面临三大难题:网络效能低、安全性差、智能性低.对如何建设高效、安全、智能的小基站回传网络进行了研究,结合中国移动网络现状,提出PON+CMNet、PTN+CMNet、PON+PTN 、PTN端到端4种小基站回传承载方案,并对这4种方案进行了现网测试验证.验证表明,4种承载方案均满足小基站通信业务需求,采用PON+CMNet承载方案在安全性、智能性、高效性上优于另外3种承载方案. 相似文献
4.
This paper proposes an instance?learning?based intrusion?detection system (IL?IDS) for wireless sensor networks (WSNs). The goal of the proposed system is to detect routing attacks on a WSN. Taking an ... 相似文献
5.
用电检查人员的反窃电能力的高低将直接对整个用电检查工作成效带来影响.但是就当前来看,目前部分用电检查人员的反窃电能力较差,所以为了促进用电检查成效的提升,本文提出了关于促进用电检查人员反窃电能力的对策. 相似文献
6.
移动终端在异构网络中进行垂直切换时不但要考虑周围无线网络各项性能指标,还要考虑安全问题。针对异构网络中的安全切换问题,提出了一种基于层次分析法的异构网络安全切换算法。在传统的层次分析法的基础之上引入了安全因子和安全参数。安全因子随着网络安全特性的变化而动态改变,而安全参数是对网络安全性的量化表示。实验结果表明,算法不仅能使终端切换到性能最佳的网络,还能够保证终端切换时的安全性。 相似文献
7.
8.
An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. 相似文献
9.
本文以财务软件数据库安全与审计追踪技术为主线,通过数据库存储以及调用过程中的数据库加密来达到数据库的安全性要求。通过审计追踪技术,来解决人工审计相对繁琐而且效率不高,容易造成安全隐患,难以追查造成事故原因等问题。本系统使用Delphi7.0作为主要软件开发工具,并利用SQL Server 2000进行数据库开发与研究,最终实现对财务预结算软件的应用,并完成数据库的加密算法和审计追踪的设计,有效地提高了数据库的安全性和审计的高效性。文章还对加密后的数据库进行了仿真验证,结果表明,数据库可以通过加密来防止攻击破解,具有较高的实用价值。 相似文献
10.
Ahmed Abdelsalam Daniel Caragata Michele Luglio Cesare Roseti Francesco Zampognaro 《International Journal of Satellite Communications and Networking》2017,35(1):17-43
Satellites represent a solution for Internet access in locations with no other telecom infrastructures, for example, on high mobility platforms such as planes, ships or high‐speed trains, or for disaster recovery applications. However, due to peculiar characteristics, satellite networks are prone to different security threats. In this paper, we introduce a novel, robust security architecture for securing digital video broadcasting‐return channel via satellite satellite networks, inspired by the robust security mechanism available in the Institute of Electrical and Electronic Engineers (IEEE) 802.11i wireless local area network. We propose an efficient authentication and key management mechanism, which is exploited through three round‐trips only, demonstrating that it is as secure as IEEE 802.11i. Furthermore, the simulation results show that the proposed security framework needs a very small data overhead and shows better performance than internet protocol security (IPSec), which is commonly used as an end‐to‐end security solution over internet protocol satellite networks. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献