首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2777篇
  免费   393篇
电工技术   199篇
综合类   283篇
化学工业   70篇
金属工艺   4篇
机械仪表   57篇
建筑科学   132篇
矿业工程   79篇
能源动力   24篇
轻工业   53篇
水利工程   31篇
石油天然气   26篇
武器工业   17篇
无线电   654篇
一般工业技术   57篇
冶金工业   26篇
原子能技术   6篇
自动化技术   1452篇
  2023年   24篇
  2022年   39篇
  2021年   38篇
  2020年   59篇
  2019年   41篇
  2018年   32篇
  2017年   45篇
  2016年   44篇
  2015年   71篇
  2014年   229篇
  2013年   197篇
  2012年   273篇
  2011年   295篇
  2010年   244篇
  2009年   273篇
  2008年   215篇
  2007年   216篇
  2006年   167篇
  2005年   165篇
  2004年   149篇
  2003年   141篇
  2002年   80篇
  2001年   43篇
  2000年   33篇
  1999年   17篇
  1998年   4篇
  1997年   4篇
  1996年   3篇
  1995年   5篇
  1994年   1篇
  1993年   3篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1985年   3篇
  1984年   1篇
  1983年   3篇
  1981年   3篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1957年   1篇
排序方式: 共有3170条查询结果,搜索用时 15 毫秒
1.
Providing security to Mobile Ad-hoc Networks (MANET) is a challenging and demanding task. It is important to secure the network against intrusions in MANET for assuring the development of services. For this purpose, some intrusion-detection systems (IDSs) have been developed in traditional works. However, these have some drawbacks, such as that there is no assurance for public key authentication, certificate validation between two nodes is not possible, and they require a large amount of time for processing. To overcome all these issues, a Trust-Based Authentication Routing with Bio-Inspired Intrusion Detection System (TRAB-IDS) is developed in this article. The main aim of this article is to provide security to the network against harmful intrusions. Here, the trust and deep packet inspection (DPI) concepts are integrated for improving the security. Moreover, the certificate authority generates a public and private key pair for initiating the route agent and authenticating the neighboring nodes. Based on the trust of the node, the packet is forwarded to the intermediate node by calculating a bogus key. Then, the DPI is initiated for extracting the packet features and the similarity between the features is estimated. If the packet is matched with the attacker, an error report will be forwarded to the certificate authority; otherwise, the packet will be forwarded to the other node. The experimental results evaluate the performance of the proposed TRAB-IDS in terms of delivery ratio, delay, security cost, and misdetection ratio.  相似文献   
2.
Two goals of this study are to determine the extent of fingerprint distortion on recognition performance and establish if varying levels of distortion in acquired fingerprints linearly impact recognition performance. The first goal was achieved by determining the performance metrics: false accept and reject rates, equal error rates and detection trade-off curves for six categories of fingerprints of 201 individuals acquired under one normal and five other varying degrees of distortion. The second goal was achieved by first determining if a relationship exists between genuine scores and levels of distortion from the p-value, and second establishing a linear relationship equation using regression analysis. The results reveal that the increase in fingerprint distortion linearly impacts the recognition performance. The results of this study are beneficial to the academia, where theoretically sound fingerprint algorithms robust to distortions are yet to be designed for the secure use of fingerprint biometrics.  相似文献   
3.
覃晓霞  王晨  乔迪 《电信科学》2016,(4):133-140
TD-LTE小基站的部署场景、覆盖策略与传统宏基站不同,站址的规划也与宏基站有较大区别,采用传统宏基站PTN回传网络承载TD-LTE小基站将面临三大难题:网络效能低、安全性差、智能性低.对如何建设高效、安全、智能的小基站回传网络进行了研究,结合中国移动网络现状,提出PON+CMNet、PTN+CMNet、PON+PTN 、PTN端到端4种小基站回传承载方案,并对这4种方案进行了现网测试验证.验证表明,4种承载方案均满足小基站通信业务需求,采用PON+CMNet承载方案在安全性、智能性、高效性上优于另外3种承载方案.  相似文献   
4.
This paper proposes an instance?learning?based intrusion?detection system (IL?IDS) for wireless sensor networks (WSNs). The goal of the proposed system is to detect routing attacks on a WSN. Taking an ...  相似文献   
5.
徐英  刘同刚 《电子测试》2016,(21):176-177
用电检查人员的反窃电能力的高低将直接对整个用电检查工作成效带来影响.但是就当前来看,目前部分用电检查人员的反窃电能力较差,所以为了促进用电检查成效的提升,本文提出了关于促进用电检查人员反窃电能力的对策.  相似文献   
6.
移动终端在异构网络中进行垂直切换时不但要考虑周围无线网络各项性能指标,还要考虑安全问题。针对异构网络中的安全切换问题,提出了一种基于层次分析法的异构网络安全切换算法。在传统的层次分析法的基础之上引入了安全因子和安全参数。安全因子随着网络安全特性的变化而动态改变,而安全参数是对网络安全性的量化表示。实验结果表明,算法不仅能使终端切换到性能最佳的网络,还能够保证终端切换时的安全性。  相似文献   
7.
传统的Java类文件保护方法存在被软件工具和反编译保护算法及利用其他接口进行破译等问题。通过在Java程序的运行环境———虚拟机中最底层Zip算法的开放源代码嵌入AES密码算法和RSA密码算法,提出一种安全性较高的基于混合密码算法的Java类文件保护方法。实验结果显示:该方法具有与AES和RSA一样的安全性,解决了传统保护方法的问题,比传统的方法有更安全的保护作用。  相似文献   
8.
An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process.  相似文献   
9.
本文以财务软件数据库安全与审计追踪技术为主线,通过数据库存储以及调用过程中的数据库加密来达到数据库的安全性要求。通过审计追踪技术,来解决人工审计相对繁琐而且效率不高,容易造成安全隐患,难以追查造成事故原因等问题。本系统使用Delphi7.0作为主要软件开发工具,并利用SQL Server 2000进行数据库开发与研究,最终实现对财务预结算软件的应用,并完成数据库的加密算法和审计追踪的设计,有效地提高了数据库的安全性和审计的高效性。文章还对加密后的数据库进行了仿真验证,结果表明,数据库可以通过加密来防止攻击破解,具有较高的实用价值。  相似文献   
10.
Satellites represent a solution for Internet access in locations with no other telecom infrastructures, for example, on high mobility platforms such as planes, ships or high‐speed trains, or for disaster recovery applications. However, due to peculiar characteristics, satellite networks are prone to different security threats. In this paper, we introduce a novel, robust security architecture for securing digital video broadcasting‐return channel via satellite satellite networks, inspired by the robust security mechanism available in the Institute of Electrical and Electronic Engineers (IEEE) 802.11i wireless local area network. We propose an efficient authentication and key management mechanism, which is exploited through three round‐trips only, demonstrating that it is as secure as IEEE 802.11i. Furthermore, the simulation results show that the proposed security framework needs a very small data overhead and shows better performance than internet protocol security (IPSec), which is commonly used as an end‐to‐end security solution over internet protocol satellite networks. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号