首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1010篇
  免费   55篇
  国内免费   95篇
电工技术   5篇
综合类   42篇
化学工业   5篇
机械仪表   18篇
建筑科学   2篇
矿业工程   2篇
能源动力   1篇
轻工业   56篇
石油天然气   11篇
武器工业   3篇
无线电   200篇
一般工业技术   3篇
冶金工业   1篇
原子能技术   1篇
自动化技术   810篇
  2023年   7篇
  2022年   4篇
  2021年   4篇
  2020年   11篇
  2019年   7篇
  2018年   15篇
  2017年   21篇
  2016年   23篇
  2015年   19篇
  2014年   35篇
  2013年   44篇
  2012年   58篇
  2011年   107篇
  2010年   62篇
  2009年   62篇
  2008年   69篇
  2007年   92篇
  2006年   92篇
  2005年   97篇
  2004年   81篇
  2003年   74篇
  2002年   48篇
  2001年   35篇
  2000年   22篇
  1999年   26篇
  1998年   14篇
  1997年   3篇
  1996年   3篇
  1995年   6篇
  1994年   2篇
  1993年   2篇
  1991年   4篇
  1990年   6篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1983年   1篇
排序方式: 共有1160条查询结果,搜索用时 38 毫秒
1.
Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.  相似文献   
2.
In the study, lamb, feed and soil samples were collected from three regions of China in the year 2017 and 2018. The δ13C and δ15N values in lamb (defatted dry mass and lipids) and grass and the contents of nine elements in lamb, grass and soil were determined. The results indicated that except for Fe, Zn and Rb, most variables of lamb showed significant differences among two or three regions, and the contents of Fe, Sr and Cs showed significant differences between two years, and the contents of Cu and Zn showed significant differences among different muscle sections. Besides, significant correlations were found for δ13C between defatted lamb and lipid (r2 = 0.973, P < 0.05) and for the element contents between lamb and soil. Finally, four key variables δ13C, δ15N, Sr and Mo were selected through stepwise canonical discriminant analysis with the cross-validation correct classification rate of 99.1%.  相似文献   
3.
丁锋  潘宝玉 《地矿测绘》2004,20(2):42-44
介绍了山东省地质测绘院贯彻ISO9000族标准的方法和过程.通过总结该院质量管理体系运行中的经验与体会,进一步认识到,随着社会主义市场经济的日益完善和管理科学的不断发展,产品质量越来越引起各行各业的高度重视,贯彻ISO9000族标准,不仅可以有效地提高企业质量管理水平,而且可以大大地增强企业的市场竞争能力;建立健全质量保证体系,逐步实现管理模式与国际接轨,获取市场准入机会并不断扩大市场占有份额,是企业刻不容缓的重要任务.  相似文献   
4.
张敬伟  周德新 《兵工自动化》2005,24(3):42-43,51
基于VxWorks的802.1X认证者,认证阶段在申请者和认证服务器间认证请求和响应信息.认证后根据认证服务器结果控制端口开放状态,并通知申请者使用网络资源.其设计包括受控和非受控端口状态、收发数据链路层帧和传输层数据包、应用加密算法、状态机的实现与融合等.以实现认证安全性,及认证和业务数据流的分离.  相似文献   
5.
本文主要针对现有的PSTN语音保密系统的一些缺陷,提出了一种新型的结构方式,解决了pSTN语音系统中双方身份认证问题.在该系统中,引进了一种新型的管理机制--管理中心,以注册电话用户终端并下发公钥表;还引入了区间密钥,以方便灵活地划分通信的安全域.最后,本文对该系统的安全性能进行了分析.  相似文献   
6.
7.
8.
3D video for tele-medicine applications is gradually gaining momentum since the 3D technology can provide precise location information. However, the weak link for 3D video streaming is the necessary wireless link of the communication system. Neglecting the wireless impairments can severely degrade the performance of 3D video streaming that communicates complex critical medical data. In this paper, we propose systematic methodology for ensuring high performance of the 3D medical video streaming system. First, we present a recursive end-to-end distortion estimation approach for MVC (multiview video coding)-based 3D video streaming over error-prone networks by considering the 3D inter-view prediction. Then, based on the previous model, we develop a cross-layer optimization scheme that considers the LTE wireless physical layer (PHY). In this optimization, the authentication requirements of 3D medical video are also taken into account. The proposed cross-layer optimization approach jointly controls and manages the authentication, video coding quantization of 3D video, and the modulation and channel coding scheme (MCS) of the LTE wireless PHY to minimize the end-to-end video distortion. Experimental results show that the proposed approach can provide superior 3D medical video streaming performance in terms of peak signal-to-noise ratio (PSNR) when compared to state-of-the-art approaches that include joint source-channel optimized streaming with multi-path hash-chaining based-authentication, and also conventional video streaming with single path hash-chaining-based authentication.  相似文献   
9.
In this paper, area-efficient and high-throughput multi-mode architectures for the SHA-1 and SHA-2 hash families are proposed and implemented in several FPGA technologies. Additionally a systematic flow for designing multi-mode architectures (implementing more than one function) of these families is introduced. Compared to the corresponding architectures that are produced by a commercial synthesis tool, the proposed ones are better in terms of both area (at least 40%) and throughput/area (from 32% up to 175%). Finally, the proposed architectures outperform similar existing ones in terms of throughput and throughput/area, from 4.2× up to 279.4× and from 1.2× up to 5.5×, respectively.  相似文献   
10.
谢如元  徐加征 《电子质量》2011,(3):49-50,59
介绍了目前比较重要的与EMC相关的国内和国际的一些强制性和非强制性认证.主要介绍了中国大陆的3C认证、欧洲的CE和TUV认证、美国的FCC和UL认证、全球CB认证及日本电信认证等产品认证的特点、要求及认证的通用流程.为选择不同国家不同种类的认证提供了参考.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号