首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   1篇
  国内免费   1篇
化学工业   20篇
金属工艺   3篇
机械仪表   7篇
能源动力   2篇
轻工业   11篇
无线电   21篇
一般工业技术   24篇
冶金工业   9篇
自动化技术   16篇
  2022年   1篇
  2021年   3篇
  2020年   3篇
  2019年   4篇
  2018年   2篇
  2017年   1篇
  2015年   3篇
  2014年   5篇
  2013年   9篇
  2012年   6篇
  2011年   13篇
  2010年   6篇
  2009年   5篇
  2008年   6篇
  2007年   1篇
  2006年   7篇
  2005年   2篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   2篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1988年   2篇
  1987年   1篇
  1985年   2篇
  1981年   1篇
  1979年   1篇
  1974年   1篇
  1973年   1篇
排序方式: 共有113条查询结果,搜索用时 0 毫秒
21.
22.
We propose a double-gate (DG) 1T-DRAM cell combining SONOS type storage node on the back-gate (control-gate) for nonvolatile memory function. The cell sensing margin and retention time characteristics were systematically examined in terms of control-gate voltage (Vcg) and nonvolatile memory (NVM) function. The additional NVM function is achieved by Fowler-Nordheim (FN) tunneling electron injection into the nitride storage node. The injected electrons induce a permanent hole accumulation layer in silicon body which improves the sensing margin and retention time characteristics. To demonstrate the effect of stored electrons in the nitride layer, experimental data are provided using 0.6 μm devices fabricated on SOI wafers.  相似文献   
23.
24.
25.
26.
In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Authentication is a crucial concern in resource constrained environments, and despite the great number of existing EAP methods, as explained in the article, we are still in need for EAP methods tightly adapted to wireless environments and satisfying heterogeneity of terminals and their limitations of resources. After a first comparative analysis of existing EAP methods, this article presents a new EAP-EHash method (EHash for encrypted hash) that is adapted to the highly vulnerable wireless environment by supporting mutual authentication and session key derivation and offering simplicity, rapidity, and easy-to-deploy features. This EAP-EHash was formally proven to satisfy the claimed security properties, thanks to the AVISPA tool. Implementation of it on an 802.11 testbed platform gave realistic authentication delays averaging 26 ms and thus proved that EAP-EHash is competitive to EAP-MD5 that is known to be the simplest of the EAP methods. Features of EAP-EHash include short execution delays and low bandwidth consumption, and as such, it appears attractive for wireless.  相似文献   
27.
When remoteAtm sites communicate through anAtm public network, a number of security problems arise, such as hacking, eavesdropping and traffic tampering. This paper proposes three contributions to these security problems. Firstly, risks due toAtm technology usage are detailed. Secondly, a survey of existing techniques aiming at securingAtm communications is presented with emphasis on theAtm Forum’s security specifications. Thirdly, a new solution called Safe (which stands for Solution for anAtm Frequent communications Environment) developed in the Démostène project is described. Safe realizes both firewall’s filtering functions and communications protection over theAtm network. The main idea of Safe is to use signaling (Uni 3.1) as a means to exchange security information over the network. This idea has been implemented and introduced to theAtm Forum.  相似文献   
28.
Transport of Relational Structures in Groups of Diffeomorphisms   总被引:1,自引:0,他引:1  
This paper focuses on the issue of translating the relative variation of one shape with respect to another in a template centered representation. The context is the theory of Diffeomorphic Pattern Matching which provides a representation of the space of shapes of objects, including images and point sets, as an infinite dimensional Riemannian manifold which is acted upon by groups of diffeomorphisms. We discuss two main options for achieving our goal; the first one is the parallel translation, based on the Riemannian metric; the second one, based on the group action, is the coadjoint transport. These methods are illustrated with 3D experiments.
Laurent YounesEmail:
  相似文献   
29.
30.
Prosthetic heart valves of the Bjork-Shiley convexo-concave (BSCC) type have been used extensively in implants; however, there have been reports of cases where one component of the valves failed, leading to the demise of the patient. This paper presents a new method for noninvasive electromagnetic evaluation for this type of valve, using an eddy current transducer with orthogonal coils. In vitro experiments on BSCC prosthetic heart valve replicas have shown that discontinuities of outlet strut with depths equal or larger than 0.4 mm can be detected with a probability of detection (POD) of 86.4%, and in the case of discontinuities with depth equal or larger than 0.6 mm with POD of 97%. Blind tests effectuated on 32 BSCC prosthetic heart valves have shown that, using the proposed method, the tested valves have been correctly classified.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号