首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   759篇
  免费   34篇
  国内免费   8篇
电工技术   9篇
化学工业   187篇
金属工艺   6篇
机械仪表   18篇
建筑科学   9篇
矿业工程   5篇
能源动力   46篇
轻工业   101篇
水利工程   6篇
石油天然气   6篇
无线电   78篇
一般工业技术   185篇
冶金工业   51篇
原子能技术   3篇
自动化技术   91篇
  2024年   7篇
  2023年   20篇
  2022年   51篇
  2021年   57篇
  2020年   41篇
  2019年   39篇
  2018年   69篇
  2017年   35篇
  2016年   41篇
  2015年   14篇
  2014年   31篇
  2013年   34篇
  2012年   32篇
  2011年   45篇
  2010年   24篇
  2009年   28篇
  2008年   36篇
  2007年   23篇
  2006年   10篇
  2005年   9篇
  2004年   12篇
  2003年   9篇
  2002年   10篇
  2001年   4篇
  2000年   2篇
  1999年   6篇
  1998年   7篇
  1997年   10篇
  1996年   7篇
  1995年   11篇
  1994年   8篇
  1993年   9篇
  1992年   6篇
  1991年   5篇
  1990年   4篇
  1989年   10篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   3篇
  1984年   6篇
  1983年   2篇
  1982年   3篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
排序方式: 共有801条查询结果,搜索用时 62 毫秒
101.
Wireless Personal Communications - Major issue in marine environment imaging is the expulsion of hazy scenes caused by natural phenomena such as absorption and scattering in underwater images. The...  相似文献   
102.
103.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals.  相似文献   
104.
Kumari  Savita  Singh  Brahmjit 《Wireless Networks》2019,25(8):5001-5009
Wireless Networks - Since the advent of 1G through 5G networks, telecommunication industry has gone through phenomenal transformation in the way we communicate, we work, and we socialize. In dense...  相似文献   
105.

Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their scheme is still vulnerable to forgery and offline password guessing attacks and it is also unable to provide user anonymity, forward secrecy and mutual authentication. With the intention of fixing the weaknesses of that scheme, we present a secure authentication scheme. We show that the proposed scheme is invulnerable to various attacks together with attacks observed in the analyzed scheme through both rigorous formal and informal security analysis. Furthermore, the security analysis using the widely-accepted Real-Or-Random (ROR) model ensures that the proposed scheme provides the session key (SK) security. Finally, we carry out the performance evaluation of the proposed scheme and other related schemes, and the result favors that the proposed scheme provides better trade-off among security and performance as compared to other existing related schemes.

  相似文献   
106.
Diatoms are single‐celled microalgae that produce a large variety of hierarchically porous, silica‐based microparticles as cell wall material. The presence of genetically encoded silica nanopatterns endows the biosilica with favorable properties for a wide range of applications including catalysis, chemical sensing, photonics, and drug delivery. Enhancing the performance of diatom biosilica requires i) a better understanding of the structure–property relationship in this material, and ii) methods that enable the manipulation of the biosilica structure and properties in a targeted manner. Here, genetic engineering of the diatom Thalassiosira pseudonana is employed to immobilize enzymes (glucose oxidase and horseradish peroxidase) into structurally distinct regions of the biosilica, which are termed valves and girdle bands. Remarkably, glucose oxidase in girdle bands exhibits >3‐fold higher catalytic activities compared to its location in valves. It is demonstrated through enzyme accessibility studies, protein engineering, and genetic engineering of biosilica morphology that the divergent enzyme activities are caused by the differences in the inherent silica nanopatterns of valves and girdle bands. This work highlights the importance of silica nanoscale architecture for the activity of immobilized enzymes and provides unprecedented tools for the biotechnological production of silica microparticles with tailored catalytic activities and anisotropic functionalities.  相似文献   
107.
A Fabry pérot antenna with a multilayer superstrate having nonuniform unit cells has been investigated as a receiving antenna for radio frequency (RF) energy harvesting applications. Here, the primary radiator is selected as a dual‐polarized aperture coupled microstrip antenna with a double‐layer superstrate. This antenna excites orthogonal polarizations, vertical (V) and horizontal (H) in the frequency band of 6.2 and 5.8 GHz, respectively, due to the presence of two orthogonal H‐shaped slots in its ground plane. The proposed antenna provides a gain enhancement of 9.8 and 10.1 dBi at the respective frequencies. The rectifying circuit is designed for a frequency of 5.8 GHz using a voltage doubler topology. The circuit provides a power conversion efficiency of 41% at 0 dBm input power.  相似文献   
108.
The incidence of degenerative diseases and the ageing population have added to the growing demand for bone grafts. Although autologous bone continues to be the gold standard, limited yield and potential morbidity of the donor site pose considerable challenges. Currently, clinically used synthetic grafts based on calcium phosphates are mechanically brittle and not compliant hence composite scaffolds are expected to be provide viable solutions. In this study we report composites of calcium meta phosphate-poly (vinyl alcohol) with tunable mechanical properties, low swelling and excellent biocompatibility. The elastomeric nature of the composites resist brittle fracture and the scaffolds can be easily shaped to the bone defect by the surgeon. Testing on bone plug shaped specimens of the scaffolds, exhibited superior mechanical properties compared to currently commercially available bone plugs with additional advantages being the ability to increase porosity without compromising properties in compression and degree of swelling, which make these composites promising synthetic alternatives for bone grafts and bone tissue engineering.  相似文献   
109.
Journal of Superconductivity and Novel Magnetism - YBa2Cu3O7-δ/La1-x-yPrxCayMnO3 (YBCO/LPCMO) (x?~?0.31, y?~?0.35) bilayers with fixed ferromagnetic layer thickness...  相似文献   
110.
Wireless Personal Communications - Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号