全文获取类型
收费全文 | 3454篇 |
免费 | 747篇 |
国内免费 | 606篇 |
专业分类
电工技术 | 67篇 |
综合类 | 463篇 |
化学工业 | 56篇 |
金属工艺 | 19篇 |
机械仪表 | 56篇 |
建筑科学 | 25篇 |
矿业工程 | 13篇 |
能源动力 | 9篇 |
轻工业 | 27篇 |
水利工程 | 4篇 |
石油天然气 | 22篇 |
武器工业 | 32篇 |
无线电 | 896篇 |
一般工业技术 | 63篇 |
冶金工业 | 6篇 |
原子能技术 | 4篇 |
自动化技术 | 3045篇 |
出版年
2024年 | 14篇 |
2023年 | 30篇 |
2022年 | 79篇 |
2021年 | 66篇 |
2020年 | 73篇 |
2019年 | 43篇 |
2018年 | 46篇 |
2017年 | 68篇 |
2016年 | 93篇 |
2015年 | 101篇 |
2014年 | 181篇 |
2013年 | 212篇 |
2012年 | 312篇 |
2011年 | 350篇 |
2010年 | 296篇 |
2009年 | 344篇 |
2008年 | 388篇 |
2007年 | 487篇 |
2006年 | 364篇 |
2005年 | 298篇 |
2004年 | 216篇 |
2003年 | 184篇 |
2002年 | 129篇 |
2001年 | 128篇 |
2000年 | 106篇 |
1999年 | 61篇 |
1998年 | 43篇 |
1997年 | 22篇 |
1996年 | 20篇 |
1995年 | 16篇 |
1994年 | 10篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 3篇 |
1982年 | 1篇 |
排序方式: 共有4807条查询结果,搜索用时 31 毫秒
81.
为了确保传感器网络中传输数据的可靠性,本文设计了一个基于对称密码体制的数字签名系统。系统使用对称密码机制来提高效率,采用硬件加密设备保证共享密钥池的安全,通过使用特定的密钥生成算法解决对称密钥的分发问题。实验结果表明,系统能耗低、效率高,具有很强的实用性。 相似文献
82.
Suk-Hwan Lee Ki-Ryong Kwon Won-Joo Hwang V. Chandrasekar 《Digital Signal Processing》2013,23(5):1505-1522
Multimedia-based hashing is considered an important technique for achieving authentication and copy detection in digital contents. However, 3D model hashing has not been as widely used as image or video hashing. In this study, we develop a robust 3D mesh-model hashing scheme based on a heat kernel signature (HKS) that can describe a multi-scale shape curve and is robust against isometric modifications. We further discuss the robustness, uniqueness, security, and spaciousness of the method for 3D model hashing. In the proposed hashing scheme, we calculate the local and global HKS coefficients of vertices through time scales and 2D cell coefficients by clustering HKS coefficients with variable bin sizes based on an estimated L2 risk function, and generate the binary hash through binarization of the intermediate hash values by combining the cell values and the random values. In addition, we use two parameters, bin center points and cell amplitudes, which are obtained through an iterative refinement process, to improve the robustness, uniqueness, security, and spaciousness further, and combine them in a hash with a key. By evaluating the robustness, uniqueness, and spaciousness experimentally, and through a security analysis based on the differential entropy, we verify that our hashing scheme outperforms conventional hashing schemes. 相似文献
83.
Habib M. Ammari 《Computer Networks》2013,57(9):1913-1935
The design and development of multi-hop wireless sensor networks are guided by the specific requirements of their corresponding sensing applications. These requirements can be associated with certain well-defined qualitative and/or quantitative performance metrics, which are application-dependent. The main function of this type of network is to monitor a field of interest using the sensing capability of the sensors, collect the corresponding sensed data, and forward it to a data gathering point, also known as sink. Thus, the longevity of wireless sensor networks requires that the load of data forwarding be balanced among all the sensor nodes so they deplete their battery power (or energy) slowly and uniformly. However, some sensing applications are time-critical in nature. Hence, they should satisfy strict delay constraints so the sink can receive the sensed data originated from the sensors within a specified time bound. Thus, to account for all of these various sensing applications, appropriate data forwarding protocols should be designed to achieve some or all of the following three major goals, namely minimum energy consumption, uniform battery power depletion, and minimum delay. To this end, it is necessary to jointly consider these three goals by formulating a multi-objective optimization problem and solving it. In this paper, we propose a data forwarding protocol that trades off these three goals via slicing the communication range of the sensors into concentric circular bands. In particular, we discuss an approach, called weighted scale-uniform-unit sum, which is used by the source sensors to solve this multi-objective optimization problem. Our proposed data forwarding protocol, called Trade-off Energy with Delay (TED), makes use of our solution to this multi-objective optimization problem in order to find a “best” trade-off of minimum energy consumption, uniform battery power depletion, and minimum delay. Then, we present and discuss several numerical results to show the effectiveness of TED. Moreover, we show how to relax several widely used assumptions in order to enhance the practicality of our TED protocol, and extend it to real-world network scenarios. Finally, we evaluate the performance of TED through extensive simulations. We find that TED is near optimal with respect to the energy × delay metric. This simulation study is an essential step to gain more insight into TED before implementing it using a sensor test-bed. 相似文献
84.
85.
数字签名技术是一项重要的信息安全技术,它采用特定密码算法对发送数据进行加密处理,生成一段附加信息,随原文一起发送,接收方通过对附加信息进行验证判断原文真。本文针对高职院校教学系统特点,探讨了数字签名在教学管理系统中的应用。 相似文献
86.
由于手写签名具有高度的唯一性、不遗忘性、自然性与可靠性已成为身份识别的研究热点。文中对手写签名识别技术主要是离线手写签名识别技术进行了详细分析,在研究手写签名的特点和在身份认证中实用性的基础上,提出了一种基于图像处理技术的手写签名鉴别方案,该方案利用了图像的缩放和膨胀细化技术对图像进行处理,然后利用均方差和峰值信噪比来评价签名图像的相似度。试验数据表明该鉴别方法简单可行且高效,能获得较好的验证率和鉴别率。 相似文献
87.
手写签名认证是人工智能领域的一个重要课题,对它的深入研究具有重要的现实意义。文章采用基于概率统计的方法表示手写签名的速度特征,用vague集相似度表示书写压力特征,并通过细分的拐点表示笔画特征进行签名认证,最后,构造了一个在线手写签名认证系统。实验证明了该方法的有效性。 相似文献
88.
CA私钥的安全是数字证书可信性及签名有效性的保证。为了增强CA私钥的安全保护,采用基于RSA的(t,n)秘密共享将CA私钥安全分发到t个签名服务器,每个签名服务器拥有不同的私钥份额,并使用先应式秘密技术周期性更新私钥份额,避免长期攻击可能带来的危险性;同时,对私钥份额进行恢复和有效性验证;签名时,使用基于RSA的分步签名机制,每个签名服务器先计算出部分签名,最后由签名代理合成最终签名。整个过程都无需对CA私钥进行重构,增强了CA私钥和签名过程的安全性。最后,对存储私钥份额的服务器采用异构平台。方案通过VC和OPENSSL进行了实现。理论上的分析和实验结果表明,本方案有较高的安全性和效率。 相似文献
89.
消息恢复签名方案因其具有消息恢复能力而具有特殊的意义,本文在基于身份的公钥密码体制的基础上,提出了一种基于身份的消息恢复盲签名方案。本文最后证明了该方案的正确性,并进行了效率和安全性分析。 相似文献
90.