首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5848篇
  免费   840篇
  国内免费   768篇
电工技术   170篇
综合类   609篇
化学工业   126篇
金属工艺   192篇
机械仪表   258篇
建筑科学   363篇
矿业工程   47篇
能源动力   39篇
轻工业   225篇
水利工程   75篇
石油天然气   127篇
武器工业   39篇
无线电   1481篇
一般工业技术   253篇
冶金工业   55篇
原子能技术   43篇
自动化技术   3354篇
  2024年   26篇
  2023年   90篇
  2022年   181篇
  2021年   180篇
  2020年   209篇
  2019年   192篇
  2018年   178篇
  2017年   214篇
  2016年   235篇
  2015年   285篇
  2014年   449篇
  2013年   404篇
  2012年   559篇
  2011年   527篇
  2010年   456篇
  2009年   435篇
  2008年   480篇
  2007年   461篇
  2006年   367篇
  2005年   335篇
  2004年   284篇
  2003年   225篇
  2002年   166篇
  2001年   120篇
  2000年   86篇
  1999年   56篇
  1998年   57篇
  1997年   37篇
  1996年   38篇
  1995年   43篇
  1994年   13篇
  1993年   9篇
  1992年   9篇
  1991年   6篇
  1990年   1篇
  1989年   2篇
  1988年   5篇
  1987年   1篇
  1986年   1篇
  1985年   6篇
  1984年   8篇
  1983年   3篇
  1982年   8篇
  1981年   3篇
  1980年   2篇
  1977年   1篇
  1972年   1篇
  1966年   1篇
  1961年   1篇
排序方式: 共有7456条查询结果,搜索用时 0 毫秒
91.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
92.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   
93.
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called “Bio_Authen_as_a_Service” for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%.  相似文献   
94.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats.  相似文献   
95.
Machining of 17-4 Precipitation Hardenable Stainless Steel (PH SS) is one of the difficult tasks because of its high cutting temperatures. Conventional cutting fluids are used to overcome the high cutting temperatures, but these are not acceptable from the health and environmental sustainable points of view. Cryogenic cooling is one of the potential techniques to overcome such problems. In the current work, comparison is made of cryogenic turning results, such as tool flank wear, cutting forces (feed force, main cutting force), cutting temperature, chip morphology and surface integrity characteristics with wet machining during machining of heat-treated 17-4 PH SS. The result showed that in cryogenic machining, a maximum of 53%, 78%, 35% and 16% reductions was observed in tool flank wear, cutting temperature, surface roughness and cutting force, respectively, when compared with wet machining. It was also evident from the experimental results that cryogenic machining significantly improved the machining performance and product quality even at high feed rates.  相似文献   
96.
ABSTRACT

While selective laser melting (SLM) offers design freedom of metal parts with much less material consumption, there exist several limitations, including high surface roughness, low-dimensional accuracy, and high tensile residual stresses. To make functional parts with high form accuracy and superior surface integrity, an as-SLM part needs finishing to remove the deposited surface material. The integration of machining and SLM creates a hybrid manufacturing route to overcome the inherited limitations of SLM. However, little study has been done to characterise surface integrity of an as-SLM part followed by machining (e.g. hybrid SLM-milling). In this paper, surface, integrity including surface roughness, microstructure, and microhardness, have been characterised for IN718 samples processed by the hybrid process. It has been found that microhardness varies with the scan direction and the use of coolant in the subsequent milling, and surface integrity can be significantly improved by the hybrid SLM-milling route.  相似文献   
97.
目的 建立一种荧光剂–示踪液体法检查利巴韦林滴眼液包装系统的密封完整性,为滴眼剂产品包装密封完整性验证提供通用廉价的方案。方法 以罗丹明B为示踪剂,采用高效液相色谱–荧光检测器法进行检测,评价利巴韦林滴眼液货架期的密封性,以及模拟临床开启后的密封性。结果 此方法可准确检测包装材料中发生的5 μm孔径泄漏,检测限级别达到《化学药品注射剂包装系统密封性研究技术指南》(试行)中的3级,能有效评价利巴韦林滴眼液包装系统的密封完整性。结论 该方法的通用性强、灵敏度高,可为滴眼剂产品包装系统密封完整性检查提供技术支持。  相似文献   
98.
开放网络的安全性受到越来越多的关注,身份认证是开放网络安全的关键问题之一。本文对开放网络环境下的身份认证作了分析,在此基础上,提出了一个基于动态标识的身份认证模型,并对模型作了安全性分析。  相似文献   
99.
电子身份认证在技术和制度层面上保证了电子商务和电子政务活动的安全,这种身份认证主要是通过电子签名及其认证而实现的,涉及到电子认证机构与电子签名人、电子签名信赖方之间的法律关系,所以明确三者之间的权利义务关系尤为重要。本文通过介绍电子签名、电子认证二者关系并分析了关于电子身份认证性质的各种学说,明确了电子身份认证是一种专业信用服务。  相似文献   
100.
密码技术在信息安全中有着举足轻重的作用。文章介绍了密码技术的相关理论及应用现状,并以应用比较广泛的单向散列函数MD5为例介绍了单向散列函数在当前的应用,特别以网页设计中用户认证为例,对单向散列函数MD5所起的作用进行了比较。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号