全文获取类型
收费全文 | 3297篇 |
免费 | 587篇 |
国内免费 | 478篇 |
学科分类
工业技术 | 4362篇 |
出版年
2024年 | 6篇 |
2023年 | 28篇 |
2022年 | 48篇 |
2021年 | 54篇 |
2020年 | 77篇 |
2019年 | 86篇 |
2018年 | 67篇 |
2017年 | 91篇 |
2016年 | 89篇 |
2015年 | 134篇 |
2014年 | 175篇 |
2013年 | 189篇 |
2012年 | 270篇 |
2011年 | 319篇 |
2010年 | 230篇 |
2009年 | 263篇 |
2008年 | 285篇 |
2007年 | 338篇 |
2006年 | 286篇 |
2005年 | 264篇 |
2004年 | 205篇 |
2003年 | 164篇 |
2002年 | 166篇 |
2001年 | 150篇 |
2000年 | 102篇 |
1999年 | 78篇 |
1998年 | 52篇 |
1997年 | 31篇 |
1996年 | 31篇 |
1995年 | 25篇 |
1994年 | 19篇 |
1993年 | 11篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 8篇 |
1988年 | 4篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1980年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有4362条查询结果,搜索用时 15 毫秒
1.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献
2.
3.
为了研究弧形闸门支臂的振动问题,采用混沌理论对时间序列进行处理,确定延迟时间τ、嵌入维数m进行相空间重构,并计算时间序列的混沌特征值,进而研究弧形闸门在启闭过程中振动的复杂性。以某水电站弧形闸门支臂振动为研究对象,根据支臂振动加速度原型观测资料,分析不同开度的振动情况,发现启门振动的复杂程度高于闭门工况,小开度的振动复杂程度更高,且支臂振动的复杂程度为与面板连接位置最大,与闸墩连接位置最小,中间位置介于前两者之间。为弧形闸门短期振动预测提供了支持。 相似文献
4.
Ali Mohamed 《Journal of Modern Optics》2019,66(13):1392-1407
Anisoplanatic electromagnetic (EM) propagation across a turbulent atmosphere has been recently examined for an unmodulated carrier propagating over an image-bearing transparency through optical lensing, and for the embedded information inside a carrier recovered using heterodyning and digital demodulation. Carrier modulation yielded better recovery than simple lens-based imaging. A possible mitigation strategy is proposed whereby the image information is encrypted on an RF chaotic carrier, thereafter secondarily embedded onto an optical carrier. Results based on the modified von Karman (MVKS) and the Hufnagel-Valley (H-V) models showed that the signal/image recovery under turbulence is improved compared with non-chaotic propagation. The case of time-varying/dynamic images is also taken up; it is demonstrated via cross-correlation products that turbulence is mitigated by the use of chaotic carrier encryption. Overall, transmission via chaos offers mitigation against distortions due to turbulence along with the security feature inherent via the chaos keys which prevent signal recovery without key-matching. 相似文献
5.
6.
Chaos optimization algorithm (COA) utilizes the chaotic maps to generate the pseudo-random sequences mapped as the decision variables for global optimization applications. A kind of parallel chaos optimization algorithm (PCOA) has been proposed in our former studies to improve COA. The salient feature of PCOA lies in its pseudo-parallel mechanism. However, all individuals in the PCOA search independently without utilizing the fitness and diversity information of the population. In view of the limitation of PCOA, a novel PCOA with migration and merging operation (denoted as MMO-PCOA) is proposed in this paper. Specifically, parallel individuals are randomly selected to be conducted migration and merging operation with the so far parallel solutions. Both migration and merging operation exchange information within population and produce new candidate individuals, which are different from those generated by stochastic chaotic sequences. Consequently, a good balance between exploration and exploitation can be achieved in the MMO-PCOA. The impacts of different one-dimensional maps and parallel numbers on the MMO-PCOA are also discussed. Benchmark functions and parameter identification problems are used to test the performance of the MMO-PCOA. Simulation results, compared with other optimization algorithms, show the superiority of the proposed MMO-PCOA algorithm. 相似文献
7.
Sumiyana Sumiyana Sriwidharmanely Sriwidharmanely 《Behaviour & Information Technology》2020,39(10):1079-1093
ABSTRACT This research investigates the role of users’ proactive personality when they mitigate the adverse impacts of ICT's (information and communication technologies’) technostress in an experimental setting. Further, this study examines genuinely two types of individuals’ proactive personality, i.e. confront and transform. Both types can handle ICT's technostress creators by different attitudes and behaviours. This article contributes to a novelty by inducing chaos theory. This inducement laid in the experimental setting that the users had been in a chaotic situation. Results of this research show that users’ proactive personality mitigates the negative impact of ICT's technostress on their performance and satisfaction. This study found that the user's proactive personality, rested in a chaotic situation, does mitigate greatly. This research finds that users’ performance and satisfaction are higher to the proactive personality verging to the transform than that of confront. It implies that information system managers should consider the ICT user's characteristics. Besides, it means that ICT's developer should make users do their innovativeness. 相似文献
8.
Tittu Varghese Mathew Jayamanideep Rebbagondla Sundararajan Natarajan 《International journal for numerical methods in engineering》2020,121(19):4329-4346
Nouy and Clement introduced the stochastic extended finite element method to solve linear elasticity problem defined on random domain. The material properties and boundary conditions were assumed to be deterministic. In this work, we extend this framework to account for multiple independent input uncertainties, namely, material, geometry, and external force uncertainties. The stochastic field is represented using the polynomial chaos expansion. The challenge in numerical integration over multidimensional probabilistic space is addressed using the pseudo-spectral Galerkin method. Thereafter, a sensitivity analysis based on Sobol indices using the derived stochastic extended Finite Element Method solution is presented. The efficiency and accuracy of the proposed novel framework against conventional Monte Carlo methods is elucidated in detail for a few one and two dimensional problems. 相似文献
9.
针对当前通信系统入侵行为自动识别技术存在入侵信号样本识别成功率较低、误识别率和漏识别率较高的问题,提出基于 GA-SVM 算法的通信网络入侵信号自动识别技术。利用混沌原理提取通信网络入侵的非平稳信号时域特征,并凭借自回归模型提取对应频域特征,捕捉邻域入侵信号间的非线性时空动作频率,评价相邻行为间的状态关联性,预测入侵信号后续行为,完成入侵信号的识别。实验表明,所提方法识别精度高、误识别率较低,漏识别率非常低,具有可应用于实际的理论价值。 相似文献
10.