首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   303篇
  免费   5篇
工业技术   308篇
  2023年   3篇
  2022年   3篇
  2021年   1篇
  2020年   2篇
  2019年   4篇
  2018年   10篇
  2017年   6篇
  2016年   8篇
  2015年   8篇
  2014年   8篇
  2013年   21篇
  2012年   12篇
  2011年   27篇
  2010年   8篇
  2009年   20篇
  2008年   14篇
  2007年   20篇
  2006年   16篇
  2005年   12篇
  2004年   11篇
  2003年   7篇
  2002年   12篇
  2001年   8篇
  2000年   9篇
  1999年   5篇
  1998年   5篇
  1997年   3篇
  1996年   7篇
  1995年   5篇
  1994年   4篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1990年   6篇
  1989年   3篇
  1988年   2篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1976年   1篇
  1960年   2篇
  1926年   2篇
  1924年   3篇
排序方式: 共有308条查询结果,搜索用时 15 毫秒
1.
2.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
3.
Linear Feedback Shift Registers (LFSRs) constitute a very efficient mechanism for generating pseudoexhaustive or pseudo-random test sets for the built-in self-testing of digital circuits. However, a well-known problem with the use of LFSRs is the occurrence of linear dependencies in the generated patterns. In this paper, we show for the first time that the amount of linear dependencies can be controlled by selecting appropriate characteristic polynomials and reordering the LFSR cells. We identify two classes of such polynomials which, by appropriate LFSR cell ordering, guarantee that a large ratio of linear dependencies cannot occur. Experimental results show significant enhancements on the fault coverage for pseudo-random testing and support the theoretical relation between minimization of linear dependencies and effective fault coverage.This work was partially supported by NSF grant MIP-9409905, a 1993–94 ACM/IEEE Design Automation Scholarship and a grant from Nissan Corporation. A preliminary version of this work appeared in A Class of Good Characteristic Polynomials for LFSR Test Pattern Generators, in Proc. of IEEE International Conference on Computer Design, Oct. 1994, pp. 292–295, where it received the ICCD'94 Best Paper Award.  相似文献   
4.
Borodin, Nielsen and Rackoff [13] introduced the class of priority algorithms as a framework for modeling deterministic greedy-like algorithms. In this paper we address the effect of randomization in greedy-like algorithms. More specifically, we consider approximation ratios within the context of randomized priority algorithms. As case studies, we prove inapproximation results for two well-studied optimization problems, namely facility location and makespan scheduling.  相似文献   
5.
This paper revisits the problem of selecting an optimal deadlock resolution strategy, when the selection criterion is the maximization of the system throughput, and the system is Markovian in terms of its timing and routing characteristics. This problem was recently addressed in some of our previous work, that (i) provided an analytical formulation for it, (ii) introduced the notion of randomized deadlock avoidance as a generalization of the more traditional approaches of deadlock prevention/avoidance, and detection and recovery, and (iii) provided a methodology for selecting the optimal randomized deadlock avoidance policy for a given resource allocation system (RAS) configuration. An issue that remained open in the problem treatment of that past work, was whether the proposed policy randomization is essential, i.e., whether there exist any RAS configurations for which a randomized deadlock avoidance policy is superior to any other policy that does not employ randomization. The work presented in this paper establishes that for the basic problem formulation where the only concern is the (unconstrained) maximization of the system throughput—or the other typical performance objectives of minimizing the system work-in-process and mean sojourn time—randomization of the deadlock resolution strategy is not essential. However, it is also shown that, sometimes, it can offer an effective mechanism for accommodating additional operational constraints, like the requirement for production according to a specified product mix. Furthermore, the undertaken analysis provides an analytical characterization of the dependence of the aforementioned performance measures on the transition rates relating to the various events of the underlying state space, which can be useful for the broader problem of synthesizing efficient scheduling policies for the considered class of resource allocation systems.  相似文献   
6.
The breakup of the ice cover in northern rivers is a brief but crucial event in the life cycle of many aquatic species and can trigger extreme ice jam events with major socio-economic impacts and significant climate change implications. An important, but vaguely understood, breakup process is the fracture of the winter ice cover by low-amplitude water waves. Previous work on this subject has been based on the assumption of an infinitely long wave propagating under an infinitely long and “edgeless” ice cover. This configuration does not account for structural constraints imposed by the proximity of an ice edge or a transverse crack. Consequently, it only furnishes approximate values of bending stresses, and tells little about the spacing of cracks that may be generated by an advancing wave, which is the only visual evidence that can identify the relevant fracture mechanism in the field. Herein, edge proximity is taken into account by making plausible simplifications to the ice response equation, and using wave forms of limited extent. It is shown that such conditions generally produce higher bending stresses than does the infinite wave/edgeless cover configuration. The distance of the peak bending stress from the edge, which defines the spacing of cracks, varies with wavelength and is less than 100 ice thicknesses or so. This is comparable to that of high-amplitude, single waves (or surges) that result from ice jam releases, but much less than fractures generated by bending on horizontal planes, caused by the meandering river plan form. Comparison of the present results with the limited available evidence indicates that wave-generated fractures occur during the passage of ice jam release surges.  相似文献   
7.
Myocarditis in response to COVID-19 vaccination has been reported since early 2021. In particular, young male individuals have been identified to exhibit an increased risk of myocardial inflammation following the administration of mRNA-based vaccines. Even though the first epidemiological analyses and numerous case reports investigated potential relationships, endomyocardial biopsy (EMB)-proven cases are limited. Here, we present a comprehensive histopathological analysis of EMBs from 15 patients with reduced ejection fraction (LVEF = 30 (14–39)%) and the clinical suspicion of myocarditis following vaccination with Comirnaty® (Pfizer-BioNTech) (n = 11), Vaxzevria® (AstraZenica) (n = 2) and Janssen® (Johnson & Johnson) (n = 2). Immunohistochemical EMB analyses reveal myocardial inflammation in 14 of 15 patients, with the histopathological diagnosis of active myocarditis according the Dallas criteria (n = 2), severe giant cell myocarditis (n = 2) and inflammatory cardiomyopathy (n = 10). Importantly, infectious causes have been excluded in all patients. The SARS-CoV-2 spike protein has been detected sparsely on cardiomyocytes of nine patients, and differential analysis of inflammatory markers such as CD4+ and CD8+ T cells suggests that the inflammatory response triggered by the vaccine may be of autoimmunological origin. Although a definitive causal relationship between COVID-19 vaccination and the occurrence of myocardial inflammation cannot be demonstrated in this study, data suggest a temporal connection. The expression of SARS-CoV-2 spike protein within the heart and the dominance of CD4+ lymphocytic infiltrates indicate an autoimmunological response to the vaccination.  相似文献   
8.
A composite inventory-marketing problem is considered and treated for the case where there exist distributed time delays in the supply and/or the advertisement process, as well as product losses at constant rates. Since in a real large-scale situation a centralized solution may be impractical, two hierarchical coordinated control algorithms are presented which are based on a proper decomposition of the overall problem. Backlogging is not permitted and the delays are assumed fixed and known. The first algorithm makes use of the dual optimization technique, whereas the second algorithm is based on a decentralized procedure which allows each of the company's departments to solve its problem individually, and then with the coordination of an upper level to obtain the overall solution. Numerical examples are included which illustrate the effectiveness of the two algorithms.  相似文献   
9.
An autonomous power system that exploits solar energy for the production of hydrogen through water electrolysis is fully assessed in terms of system implementation and optimal operating strategy. A 10 kWp photovoltaic array supplies energy to a PEM electrolyzer rated at 6.9 kWp. In order to maintain a smooth operation regardless of the inherent weather fluctuations, a 1000 Ah/24 V lead–acid accumulator stores energy excess and provides it when needed. The monitoring and control of the system is implemented through a Supervisory Control and Data Acquisition system (SCADA), while the interactions between electrical and chemical subsystems are addressed by a complete automation infrastructure. The mathematical models of each subsystem are validated based on real operational data and a model-based power management strategy is proposed and assessed through a parameter sensitivity analysis. Further on, an off-line optimization framework is evaluated regarding the optimal operation of the system in two diverse, but representative time periods. The optimal parameters are identified and their effect on hydrogen production and accumulator utilization is reported.  相似文献   
10.
This work outlines the development of an analytical software tool that enables the prediction of various coating properties on any given sprayable geometry. The prediction is achieved by analyzing the input computer-aided design geometry and by correlating the resulting kinematic conditions with experimental measurements. The results of the developed tool have been validated experimentally using HVOF-sprayed WC-17Co coatings. Specifically, coating thickness, microhardness, WC vol.% and specific sliding wear rate are examined and their values are predicted for the case of the external spray of a rotor-like model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号