首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3188篇
  免费   437篇
  国内免费   394篇
工业技术   4019篇
  2024年   5篇
  2023年   23篇
  2022年   37篇
  2021年   47篇
  2020年   44篇
  2019年   49篇
  2018年   50篇
  2017年   74篇
  2016年   86篇
  2015年   118篇
  2014年   170篇
  2013年   198篇
  2012年   248篇
  2011年   299篇
  2010年   265篇
  2009年   296篇
  2008年   386篇
  2007年   385篇
  2006年   290篇
  2005年   300篇
  2004年   206篇
  2003年   169篇
  2002年   99篇
  2001年   69篇
  2000年   41篇
  1999年   13篇
  1998年   14篇
  1997年   10篇
  1996年   11篇
  1995年   7篇
  1994年   5篇
  1993年   3篇
  1992年   1篇
  1991年   1篇
排序方式: 共有4019条查询结果,搜索用时 15 毫秒
1.
论文提出利用用户提供的个性化信息来随机产生关联大素数,保证了素数选取的随机化、个性化,提高了RSA算法的安全性。  相似文献   
2.
数字混沌扩频序列的盲估计   总被引:1,自引:0,他引:1  
米良  朱中梁 《电讯技术》2003,43(4):34-38
混沌序列具有非线性、宽带类噪声、大的码族、任意长的周期且容易产生的特性,因此在扩频通信系统中很有实用价值。本文将文献[1]中对伪随机扩频序列盲估计的方法推广应用到混沌扩频通信中,并对其不足提出了改进方法。在只知道扩频码周期而无其它任何先验知识的条件下,利用特征值分析的方法可以对数字混沌直扩序列进行盲估计,仿真实验证明了该方法的有效性。  相似文献   
3.
一种新的图像水印方案   总被引:1,自引:0,他引:1  
郭磊  郭宝龙 《通信学报》2004,25(5):20-27
目标区域是图像中视觉上最重要的部分。针对现有的水印算法很少考虑图像中确定的目标区域这一问题,提出了一种基于目标区域的水印方案(WIOR)。方案首先利用小波变换分析图像的目标特征,并依据图像的小波高频系数特征对其进行聚类,获得水印的嵌入域,在此嵌入域中,选择小波系数并对其进行量化调制来嵌入二值扩谱水印;同时,通过只在图像的局部区域内嵌入较少的水印信息来改善水印的隐蔽性。实验结果表明,该方案对于一类具有突出目标特征的图像具有较好的效果。嵌入的水印主要优势在于真正把水印嵌入图像的视觉重要部分,从而能有效地抵御剪切攻击,而且可以实现盲检测。  相似文献   
4.
As the result of vibration emission in air, a machine sound signal carries important information about the working condition of machinery. But in practice, the sound signal is typically received with a very low signal-to-noise ratio. To obtain features of the original sound signal, uncorrelated sound signals must be removed and the wavelet coefficients related to fault condition must be retrieved. In this paper, the blind source separation technique is used to recover the wavelet coefficients of a monitored source from complex observed signals. Since in the proposed blind source separation (BSS) algorithms it is generally assumed that the number of sources is known, the Gerschgorin disk estimator method is introduced to determine the number of sound sources before applying the BSS method. This method can estimate the number of sound sources under non-Gaussian and non-white noise conditions. Then, the partial singular value analysis method is used to select these significant observations for BSS analysis. This method ensures that signals are separated with the smallest distortion. Afterwards, the time-frequency separation algorithm, converted to a suitable BSS algorithm for the separation of a non-stationary signal, is introduced. The transfer channel between observations and sources and the wavelet coefficients of the source signals can be blindly identified via this algorithm. The reconstructed wavelet coefficients can be used for diagnosis. Finally, the separation results obtained from the observed signals recorded in a semi-anechoic chamber demonstrate the effectiveness of the presented methods .  相似文献   
5.
迭加与量化水印嵌入方案的比较及量化参数优化   总被引:3,自引:0,他引:3  
分别研究了迭加法和量化法的隐蔽性和稳健性,并且提出了量化调制水印方案中的参数优化方法。对两类方法的分析比较表明,迭加法适用于在高频分量嵌入水印,而量化法适用于在低频分量嵌入水印。并以实验验证了这一结论。  相似文献   
6.
In an untraceable electronic cash protocol based on blind signatures, an identified customer can withdraw a blinded electronic cash from the bank and the unblinding operation is adopted by the customer to transform the blinded electronic cash into a valid one. Before performing the operation, the blinded electronic cash is protected well since attackers cannot convert it into a valid electronic cash without the blinding factor corresponding to the operation. However, after unblinding, the electronic cash will suffer from the theft attacks since it is not protected by any security mechanism. This paper introduces a new unblinding operation called ownership-attached unblinding which attaches the identities of a designated payee and a specified transaction to the blinded electronic cash and then produces an ownership-attached electronic cash other than a bare one such that the cash can withstand the theft attacks during the entire transaction because it is valid for the designated payee and the specified transaction only. Furthermore, the proposed scheme does not largely increase the computation cost required for each customer so that it also is a customer efficient protection solution for untraceable electronic cash and especially suitable for mobile clients and smart-card users.  相似文献   
7.
本文介绍了红外制导系统误差信号分布曲线及盲区的计算方法,对目前红外界使用的计算公式进行了讨论。  相似文献   
8.
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression.  相似文献   
9.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods.  相似文献   
10.
一种基于小波变换的非均匀量化索引调制水印算法   总被引:3,自引:0,他引:3  
为了提高数字水印的稳健性与不可见性,将图像小波变换与量化索引调制算法相结合,提出了一种基于小波变换的非均匀量化索引调制数字水印算法。该算法对原始图像进行离散小波变换,将中频小波系数分成3×3的系数子块作为水印载体,对子块的系数均值采用非均匀量化索引调制,实现二值水印的嵌入。根据人类视觉特性,不同的系数子块采用不同的量化间隔并自适应于子块内相邻系数的差值。实验结果表明,该算法透明性好,安全性高,对高斯白噪声、剪切、滤波以及JPEG压缩等常见攻击具有较强的稳健性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号