首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3316篇
  免费   577篇
  国内免费   482篇
电工技术   496篇
综合类   687篇
化学工业   113篇
金属工艺   30篇
机械仪表   233篇
建筑科学   73篇
矿业工程   51篇
能源动力   84篇
轻工业   19篇
水利工程   76篇
石油天然气   22篇
武器工业   32篇
无线电   683篇
一般工业技术   362篇
冶金工业   17篇
原子能技术   19篇
自动化技术   1378篇
  2024年   6篇
  2023年   30篇
  2022年   48篇
  2021年   54篇
  2020年   77篇
  2019年   86篇
  2018年   67篇
  2017年   91篇
  2016年   89篇
  2015年   134篇
  2014年   175篇
  2013年   189篇
  2012年   270篇
  2011年   319篇
  2010年   230篇
  2009年   263篇
  2008年   285篇
  2007年   338篇
  2006年   286篇
  2005年   264篇
  2004年   205篇
  2003年   164篇
  2002年   166篇
  2001年   150篇
  2000年   106篇
  1999年   79篇
  1998年   54篇
  1997年   35篇
  1996年   31篇
  1995年   25篇
  1994年   19篇
  1993年   11篇
  1992年   8篇
  1991年   3篇
  1990年   2篇
  1989年   8篇
  1988年   4篇
  1986年   1篇
  1985年   1篇
  1980年   1篇
  1951年   1篇
排序方式: 共有4375条查询结果,搜索用时 15 毫秒
1.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
2.
Chaos optimization algorithm (COA) utilizes the chaotic maps to generate the pseudo-random sequences mapped as the decision variables for global optimization applications. A kind of parallel chaos optimization algorithm (PCOA) has been proposed in our former studies to improve COA. The salient feature of PCOA lies in its pseudo-parallel mechanism. However, all individuals in the PCOA search independently without utilizing the fitness and diversity information of the population. In view of the limitation of PCOA, a novel PCOA with migration and merging operation (denoted as MMO-PCOA) is proposed in this paper. Specifically, parallel individuals are randomly selected to be conducted migration and merging operation with the so far parallel solutions. Both migration and merging operation exchange information within population and produce new candidate individuals, which are different from those generated by stochastic chaotic sequences. Consequently, a good balance between exploration and exploitation can be achieved in the MMO-PCOA. The impacts of different one-dimensional maps and parallel numbers on the MMO-PCOA are also discussed. Benchmark functions and parameter identification problems are used to test the performance of the MMO-PCOA. Simulation results, compared with other optimization algorithms, show the superiority of the proposed MMO-PCOA algorithm.  相似文献   
3.
Anisoplanatic electromagnetic (EM) propagation across a turbulent atmosphere has been recently examined for an unmodulated carrier propagating over an image-bearing transparency through optical lensing, and for the embedded information inside a carrier recovered using heterodyning and digital demodulation. Carrier modulation yielded better recovery than simple lens-based imaging. A possible mitigation strategy is proposed whereby the image information is encrypted on an RF chaotic carrier, thereafter secondarily embedded onto an optical carrier. Results based on the modified von Karman (MVKS) and the Hufnagel-Valley (H-V) models showed that the signal/image recovery under turbulence is improved compared with non-chaotic propagation. The case of time-varying/dynamic images is also taken up; it is demonstrated via cross-correlation products that turbulence is mitigated by the use of chaotic carrier encryption. Overall, transmission via chaos offers mitigation against distortions due to turbulence along with the security feature inherent via the chaos keys which prevent signal recovery without key-matching.  相似文献   
4.
NOMENCLATUREd———embeddingdimension ,dimensionlessCd(r)———correlationsum ,dimensionlessN———numberofpairsofpointsontherecon structedattractor,dimensionlessr———scalingdistance ,dimensionlessDc ———correlationdimension ,dimensionlessK———Kolmogoroventropy ,bits/sR…  相似文献   
5.
一种基于混沌渐近同步的数字保密通信方法   总被引:5,自引:1,他引:4  
根据驱动-响应混沌同步原理,提出了一种基于混沌渐近同步的数字保密通信方法。通过设计对发射信号进行多级单值非线性变换,使得通过预测法的攻击完全失效,因而这种通信方法具有较高的抗破译能力。理论分析和数值模拟结果证实了本方法的正确性与有效性。  相似文献   
6.
In this paper, we propose a new approach for signal detection in wireless digital communications based on the neural network with transient chaos and time-varying gain (NNTCTG), and give a concrete model of the signal detector after appropriate transformations and mappings. It is well known that the problem of the maximum likelihood signal detection can be described as a complex optimization problem that has so many local optima that conventional Hopfield-type neural networks fail to solve. By refraining from the serious local optima problem of Hopfield-type neural networks, the NNTCTG makes use of the time-varying parameters of the recurrent neural network to control the evolving behavior of the network so that the network undergoes the transition from chaotic behavior to gradient convergence. It has richer and more flexible dynamics rather than conventional neural networks only with point attractors, so that it can be expected to have much ability to search for globally optimal or near-optimal solutions. After going through a transiently inverse-bifurcation process, the NNTCTG can approach the global optimum or the neighborhood of global optimum of our problem. Simulation experiments have been performed to show the effectiveness and validation of the proposed neural network based method for the signal detection in digital communications.  相似文献   
7.
网络行为建模环境的实现及网络混沌性状分析   总被引:4,自引:0,他引:4  
设计并实现了一种用于网络行为研究的网络行为建模环境,将网络环境的监测功能和网络行为的分析功能相互结合,为网络系统行为的研究奠定了基础。在这一环境下,归纳了四种有普遍意义的网络突发流量模型,并用混沌分形理论中的迭代函数系统和相空间重构方法对它们进行描述、分析、计算和重构,得到了它们的分形维以及能体现网络流量行为特性的宏观参数。  相似文献   
8.
舰船水声隐身技术(二)   总被引:2,自引:0,他引:2  
本文探讨了水声隐身性能对舰船战技术性能的影响 ,舰船水噪声的主要噪声源、水噪声的治理措施及其展望。  相似文献   
9.
提出了一种基于混沌电路的随机脉位调制(RPPM)和随机二相码调相(RBCPM)混合调制的雷达引信系统。介绍了该引信波形的数学模型,平均模型函数及引信的实现框图和工作原理,研究了基于混沌电路的混合调制信号的产生方法,这种引信波形不仅具有结构简单和易于处理等特点,而且具有良好的测距和测速性能,以及极低的截获概率和很强的抗干扰特性。  相似文献   
10.
用量子力学及非线性科学理论,研究了激光与脱氧核糖核酸(DNA)分子相互作用的共振吸收效应及混沌性质,进而对激光的生物诱变效应予以解释。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号