首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1554篇
  免费   185篇
  国内免费   160篇
电工技术   80篇
综合类   183篇
化学工业   25篇
金属工艺   20篇
机械仪表   76篇
建筑科学   25篇
矿业工程   12篇
能源动力   5篇
轻工业   14篇
水利工程   14篇
石油天然气   18篇
武器工业   11篇
无线电   222篇
一般工业技术   126篇
冶金工业   7篇
原子能技术   15篇
自动化技术   1046篇
  2023年   15篇
  2022年   24篇
  2021年   35篇
  2020年   30篇
  2019年   48篇
  2018年   31篇
  2017年   47篇
  2016年   56篇
  2015年   43篇
  2014年   78篇
  2013年   78篇
  2012年   122篇
  2011年   118篇
  2010年   99篇
  2009年   102篇
  2008年   116篇
  2007年   113篇
  2006年   94篇
  2005年   87篇
  2004年   68篇
  2003年   60篇
  2002年   48篇
  2001年   44篇
  2000年   46篇
  1999年   55篇
  1998年   31篇
  1997年   40篇
  1996年   29篇
  1995年   24篇
  1994年   17篇
  1993年   16篇
  1992年   12篇
  1991年   18篇
  1990年   14篇
  1989年   9篇
  1988年   6篇
  1987年   3篇
  1986年   3篇
  1985年   2篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1980年   3篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1975年   1篇
  1973年   1篇
  1959年   1篇
排序方式: 共有1899条查询结果,搜索用时 31 毫秒
1.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others.  相似文献   
2.
Boole函数的线性可分性是前向人工神经网络理论中的一个比较困难的问题之一。目前仅对变量数n≤7的某些问题给予讨论。当n≥8时,尚无判别Boole函数线性可分的一般准则,更无线性可分Boole函数的计数公式。基于此,本文详细地研究了与Boole函数线性可分性有关的n-维超立方体的基本理论,包括n-维超立方体的基本性质、超立方体中的平行线、子超立方体的计数等,并给出了构造n-维超立方体图的一种新方法。  相似文献   
3.
A revision algorithm is a learning algorithm that identifies the target concept, starting from an initial concept. Such an algorithm is considered efficient if its complexity (in terms of the resource one is interested in) is polynomial in the syntactic distance between the initial and the target concept, but only polylogarithmic in the number of variables in the universe. We give an efficient revision algorithm in the model of learning with equivalence and membership queries for threshold functions, and some negative results showing, for instance, that threshold functions cannot be revised efficiently from either type of query alone. The algorithms work in a general revision model where both deletion and addition type revision operators are allowed.  相似文献   
4.
徐坤  庄德文  陈勤 《计算机工程》2003,29(20):66-68
引入了布尔函数的基本积、单乘积项等概念,通过实例剖析了复合布尔函数中是否含某一单乘积项的一般判定方法,在该基础上提出了一种快速判定途径,并给出了快速判定算法的具体描述,同时对算法进行了实验,结果表明该算法快速有效。  相似文献   
5.
Peirce algebras     
We present a two-sorted algebra, called aPeirce algebra, of relations and sets interacting with each other. In a Peirce algebra, sets can combine with each other as in a Boolean algebra, relations can combine with each other as in a relation algebra, and in addition we have both a set-forming operator on relations (the Peirce product of Boolean modules) and a relation-forming operator on sets (a cylindrification operation). Two applications of Peirce algebras are given. The first points out that Peirce algebras provide a natural algebraic framework for modelling certain programming constructs. The second shows that the so-calledterminological logics arising in knowledge representation have evolved a semantics best described as a calculus of relations interacting with sets.  相似文献   
6.
Convergence of iterated boolean sums of simultaneous approximants   总被引:3,自引:0,他引:3  
J. C. Sevy 《Calcolo》1993,30(1):41-68
Explicit error estimates are given for the iterated Boolean sum of a sequence of simultaneous approximants; the rate of convergence is shown to be improved for smooth functions. The general results are applied in the case of the Bernstein, Durrmeyer and Stancu operators.  相似文献   
7.
The non-linear thermo-metallurgical problem, relevant for the cooling of a molten metal including the macro-segregation that occurs during the cooling process, is studied here. Due to the strong non-linearities involved in phase transformations, it is necessary to use a fine resolution in space-time in a finite element approximation in order to meet accuracy requirements. We derive space-time FE-methods based on the discontinuous and continuous Galerkin method in time for the energy equation. This formulation integrates the stored energy exactly for a given heat flux. When macro-segregation is incorporated into the model, the problem can be formulated in such a way that the phase-transition drives a flow of species. In addition, diffusion is possible throughout the domain. The model can be further rewritten using a potential approach. By this approach for modelling macro-segregation, we are able to obtain discretizations that guarantee that the balance equations are satisfied, and it is possible to solve the phase-transition problem either as a field problem or as a local problem (defined by a local evolution rule).  相似文献   
8.
关于布尔函数的二次逼近   总被引:2,自引:0,他引:2  
本文首先利用矩阵形式引入了二阶walsh谱的概念并讨论了其性质,其次引入了二次bent函数的概念,同时论述了二次bent函数的密码学意义。  相似文献   
9.
本文研究了加法复合布尔函数和乘法复合布尔函数,在平衡性、k次项系数、K次扩散准则(PC)、相关免疫 性(CI)、Walsh谱、代数次数、小项分布等方面得到了一批新结果。  相似文献   
10.
The paper considers the set-theoretical approach to the joint decomposition of systems of Boolean functions of variables specified in different representation forms. The approach is based on the method of q-partitions of conjuncterms and concept of decomposition clones. Theorems on joint decomposition of a system of full and partial functions are formulated. The approach is illustrated by examples. Parts I and II of this article are published in No. 5 (2001) and No. 1 (2002). __________ Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 39–58, March–April 2007.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号