全文获取类型
收费全文 | 510篇 |
免费 | 110篇 |
国内免费 | 60篇 |
专业分类
电工技术 | 20篇 |
综合类 | 97篇 |
化学工业 | 9篇 |
金属工艺 | 4篇 |
机械仪表 | 38篇 |
建筑科学 | 6篇 |
矿业工程 | 1篇 |
能源动力 | 4篇 |
轻工业 | 11篇 |
水利工程 | 2篇 |
石油天然气 | 3篇 |
无线电 | 114篇 |
一般工业技术 | 53篇 |
冶金工业 | 2篇 |
自动化技术 | 316篇 |
出版年
2024年 | 2篇 |
2023年 | 10篇 |
2022年 | 27篇 |
2021年 | 24篇 |
2020年 | 21篇 |
2019年 | 20篇 |
2018年 | 16篇 |
2017年 | 18篇 |
2016年 | 21篇 |
2015年 | 26篇 |
2014年 | 39篇 |
2013年 | 48篇 |
2012年 | 33篇 |
2011年 | 38篇 |
2010年 | 38篇 |
2009年 | 36篇 |
2008年 | 50篇 |
2007年 | 30篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 13篇 |
2003年 | 14篇 |
2002年 | 24篇 |
2001年 | 15篇 |
2000年 | 13篇 |
1999年 | 2篇 |
1998年 | 12篇 |
1997年 | 13篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有680条查询结果,搜索用时 15 毫秒
1.
2.
3.
采用多尺度排列熵算法对气-固流化床内4种流型的压力脉动信号进行研究,结果表明:不同流型由于其动力学特性不同,导致压力脉动信号的多尺度排列熵值存在差异——4种流花形态的排列熵值都是随着尺度的增加而增大,其中固定床在大尺度上熵值最大,气力输送床在小尺度上熵值最大,鼓泡流化床在所有尺度上熵值最小;此外,多尺度排列熵值变化速率特征是流型辨识的新指示器。 相似文献
4.
本文提出一种可以用于lte小基站的turbo码解码器设计, 它支持LTE标准中的188种不同长度的TURBO码解码。设计采用了最多16路的并行解码,迭代次数可设定。解码器提采用了一种改进的软输入软输出设计。设计采用了轮流计算前向状态矩阵,和后项状态矩阵。这样可以缩短基二算法的关键路径,同时分支传输概率也可以直接用于计算不再需要保存。分组数据利用列地址映射,和行数据交换完成整个码的交织计算,利用相反的过程完成解交织计算。每个时钟都可以产生交织与解交织数据,用于解码和存储运算。 相似文献
5.
6.
We propose a new image encryption algorithm which is based on the spatiotemporal non-adjacent coupled map lattices. The system of non-adjacent coupled map lattices has more outstanding cryptography features in dynamics than the logistic map or coupled map lattices does. In the proposed image encryption, we employ a bit-level pixel permutation strategy which enables bit planes of pixels permute mutually without any extra storage space. Simulations have been carried out and the results demonstrate the superior security and high efficiency of the proposed algorithm. 相似文献
7.
John Wright 《Cryptologia》2018,42(3):222-226
In 1932, Marian Rejewski, who was a young mathematician working at the Polish Cipher Bureau, brilliantly recovered the internal wiring of the military Enigma. His initial efforts were unsuccessful because he assumed that the entry permutation was the same as in the commercial machine. Luckily he tried the identity permutation as an alternative and that proved to be correct. This note describes how Rejewski’s equations may be used to deduce the entry permutation without any guesswork, a technique that was later rediscovered by Alan Turing and by Lieutenant Andrew Gleason. 相似文献
8.
Factory management plays an important role in improving the productivity and quality of service in the production process. In particular, the distributed permutation flow shop scheduling problem with multiple factories is considered a priority factor in the factory automation. This study proposes a novel model of the developed distributed scheduling by supplementing the reentrant characteristic into the model of distributed reentrant permutation flow shop (DRPFS) scheduling. This problem is described as a given set of jobs with a number of reentrant layers is processed in the factories, which compromises a set of machines, with the same properties. The aim of the study is to determine the number of factory needs to be used, jobs assignment to certain factory and sequence of job assigned to the factory in order to simultaneously satisfy three objectives of minimizing makespan, total cost and average tardiness. To do this, a novel multi-objective adaptive large neighborhood search (MOALNS) algorithm is developed for finding the near optimal solutions based on the Pareto front. Various destroy and repair operators are presented to balance between intensification and diversification of searching process. The numerical examples of computational experiments are carried out to validate the proposed model. The analytical results on the performance of proposed algorithm are checked and compared with the existing methods to validate the effectiveness and robustness of the proposed potential algorithm in handling the DRPFS problem. 相似文献
9.
A. Ross Eckler 《Cryptologia》2013,37(4):326-333
Abstract When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigma indicators. By comparing patterns that resulted from message indicators with his catalog, Rejewski was able to determine the ground settings. Well, not quite—the mapping from the disjoint cycles to the ground settings is not one-to-one. Rejewski's catalog no longer exists. This article reports on the output of a program that “recreates” the catalog and answers the question “How far from being one-to-one is the mapping?” 相似文献
10.
证明了针对匿名RFID身份认证协议ARAP协议可以进行假冒伪造攻击,并提出了改进版的ARAP协议。攻击的实质在于协议中运用的异或运算会将相同的值消去,或者可以设计特定的随机数实现重放攻击。提出了一种新的运算操作———置换操作,并在改进版的ARAP协议中将原协议的部分异或运算改为置换操作。改进版的ARAP协议还能抵抗跟踪攻击、非同步攻击和重放攻击等。 相似文献