首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3248篇
  免费   572篇
  国内免费   471篇
电工技术   487篇
综合类   681篇
化学工业   110篇
金属工艺   30篇
机械仪表   215篇
建筑科学   71篇
矿业工程   51篇
能源动力   82篇
轻工业   18篇
水利工程   76篇
石油天然气   21篇
武器工业   32篇
无线电   682篇
一般工业技术   352篇
冶金工业   17篇
原子能技术   19篇
自动化技术   1347篇
  2024年   5篇
  2023年   27篇
  2022年   48篇
  2021年   54篇
  2020年   77篇
  2019年   85篇
  2018年   64篇
  2017年   81篇
  2016年   77篇
  2015年   128篇
  2014年   168篇
  2013年   172篇
  2012年   269篇
  2011年   318篇
  2010年   225篇
  2009年   260篇
  2008年   285篇
  2007年   336篇
  2006年   286篇
  2005年   264篇
  2004年   205篇
  2003年   164篇
  2002年   166篇
  2001年   149篇
  2000年   102篇
  1999年   78篇
  1998年   52篇
  1997年   31篇
  1996年   31篇
  1995年   25篇
  1994年   19篇
  1993年   11篇
  1992年   8篇
  1991年   3篇
  1990年   2篇
  1989年   8篇
  1988年   4篇
  1986年   1篇
  1985年   1篇
  1980年   1篇
  1951年   1篇
排序方式: 共有4291条查询结果,搜索用时 15 毫秒
1.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
2.
冠状动脉系统的混沌现象会导致严重的健康问题。以非线性冠状动脉系统为研究对象,建立了不确定性冠状动脉系统动力学模型,提出了不确定性冠状动脉系统的微分积分终端滑模混沌抑制方法,针对该模型的不确定性设计了扰动观测器,根据Lyapunov理论证明了所设计控制系统的稳定性,通过仿真实验验证了所提出的混沌抑制方法的有效性和可行性。  相似文献   
3.
混沌识别是对非线性时间序列进行混沌预测的前提。针对时间序列风速确定性与随机性相结合的复杂非线性特征,研究了不同的混沌识别方法,并对风速时间序列进行混沌特征识别。应用随机噪声、周期运动及经典混沌系统的时间序列对所选方法进行可靠性验证。对美国国家风能研究中心M2测风塔实测时间序列风速数据进行非线性混沌特征识别。结果表明:风速时间序列具有明显的混沌特征;各风速时间序列表现出不同程度的混沌特征;各混沌识别方法对风速时间序列混沌特征的表达形式不同,互为补充,相互验证。  相似文献   
4.
为了研究弧形闸门支臂的振动问题,采用混沌理论对时间序列进行处理,确定延迟时间τ、嵌入维数m进行相空间重构,并计算时间序列的混沌特征值,进而研究弧形闸门在启闭过程中振动的复杂性。以某水电站弧形闸门支臂振动为研究对象,根据支臂振动加速度原型观测资料,分析不同开度的振动情况,发现启门振动的复杂程度高于闭门工况,小开度的振动复杂程度更高,且支臂振动的复杂程度为与面板连接位置最大,与闸墩连接位置最小,中间位置介于前两者之间。为弧形闸门短期振动预测提供了支持。  相似文献   
5.
Anisoplanatic electromagnetic (EM) propagation across a turbulent atmosphere has been recently examined for an unmodulated carrier propagating over an image-bearing transparency through optical lensing, and for the embedded information inside a carrier recovered using heterodyning and digital demodulation. Carrier modulation yielded better recovery than simple lens-based imaging. A possible mitigation strategy is proposed whereby the image information is encrypted on an RF chaotic carrier, thereafter secondarily embedded onto an optical carrier. Results based on the modified von Karman (MVKS) and the Hufnagel-Valley (H-V) models showed that the signal/image recovery under turbulence is improved compared with non-chaotic propagation. The case of time-varying/dynamic images is also taken up; it is demonstrated via cross-correlation products that turbulence is mitigated by the use of chaotic carrier encryption. Overall, transmission via chaos offers mitigation against distortions due to turbulence along with the security feature inherent via the chaos keys which prevent signal recovery without key-matching.  相似文献   
6.
7.
Chaos optimization algorithm (COA) utilizes the chaotic maps to generate the pseudo-random sequences mapped as the decision variables for global optimization applications. A kind of parallel chaos optimization algorithm (PCOA) has been proposed in our former studies to improve COA. The salient feature of PCOA lies in its pseudo-parallel mechanism. However, all individuals in the PCOA search independently without utilizing the fitness and diversity information of the population. In view of the limitation of PCOA, a novel PCOA with migration and merging operation (denoted as MMO-PCOA) is proposed in this paper. Specifically, parallel individuals are randomly selected to be conducted migration and merging operation with the so far parallel solutions. Both migration and merging operation exchange information within population and produce new candidate individuals, which are different from those generated by stochastic chaotic sequences. Consequently, a good balance between exploration and exploitation can be achieved in the MMO-PCOA. The impacts of different one-dimensional maps and parallel numbers on the MMO-PCOA are also discussed. Benchmark functions and parameter identification problems are used to test the performance of the MMO-PCOA. Simulation results, compared with other optimization algorithms, show the superiority of the proposed MMO-PCOA algorithm.  相似文献   
8.
ABSTRACT

This research investigates the role of users’ proactive personality when they mitigate the adverse impacts of ICT's (information and communication technologies’) technostress in an experimental setting. Further, this study examines genuinely two types of individuals’ proactive personality, i.e. confront and transform. Both types can handle ICT's technostress creators by different attitudes and behaviours. This article contributes to a novelty by inducing chaos theory. This inducement laid in the experimental setting that the users had been in a chaotic situation. Results of this research show that users’ proactive personality mitigates the negative impact of ICT's technostress on their performance and satisfaction. This study found that the user's proactive personality, rested in a chaotic situation, does mitigate greatly. This research finds that users’ performance and satisfaction are higher to the proactive personality verging to the transform than that of confront. It implies that information system managers should consider the ICT user's characteristics. Besides, it means that ICT's developer should make users do their innovativeness.  相似文献   
9.
Nouy and Clement introduced the stochastic extended finite element method to solve linear elasticity problem defined on random domain. The material properties and boundary conditions were assumed to be deterministic. In this work, we extend this framework to account for multiple independent input uncertainties, namely, material, geometry, and external force uncertainties. The stochastic field is represented using the polynomial chaos expansion. The challenge in numerical integration over multidimensional probabilistic space is addressed using the pseudo-spectral Galerkin method. Thereafter, a sensitivity analysis based on Sobol indices using the derived stochastic extended Finite Element Method solution is presented. The efficiency and accuracy of the proposed novel framework against conventional Monte Carlo methods is elucidated in detail for a few one and two dimensional problems.  相似文献   
10.
杨本胜 《机械与电子》2021,39(12):25-29
针对当前通信系统入侵行为自动识别技术存在入侵信号样本识别成功率较低、误识别率和漏识别率较高的问题,提出基于 GA-SVM 算法的通信网络入侵信号自动识别技术。利用混沌原理提取通信网络入侵的非平稳信号时域特征,并凭借自回归模型提取对应频域特征,捕捉邻域入侵信号间的非线性时空动作频率,评价相邻行为间的状态关联性,预测入侵信号后续行为,完成入侵信号的识别。实验表明,所提方法识别精度高、误识别率较低,漏识别率非常低,具有可应用于实际的理论价值。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号