全文获取类型
收费全文 | 131篇 |
免费 | 22篇 |
国内免费 | 13篇 |
专业分类
电工技术 | 2篇 |
综合类 | 35篇 |
机械仪表 | 1篇 |
轻工业 | 2篇 |
无线电 | 14篇 |
一般工业技术 | 5篇 |
冶金工业 | 1篇 |
自动化技术 | 106篇 |
出版年
2022年 | 2篇 |
2020年 | 3篇 |
2018年 | 3篇 |
2017年 | 3篇 |
2016年 | 4篇 |
2015年 | 5篇 |
2014年 | 10篇 |
2013年 | 10篇 |
2012年 | 12篇 |
2011年 | 20篇 |
2010年 | 9篇 |
2009年 | 7篇 |
2008年 | 5篇 |
2007年 | 13篇 |
2006年 | 7篇 |
2005年 | 11篇 |
2004年 | 2篇 |
2003年 | 5篇 |
2002年 | 4篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有166条查询结果,搜索用时 15 毫秒
1.
This work proposes a separable reversible data hiding scheme in encrypted images based on pixel value ordering (PVO). After the original image is encrypted using homomorphism encryption by the content owner, the data hider embeds the secret data in encrypted domain. The PVO strategy realizes hiding data in each block. Additive homomorphism guarantees the performance of PVO in encrypted domain is close to that in plain domain. Besides, the homomorphism encryption does not cause data expansion, and the payload can be further improved. With the watermarked encrypted image, if the receiver has only the data hiding key, he can extract the additional data. If the receiver has only the encryption key, he can obtain a decrypted image similar to the original one. If the receiver has both the data hiding key and the encryption key, he can extract the additional data without any error and recover the original image losslessly. 相似文献
2.
3.
In this paper, the concepts of set-valued homomorphism and strong set-valued homomorphism of a ring are introduced, and related properties are investigated. The notions of generalized lower and upper approximation operators, constructed by means of a set-valued mapping, which is a generalization of the notion of lower and upper approximation of a ring, are provided. We also propose the notion of generalized lower and upper approximations with respect to an ideal of a ring which is an extended notation of rough ideal introduced lately by Davvaz [B. Davvaz, Roughness in rings, Information Science 164 (2004) 147-163] in a ring and discuss some significant properties of them. 相似文献
4.
蔡光兴 《湖北工业大学学报》2001,16(1):70-72,78
运用群作用与同态刻划了群作用之轨道,轨道数与群阶数之间的关系,群与它可迁作用正规子群共轭子群之关系及其作用。 相似文献
5.
6.
7.
RSA型加密系统(RSA加密系统及其改进系统的统称)至今仍然被广泛应用于许多注重电子数据安全的电子商务系统中.然而对现有的RSA型加密方案分析发现:(1)只有在随机谕言机模型下抗CCA2攻击的RSA型加密方案,还没有在标准模型下实现IND-CCA2安全的RSA型概率加密方案;(2)没有在标准模型下实现抗CPA且保持乘法同态性的RSA型同态加密方案,而同态性是实现安全多方计算和云计算安全服务的重要性质之一;(3)在实现密文不可区分方面,这些方案除HD-RSA外都是通过一个带hash的Feistel网络引入随机因子的,从而导致这些方案只能在随机谕言机模型下实现IND-CCA2安全.针对以上问题,本文在RSA加密系统的基础上,通过增加少量的有限域上的模指数运算,设计了一个标准模型下具有IND-CPA安全的RSA型概率同态加密方案和一个具有IND-CCA2安全的RSA型概率加密方案.这两个方案在实现密文不可区分时,都不再通过明文填充引入随机因子.此外,本文还提出一个RSA问题的变形问题(称作RSA判定性问题). 相似文献
8.
9.
Soft set theory, introduced by Molodtsov, has been considered as an effective mathematical tool for modeling uncertainties. In this paper, we initiate the study of algebraic hyperstructures of soft sets. The concepts of soft polygroups, normal soft polygroups, soft subpolygroups and normal soft subpolygroups are introduced, and some related properties are investigated. Furthermore, we propose the homomorphism and isomorphism of soft polygroups, and establish three isomorphism theorems for soft polygroups. 相似文献
10.
Soft groups and normalistic soft groups 总被引:1,自引:0,他引:1
Soft set theory, proposed by Molodtsov, has been regarded as an effective mathematical tool to deal with uncertainties. In this paper, first we correct some of the problematic cases in a previous paper by Akta? and Çag˜man [H. Akta?, N. Çag˜man, Soft sets and soft groups, Inf. Sci. 177 (2007) 2726-2735]. Moreover, we introduce the concepts of normalistic soft group and normalistic soft group homomorphism, study their several related properties, and investigate some structures that are preserved under normalistic soft group homomorphisms. 相似文献