首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2713篇
  免费   472篇
  国内免费   340篇
电工技术   110篇
综合类   478篇
化学工业   50篇
金属工艺   13篇
机械仪表   67篇
建筑科学   52篇
矿业工程   15篇
能源动力   19篇
轻工业   23篇
水利工程   17篇
石油天然气   12篇
武器工业   17篇
无线电   819篇
一般工业技术   189篇
冶金工业   15篇
原子能技术   12篇
自动化技术   1617篇
  2024年   6篇
  2023年   37篇
  2022年   86篇
  2021年   79篇
  2020年   97篇
  2019年   80篇
  2018年   89篇
  2017年   94篇
  2016年   106篇
  2015年   113篇
  2014年   163篇
  2013年   223篇
  2012年   242篇
  2011年   263篇
  2010年   183篇
  2009年   221篇
  2008年   190篇
  2007年   218篇
  2006年   196篇
  2005年   141篇
  2004年   112篇
  2003年   106篇
  2002年   76篇
  2001年   65篇
  2000年   61篇
  1999年   52篇
  1998年   26篇
  1997年   34篇
  1996年   26篇
  1995年   26篇
  1994年   18篇
  1993年   15篇
  1992年   12篇
  1991年   8篇
  1990年   10篇
  1989年   15篇
  1988年   12篇
  1987年   2篇
  1986年   4篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   5篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1977年   2篇
  1951年   1篇
排序方式: 共有3525条查询结果,搜索用时 31 毫秒
1.
2.
魏爽  江荣旺 《软件》2021,(1):29-31,58
本文介绍了无证书签名的基本工作原理,介绍并分析了Hashimoto等人提出的一种无证书签名方案,对该方案进行了Ⅰ类型攻击,证明了该方案是不安全的,不能抵御超Ⅰ类型对手的攻击,对该方案提出了改进措施。  相似文献   
3.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra-lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.  相似文献   
4.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域.  相似文献   
5.
对带有质热源的方腔内流体传热传质进行数值研究。针对不同RaNcSrDf,探究对称方腔内流体传热传质的分岔特性。结果表明:存在临界Rac使流体流动形态发生转变,当Ra<Rac时,流体流线、温度场和浓度场对称分布;当Ra>Rac时,流体发生偏斜。增大浮升力,流体更易发生分岔现象。增强Soret和Dufour效应可增强传热对称性并增大流体发生分岔的临界Rayleigh数。  相似文献   
6.
In this paper, low-cost and two-cycle hardware structures of the PRINCE lightweight block cipher are presented. In the first structure, we proposed an area-constrained structure, and in the second structure, a high-speed implementation of the PRINCE cipher is presented. The substitution box (S-box) and the inverse of S-box (S-box−1) blocks are the most complex blocks in the PRINCE cipher. These blocks are designed by an efficient structure with low critical path delay. In the low-cost structure, the S-boxes and S-boxes−1 are shared between the round computations and the intermediate step of PRINCE cipher. Therefore, the proposed architecture is implemented based on the lowest number of computation resources. The two-cycle implementation of PRINCE cipher is designed by a processing element (PE), which is a general and reconfigurable element. This structure has a regular form with the minimum number of the control signal. Implementation results of the proposed structures in 180-nm CMOS technology and Virtex-4 and Virtex-6 FPGA families are achieved. The proposed structures, based on the results, have better critical path delay and throughput compared with other's related works.  相似文献   
7.
通过数值模拟计算,对中压对称进汽和切向进汽两种结构的流场进行了分析比较,结果表明,单一切向进汽腔的总压损失更小,出口汽流角的周向分布均匀度更好。更进一步,为整体评估中压进汽腔的流场以及对叶片级的流动影响,对中压进汽腔及第1级叶片的整体流体域流场情况进行了分析比较,结果表明,采用大几何角静叶的切向进汽腔气动性能最优;当采取切向进汽腔时,需合理选择第1级静叶几何角并耦合计算,才能实现进汽腔的气动优化。  相似文献   
8.
9.
ABSTRACT

Multiple-material products are characterised by a complex property profile which is achieved by combining the particular advantages of at least two different materials. Bimetal casting is an energy- and material-efficient technology for the production of multi-metallic objects. This paper describes the development of a semi-continuous casting process for the formation of a rotationally symmetric bimetal with a cohesive bonding character at the interface of a copper–tin alloy (CuSn6) and pure copper (Cu99.5). Initial experiments are conducted by static casting to evaluate the thermal process window. Based on the results of the initial experiments, a vertical semi-continuous compound casting process is developed. A stable cohesive bond between the joining partners is accomplished by forming a solid solution at the interface.

This paper is part of a Thematic Issue on Copper and its Alloys.  相似文献   
10.
We present an energy penalization method for isogeometric topology optimization using moving morphable components (ITO–MMC), propose an ITO–MMC with an additional bilateral or periodic symmetric constraint for symmetric structures, and then extend the proposed energy penalization method to an ITO–MMC with a symmetric constraint. The energy penalization method can solve the problems of numerical instability and convergence for the ITO–MMC and the ITO–MMC subjected to the structural symmetric constraint with asymmetric loads. Topology optimization problems of asymmetric, bilateral symmetric, and periodic symmetric structures are discussed to validate the effectiveness of the proposed energy penalization approach. Compared with the conventional ITO–MMC, the energy penalization method for the ITO–MMC can improve the convergence rate from 18.6% to 44.5% for the optimization of the asymmetric structure. For the ITO–MMC under a bilateral symmetric constraint, the proposed method can reduce the objective value by 5.6% and obtain a final optimized topology that has a clear boundary with decreased iterations. For the ITO–MMC under a periodic symmetric constraint, the proposed energy penalization method can dramatically reduce the number of iterations and obtain a speedup of more than 2.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号