首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  免费   0篇
  国内免费   8篇
化学工业   4篇
金属工艺   1篇
机械仪表   1篇
能源动力   1篇
轻工业   1篇
无线电   13篇
一般工业技术   2篇
原子能技术   1篇
自动化技术   16篇
  2022年   1篇
  2021年   1篇
  2019年   1篇
  2016年   2篇
  2015年   2篇
  2014年   2篇
  2013年   1篇
  2012年   1篇
  2011年   4篇
  2010年   3篇
  2009年   1篇
  2007年   4篇
  2006年   3篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
排序方式: 共有40条查询结果,搜索用时 343 毫秒
1.
Multimedia Tools and Applications - Since Noar and Shamir introduced visual cryptography scheme (VCS), the cheating problem of VCS has absorbed much attention of scholars. The current researches on...  相似文献   
2.
给出了一种具有最优代数免疫度的偶数元布尔函数的构造,同时还给出了一种具有最优代数免疫度的平衡旋转对称偶数元布尔函数的构造.在构造过程中用到了线性代数和组合计数中的有关结论,这些函数对代数攻击均有很强的抵抗能力.构造的平衡旋转对称布尔函数还可用在Hash算法的轮函数中,增加了算法的安全性.  相似文献   
3.
一类代数免疫度达到最优的布尔函数的构造   总被引:2,自引:0,他引:2  
孟强  陈鲁生  符方伟 《软件学报》2010,21(7):1758-1767
给出了一种具有最优代数免疫度的偶数元布尔函数的构造,同时还给出了一种具有最优代数免疫度的平衡旋转对称偶数元布尔函数的构造.在构造过程中用到了线性代数和组合计数中的有关结论,这些函数对代数攻击均有很强的抵抗能力.构造的平衡旋转对称布尔函数还可用在Hash算法的轮函数中,增加了算法的安全性.  相似文献   
4.
In this letter, we study the minimum pseudo-codewords of low-density parity-check (LDPC) codes under linear programming (LP) decoding. We show that a lower bound of Chaichanavong and Siegel on the pseudo-weight of a pseudo-codeword is tight if and only if this pseudo-codeword is a real multiple of a codeword. Using this result we further show that for some LDPC codes, e.g., Euclidean plane and projective plane LDPC codes, there are no other minimum pseudo-codewords except the real multiples of minimum codewords.  相似文献   
5.
In this letter, the stopping sets and stopping distance of finite geometry LDPC (FG-LDPC) codes are studied. It is known that FG-LDPC codes are majority-logic decodable and a lower bound on the minimum distance can be thus obtained. It is shown in this letter that this lower bound on the minimum distance of FG-LDPC codes is also a lower bound on the stopping distance of FG-LDPC codes, which implies that FG-LDPC codes have considerably large stopping distance. This may explain in one respect why some FG-LDPC codes perform well with iterative decoding in spite of having many cycles of length 4 in their Tanner graphs.  相似文献   
6.
One of the fundamental issues of wireless sensor networks is that an event can be detected by some sensor nodes and delivered to the query devices. This kind of queries and events can be happening anytime and anywhere. Due to the battery constrained nature of sensor nodes, it is important to design routing protocols that are efficient and power saving. In this work, we propose a new routing protocol, the small-world routing protocol (SWRP), which is at the same time a generalization of both flooding and rumor routing and can be operating in between both extremes. With the idea originating from the small-world theory, the proposed protocol finds paths between the queries and events through recurrent propagations of strong and weak links. The operation of the protocol is simple, flexible and requires not much computational power. The SWRP may also minimize the pass-over problem, which occurs when a query agent passes over an event agent even though the two lines cross each other and thus prevents a query from finding the event. It has been shown that by increasing the number of strong links of the SWRP within a controlled area, we may be able to reduce the occurrences of pass-over. Accordingly, the proposed SWRP may achieve much better successful rate in routing as well as cut the number of hop-count at the same time. In particular, our simulation results show that with approximately the same routing overhead (in term of number of routing messages), our protocol may achieve up to 22% more in success rate and 10-hop less in average path length. To reach a 100% successful routing rate, our protocol may save up to 41.2% additional routing overhead as compared to the rumor routing. Most important of all, the SWRP makes the improvements without sacrificing the power consumption of each individual sensor node as the average inter-hop distance for discovered routing paths does not increase as a result of shorter path length.  相似文献   
7.
一种无尺度网络上垃圾邮件蠕虫的传播模型   总被引:2,自引:0,他引:2  
用有向图描述了电子邮件网络的结构,并分析了电子邮件网络的无尺度特性。在此基础上,通过用户检查邮件的频率和打开邮件附件的概率建立了一种电子邮件蠕虫的传播模型。分别仿真了电子邮件蠕虫在无尺度网络和随机网络中的传播,结果表明,邮件蠕虫在无尺度网络中的传播速度比在随机网络中更快,与理论分析相一致。  相似文献   
8.
针对权重信息完全未知的多属性决策问题,利用超立方体分割的思想,给出数值模拟决策方法.该方法易于在计算机上实现,并且利用该方法得到的评价结果客观可靠,不具有主观随意性.最后,给出一个实际应用的例子.  相似文献   
9.
基于STC89C52单片机设计电风扇的控制系统,首先进行总体设计,然后进行硬件电路设计与软件设计,最后试制出电风扇原型机.设计的电风扇能根据环境温度自动调节风速大小,能模拟自然风、阵风、睡眠风等,还具有摇控、能根据人来人往来开启或关闭等智能功能.实践证明该电风扇工作稳定且成本低,具有一定的推广应用价值.  相似文献   
10.
A constant-composition code is a special constant-weight code under the restriction that each symbol should appear a given number of times in each codeword. In this correspondence, we give a lower bound for the maximum size of the q-ary constant-composition codes with minimum distance at least 3. This bound is asymptotically optimal and generalizes the Graham-Sloane bound for binary constant-weight codes. In addition, three construction methods of constant-composition codes are presented, and a number of optimum constant-composition codes are obtained by using these constructions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号