首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16006篇
  免费   1920篇
  国内免费   1693篇
电工技术   587篇
综合类   1801篇
化学工业   694篇
金属工艺   409篇
机械仪表   772篇
建筑科学   758篇
矿业工程   453篇
能源动力   198篇
轻工业   191篇
水利工程   195篇
石油天然气   513篇
武器工业   94篇
无线电   2957篇
一般工业技术   995篇
冶金工业   185篇
原子能技术   76篇
自动化技术   8741篇
  2024年   52篇
  2023年   274篇
  2022年   445篇
  2021年   525篇
  2020年   534篇
  2019年   441篇
  2018年   439篇
  2017年   524篇
  2016年   545篇
  2015年   691篇
  2014年   1101篇
  2013年   1021篇
  2012年   1161篇
  2011年   1391篇
  2010年   1074篇
  2009年   1128篇
  2008年   1184篇
  2007年   1190篇
  2006年   1066篇
  2005年   989篇
  2004年   750篇
  2003年   664篇
  2002年   468篇
  2001年   351篇
  2000年   341篇
  1999年   248篇
  1998年   200篇
  1997年   166篇
  1996年   122篇
  1995年   107篇
  1994年   76篇
  1993年   63篇
  1992年   54篇
  1991年   42篇
  1990年   43篇
  1989年   19篇
  1988年   32篇
  1987年   5篇
  1986年   9篇
  1985年   11篇
  1984年   7篇
  1983年   16篇
  1982年   16篇
  1981年   10篇
  1980年   8篇
  1977年   2篇
  1976年   2篇
  1975年   6篇
  1959年   1篇
  1954年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
One of the most challenging issues in radio received signal strength (RSS)-based localization systems is the generation and distribution of a radio map with a coordinate system linked with spatial information in a large indoor space. This study proposes a novel spatial-tagged radio-mapping system (SRS) that effectively combines the heterogeneous properties of LiDAR and mobile phones to simultaneously perform both spatial and radio mappings. The SRS consists of synchronization, localization, and map building processes, and enables real-time spatial and radio mapping. In the synchronization process, the distance range, motion data, and radio signals obtained through the LiDAR and mobile phone are collected in nodal units according to the sensing time. In the localization process, a feature variance filter is used to control the number of features generated from LiDAR and estimate the positions at which the nodes are generated in real time according to the motion data and radio signals. In map building, the estimated positions of the nodes are used to extract spatial and radio maps by using a unified location coordinate system. To ensure mobility, the SRS is manufactured in the form of a backpack supporting LiDAR and a mobile phone; the usefulness of the system is experimentally verified. The experiments are performed in a large indoor shopping mall with a complex structure. The experimental results demonstrated that a common coordinate system could be used to build spatial and radio maps with high accuracy and efficiency in real time. In addition, the field applicability of the SRS to location-based services is experimentally verified by applying the constructed radio map to well-known fingerprinting algorithms using the heterogeneous mobile phones.  相似文献   
2.
Residential natural gas consumption depends on several factors. Available tools and methods to identify, categorize, and validate effective factors have some limitations, making consumption modeling more complex. Once a comprehensive model of effective consumption factors is developed for residential gas consumers, it can predict consumption. In addition, such a model could be used to verify the accuracy of measuring devices in order to reduce unaccounted for gas (UFG). The key factors affecting residential gas consumption were identified based on previous studies and their mutual effects were analyzed using a fuzzy cognitive mapping (FCM) method. The most significant factors and their effects on natural gas consumption in the residential sector were determined. In this study, for the first time, the expected consumption for each consumer was estimated using a consumption index. Generally, if the estimated consumption is significantly different from the amount recorded by the meter, it could suggest a potential source of UFG. The proposed method was applied to the data collected from the residential gas consumers of a small region in Iran (Dasht-e Arjan region, Fars province), and the results demonstrate the effectiveness of the proposed method.  相似文献   
3.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
4.
Chaos optimization algorithm (COA) utilizes the chaotic maps to generate the pseudo-random sequences mapped as the decision variables for global optimization applications. A kind of parallel chaos optimization algorithm (PCOA) has been proposed in our former studies to improve COA. The salient feature of PCOA lies in its pseudo-parallel mechanism. However, all individuals in the PCOA search independently without utilizing the fitness and diversity information of the population. In view of the limitation of PCOA, a novel PCOA with migration and merging operation (denoted as MMO-PCOA) is proposed in this paper. Specifically, parallel individuals are randomly selected to be conducted migration and merging operation with the so far parallel solutions. Both migration and merging operation exchange information within population and produce new candidate individuals, which are different from those generated by stochastic chaotic sequences. Consequently, a good balance between exploration and exploitation can be achieved in the MMO-PCOA. The impacts of different one-dimensional maps and parallel numbers on the MMO-PCOA are also discussed. Benchmark functions and parameter identification problems are used to test the performance of the MMO-PCOA. Simulation results, compared with other optimization algorithms, show the superiority of the proposed MMO-PCOA algorithm.  相似文献   
5.
为了成功预测竹林山煤矿综放高瓦斯矿井大采高工作面煤层瓦斯涌出量,以主采3号煤层为主要研究对象,针对3号煤层以往开采情况,通过布设测点测量其煤层瓦斯含量和了解相邻矿井瓦斯含量,采用分源预测法、回归法及统计法等预测方法得到了3号煤层瓦斯含量的分布规律,并绘制了3号煤层的瓦斯含量等值线图。对矿井不同生产时期的瓦斯含量进行预测,得到了生产前期、中期及后期采区的最大绝对瓦斯涌出量和最大相对瓦斯涌出量,说明了竹林山煤矿各个时期均属于高瓦斯矿井。  相似文献   
6.
The grouping of pixels based on some similarity criteria is called image segmentation. In this paper the problem of color image segmentation is considered as a clustering problem and a fixed length genetic algorithm (GA) is used to handle it. The effectiveness of GA depends on the objective function (fitness function) and the initialization of the population. A new objective function is proposed to evaluate the quality of the segmentation and the fitness of a chromosome. In fixed length genetic algorithm the chromosomes have same length, which is normally set by the user. Here, a self organizing map (SOM) is used to determine the number of segments in order to set the length of a chromosome automatically. An opposition based strategy is adopted for the initialization of the population in order to diversify the search process. In some cases the proposed method makes the small regions of an image as separate segments, which leads to noisy segmentation. A simple ad hoc mechanism is devised to refine the noisy segmentation. The qualitative and quantitative results show that the proposed method performs better than the state-of-the-art methods.  相似文献   
7.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
8.
为探究[Zr_(0.73)(Cu_(0.59)Ni_(0.41))_(0.27)]_(87)Al_(13)非晶合金的热塑性成形性能以及绘制其对应的热加工图谱,用Gleeble3500型热模拟压缩实验机对该非晶合金进行不同参数下的热模拟压缩实验。结果表明,合金在压缩过程中变形行为由牛顿流变演变为非牛顿流变;同时,过高或过低的热加工温度均能导致合金晶化;进一步对数据分析得到该合金在不同热塑性成形参数下的功率耗散图与流变失稳图,并绘制出相应的热加工谱图,谱图分析结果表明,该合金在温度为420与430℃、应变速率为10~(-3) s~(-1)时具有较高功率耗散系数且没有失稳区域,因此,合金可选的热塑性加工参数为温度420~430℃,应变速率10~(-3) s~(-1)。  相似文献   
9.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.  相似文献   
10.
关键词:双相不锈钢; 流变曲线; 本构方程; 热加工图  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号