首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   27篇
  免费   3篇
化学工业   6篇
建筑科学   2篇
轻工业   3篇
水利工程   1篇
无线电   4篇
一般工业技术   5篇
冶金工业   1篇
自动化技术   8篇
  2022年   1篇
  2020年   2篇
  2019年   4篇
  2018年   2篇
  2017年   3篇
  2016年   3篇
  2015年   1篇
  2014年   1篇
  2013年   1篇
  2012年   3篇
  2011年   2篇
  2010年   2篇
  2007年   1篇
  1998年   1篇
  1996年   1篇
  1994年   1篇
  1982年   1篇
排序方式: 共有30条查询结果,搜索用时 46 毫秒
21.
Shakiba  Ali 《Multimedia Tools and Applications》2020,79(43-44):32575-32605
Multimedia Tools and Applications - In this paper, we designed a new hyperchaotic two-dimensional map with wide distribution and two large positive Lyapunov exponents. Then, we used it to construct...  相似文献   
22.
Nowadays, with the growing popularity of e-Government services, security of client platforms and violation of citizen e-rights are of great concerns. Since Internet-voting protocols have no control over voter-side platforms, bribery/coercion and breaching vote’s privacy and voter’s anonymity are feasible. In fact, the voter-side platform (voter’s PC) is easily vulnerable to malicious software (cyber-attacks) and can totally breach security of the entire voting protocol. We have proposed ESIV: an end-to-end secure internet-voting system that highly guarantees: voter and server-side platform’s security, verifiability, fairness, resistance to bribery/coercion and voting authorities collusion besides simultaneous election support while preserving eligibility, anonymity, privacy and trust. In addition, we utilize Java Card 3 technology as an independent secure web-server which is connected directly to network in order to send/receive HTTP(S) requests using high-speed interfaces. This technology brings about independence from utilizing any trusted device at voter-side and provides end-to-end security. Finally, an implementation of ESIV is presented and ESIV security features are evaluated.  相似文献   
23.
Essential oils extracted by hydrodistillation from Cuminum cyminum and Rosmarinus officinalis were characterized by means of GC and GC–MS. C. cyminum and R. officinalis contained α-pinene (29.1%, 14.9%), 1,8-cineole (17.9%, 7.43%) and linalool (10.4%, 14.9%), respectively, as the major compounds. C. cyminum oil exhibited stronger antimicrobial activity than did R. officinalis oil against E. coli, S. aureus and L. monocytogenes. Complete death time on exposure to Cuminum cyminum L. and Rosmarinus officinalis L. oils were 20 and 25 min 180 and 240 min and 90 and 120 min for E. coli, S. aureus and L. monocytogenes, respectively. Radical-scavenging and antioxidant properties were tested by means of 1,1-diphenyl-2-picrylhydrazyl (DPPH) assay and the β-carotene bleaching test. These properties were compared to those of Thymus x-porlock essential oil, used as a reference ingredient. The radical scavenging performance of the rosemary oil was better than that of C. cyminum. Results from the antioxidant test were better than those provided by the radical-scavenging activity. C. cyminum and R. officinalis essential oils may be considered as potent agents in food preservation.  相似文献   
24.
In [1], nonlinear large deflection finite element analysis was implemented to depict the characteristics of the shear failure mechanism of steel plate girders. That paper aimed at clarifying how–when–why and where plastic hinges form in flanges. The present paper extends those results to the state of stresses in web plates. It is shown that although the principal compressive stresses in the center of the web plates remain constant after an elastic buckling, they do increase considerably in other regions. In addition, the angles at which tension fields form; and the ultimate strength of plate girders is discussed and compared to those obtained by different theoretical and experimental hypotheses.  相似文献   
25.
CLEFIA,a new 128-bit block cipher proposed by Sony Corporation,is increasingly attracting cryptanalysts’ attention.In this paper,we present two new impossible differential attacks on 13 rounds of CLEFIA-128.The proposed attacks utilize a variety of previously known techniques,in particular the hash table technique and redundancy in the key schedule of this block cipher.The first attack does not consider the whitening layers of CLEFIA,requires 2 109.5 chosen plaintexts,and has a running time equivalent to about 2 112.9 encryptions.The second attack preserves the whitening layers,requires 2 117.8 chosen plaintexts,and has a total time complexity equivalent to about 2 121.2 encryptions.  相似文献   
26.
In this paper, we introduce a new impossible differential cryptanalysis of Zodiac that is considerably more effective than the one in the previous work (Hong et al., 2002). Using two new 13-round impossible differential characteristics and the early abort technique, this 3R-Attack breaks 128-bit key full-round Zodiac with complexity less than 271.3 encryptions, which is practical. This result is approximately 248 times better than what mentioned in the earlier work. Our result reveals depth of Zodiac’s weakness against impossible differential cryptanalysis due to its poor diffusion layer. We also obtain a tighter upper bound for time complexity.  相似文献   
27.
28.
Commercial realisations of analogue Viterbi decoder are available for magnetic read channels. However, these implementations are restricted to a particular coding scheme. The authors present a general approach to the implementation of analogue Viterbi decoders having arbitrary coding schemes. The proposed method exploits the ability of simple analogue circuits to perform the required mathematical functions. Simulation results are presented for a 0.8 μm BiCMOS process  相似文献   
29.
Enhanced oil recovery (EOR) methods are mostly based on different phenomena taking place at the interfaces between fluid-fluid and rock-fluid phases. Over the last decade, carbonated water injection (CWI) has been considered as one of the multi-objective EOR techniques to store CO2 in the hydrocarbon bearing formations as well as improving oil recovery efficiency. During CWI process, as the reservoir pressure declines, the dissolved CO2 in the oil phase evolves and gas nucleation phenomenon would occur. As a result, it can lead to oil saturation restoration and subsequently, oil displacement due to the hysteresis effect. At this condition, CO2 would act as insitu dissolved gas into the oil phase, and play the role of an artificial solution gas drive (SGD).In this study, the effect of SGD as an extra oil recovery mechanism after secondary and tertiary CWI (SCWI-TCWI) modes has been experimentally investigated in carbonate rocks using coreflood tests. The depressurization tests resulted in more than 25% and 18% of original oil in place (OOIP) because of the SGD after SCWI and TCWI tests, respectively. From the ultimate enhanced oil recovery point of view, the efficiency of SGD was observed to be more than one-third of that of CWI itself. Furthermore, the pressure drop data revealed that the system pressure depends more on the oil production pattern than water production.  相似文献   
30.
In recent years, because of the security requirements of resource‐constrained devices, design and analysis of lightweight block ciphers has received more attention. mCrypton is a lightweight block cipher that has been specifically designed for using in resource‐constrained devices, such as low‐cost radio‐frequency identification tags and sensors. In this paper, we consider cryptanalysis of full‐round mCrypton‐64 using a new extension of biclique attack called non‐isomorphic biclique cryptanalysis. As it is known, effectiveness of the biclique attack is highly dependent to the weakness of key schedule, and it does not seem to be appropriate for block ciphers with strong key scheduling. The non‐isomorphic biclique attack, using an asymmetric key partitioning technique, provides more degrees of freedom to the attacker and makes it possible to use the diffusion layer properties of a block cipher for constructing longer bicliques. Results show that the attack on full‐round mCrypton requires 233.9 chosen plaintexts and a time complexity of 262.67 encryptions. The computational complexity reduces to 262.3, 261.4, and 259.75 encryptions for 10, 8, and 6 rounds of mCrypton‐64, respectively. We also have a discussion on the general form of the computational complexity for non‐isomorphic biclique cryptanalysis. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号