首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   743篇
  免费   30篇
  国内免费   29篇
电工技术   15篇
综合类   51篇
化学工业   79篇
金属工艺   18篇
机械仪表   96篇
建筑科学   33篇
矿业工程   8篇
能源动力   42篇
轻工业   45篇
水利工程   12篇
石油天然气   10篇
武器工业   1篇
无线电   86篇
一般工业技术   48篇
冶金工业   11篇
原子能技术   12篇
自动化技术   235篇
  2024年   3篇
  2023年   7篇
  2022年   13篇
  2021年   13篇
  2020年   22篇
  2019年   7篇
  2018年   13篇
  2017年   17篇
  2016年   15篇
  2015年   14篇
  2014年   27篇
  2013年   54篇
  2012年   46篇
  2011年   57篇
  2010年   43篇
  2009年   27篇
  2008年   36篇
  2007年   41篇
  2006年   50篇
  2005年   38篇
  2004年   42篇
  2003年   34篇
  2002年   33篇
  2001年   14篇
  2000年   21篇
  1999年   15篇
  1998年   11篇
  1997年   12篇
  1996年   14篇
  1995年   17篇
  1994年   9篇
  1993年   4篇
  1992年   6篇
  1991年   5篇
  1990年   2篇
  1989年   4篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1982年   3篇
  1981年   1篇
  1978年   1篇
  1977年   1篇
  1955年   1篇
排序方式: 共有802条查询结果,搜索用时 15 毫秒
71.
An open question about the asymptotic cost of connecting many processors to a large memory using three dimensions for wiring is answered, and this result is used to find the full cost of several cryptanalytic attacks. In many cases this full cost is higher than the accepted complexity of a given algorithm based on the number of processor steps. The full costs of several cryptanalytic attacks are determined, including Shanks method for computing discrete logarithms in cyclic groups of prime order n, which requires n1/2+o(1) processor steps, but, when all factors are taken into account, has full cost n2/3+o(1). Other attacks analyzed are factoring with the number field sieve, generic attacks on block ciphers, attacks on double and triple encryption, and finding hash collisions. In many cases parallel collision search gives a significant asymptotic advantage over well-known generic attacks.  相似文献   
72.
分析了思维进化算法(MEA)的“趋同”和“异化”算子及多层种群进化过程,建立了群体进化的数列模型;以模型的极限性质为基础,对算法收敛性进行分析,证明了算法的全局收敛性。与数值仿真试验结果所得结论相符。  相似文献   
73.
余数制和神经网络各有其独特优点,将其有机结合这些优点得以充分发挥。将神经网络结构和方法引人余数制信号处理系统,构造出完成余数约化运算和余/十转换运算以及余数加法运算的新结构,开辟了高速实时信号处理的新途径.将余数制引入神经网络,即神经网络中的数据、权值均按余数制表示和运算,构造出一种新的感知机模型—余数制神经网络,由于余数制运算具有一种独特的非线性特点,使这种模型比常规神经网络具有更强的功能。  相似文献   
74.

The integer factorization problem (IFP), the finite field discrete logarithm problem (DLP) and the elliptic curve discrete logarithm problem (ECDLP) are essentially the only three mathematical problems that the practical public-key cryptographic systems are based on. For example, the most famous RSA cryptosystem is based on IFP, the US government's Digital Signature Standard, DSS, is based on DLP, whereas the ECC (Elliptic Curve Cryptography) and Elliptic Curve Digital Signature Algorithm (ECDSA) are based on ECDLP. The security of such cryptographic systems relies on the computational intractability of these three mathematical problems. In this paper, we shall present a survey of various methods for solving the IFP/DLP and particularly the ECDLP problems. More specifically, we shall first discuss how the index calculus as well as quantum algorithms can be used to solve IFP/DLP. Then we shall show why the index calculus cannot be used to solve ECDLP. Finally, we shall introduce a new method, xedni calculus , due to Joseph Silverman, for attack ECDLP; some open problems and new research directions, will also be addressed.  相似文献   
75.
本文在总结结构风振试验研究的基础上,提出了高层建筑的迎风面、背风面与二侧面的动扭矩是统计独立的假定及相应的计算参数和计算方法。计算实例表明,高层建筑在风荷载作用下的扭转振动是不可忽视的。  相似文献   
76.
简要介绍了瑞星防病毒软件的升级ID号丢失后的几种处理方法和技巧。  相似文献   
77.
This paper is concerned with the identification of a class of piecewise affine systems called a piecewise affine autoregressive exogenous (PWARX) model. The PWARX model is composed of ARX sub-models each of which corresponds to a polyhedral region of the regression space. Under the temporary assumption that the number of sub-models is known a priori, the input-output data are collected into several clusters by using a statistical clustering algorithm. We utilize support vector classifiers to estimate the boundary hyperplane between two adjacent regions in the regression space. In each cluster, the parameter vector of the sub-model is obtained by the least squares method. It turns out that the present statistical clustering approach enables us to estimate the number of sub-models based on the information criteria such as CAIC and MDL. The estimate of the number of sub-models is performed by applying the identification procedure several times to the same data set, after having fixed the number of sub-models to different values. Finally, we verify the applicability of the present identification method through a numerical example of a Hammerstein model.  相似文献   
78.
在VB应用软件中通过读取用户计算机的硬盘卷序列号作为机器码,加密后生成软件注册码。由于硬盘卷序列号是唯一的,提供的软件注册码也是唯一的,用户利用该软件注册码可实现对VB应用软件的注册。本文阐述了利用硬盘卷序列号实现对VB软件注册的详细实现过程。  相似文献   
79.
Film absorption involves simultaneous heat and mass transfer in the gas-liquid system. While the non-absorbable gas does not participate directly in the absorption process, its presence does affect the overall heat and mass transfer. An experimental study was performed to investigate the heat and mass transfer characteristics of LiBr-H2O solution flowing over 6-row horizontal tubes with the water vapor absorption in the presence of non-absorbable gases. The volumetric concentration of non-absorbable gas. air, was varied from 0.17 to 10.0%. The combined effects of the solution flow rate and its concentration on the heat and mass transfer coefficients were also examined. The presence of 2% volumetric concentration of air resulted in a 25% reduction in the Nusselt number and 41% reduction in the Sherwood number. Optimum film Reynolds number was found to exist at which the heat and mass transfer reach their maximum value independent of air contents. Reduced Nusselt and Sherwood numbers, defined as the ratio of Nusselt and Sherwood numbers at given non-absorbable gas content to that with pure water vapor, were correlated to account for the reduction in the heat and mass transfer due to non-absorbable gases in a falling film absorption process.  相似文献   
80.
An experimental study was carried out to investigate the reduced frequency effect on the near-wake of an elliptic airfoil oscillating in pitch. The airfoil was sinusoidally pitched around the center of the chord between -5° and +25° angles of attack at an airspeed of 3.4 m/s. The chord Reynolds number and reduced frequencies were 3.3 X104, and 0.1, 0.7, respectively. Phase-averaged axial velocity and turbulent intensity profiles are presented to show the reduced frequency effects on the near-wake behind the airfoil oscillating in pitch. Axial velocity defects in the near-wake region have a tendency to increase in response to a reduced frequency during pitch up motion, whereas it tends to decrease during pitch down motion at a positive angle of attack. Turbulent intensity at positive angles of attack during the pitch up motion decreased in response to a reduced frequency, whereas turbulent intensity during the pitch down motion varies considerably with downstream stations. Although the true instantaneous angle of attack compensated for a phase-lag is large, the wake thickness of an oscillating airfoil is not always large because of laminar or turbulent separation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号