首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2342篇
  免费   534篇
  国内免费   427篇
电工技术   312篇
综合类   494篇
化学工业   67篇
金属工艺   14篇
机械仪表   95篇
建筑科学   22篇
矿业工程   19篇
能源动力   36篇
轻工业   19篇
水利工程   35篇
石油天然气   18篇
武器工业   28篇
无线电   643篇
一般工业技术   143篇
冶金工业   25篇
原子能技术   10篇
自动化技术   1323篇
  2024年   17篇
  2023年   44篇
  2022年   87篇
  2021年   69篇
  2020年   84篇
  2019年   110篇
  2018年   96篇
  2017年   112篇
  2016年   114篇
  2015年   149篇
  2014年   149篇
  2013年   172篇
  2012年   212篇
  2011年   236篇
  2010年   211篇
  2009年   207篇
  2008年   213篇
  2007年   207篇
  2006年   185篇
  2005年   139篇
  2004年   135篇
  2003年   101篇
  2002年   75篇
  2001年   72篇
  2000年   45篇
  1999年   26篇
  1998年   7篇
  1997年   14篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1951年   1篇
排序方式: 共有3303条查询结果,搜索用时 15 毫秒
991.
This paper investigates the control of the continuous time Rabinovich chaotic system with the sliding mode control method. Based on the properties of the sliding mode theory, the controllers are designed and added to the nonlinear Rabinovich system. Numerical simulations show that the Rabinovich chaotic system can be regulated to its equilibrium points in the state space by using the sliding mode controllers, which verifies all the theoretical analyses. Simulation results of the proposed sliding mode control strategy have been also compared with the passive control method, and their performances are discussed. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
992.
A collection of novel chaotic oscillators displaying behavior similar to that of the chaotic Colpitts oscillator and requiring the same number and type of energy storage elements is proposed. The oscillators use as an active element the current feedback op amp (CFOA) mostly employed as a current negative impedance converter (INIC). Nonlinearity is introduced through a two-terminal voltage-controlled nonlinear device with an antisymmetric driving-point characteristic. The chaos generators are designed based on sinusoidal oscillators that have been modified for chaos in a semi-systematic manner. By using CFOAs, several attractive features are attained, in particular suitability for high frequency operation. Systems of third- and fourth-order ordinary differential equations describing the chaotic behaviors are derived. Experimental results, PSpice circuit simulations and numerical simulations of the derived mathematical models are included.  相似文献   
993.
魔方变换及其在数字图像加密中的应用   总被引:14,自引:1,他引:14  
提出了一种新的数字图像置乱方法:魔方变换,结合非线性动力学系统的Logistic映射。设计了基于魔方变换的图像加密/解密算法,首先由密钥生成得到自然数据混沌序列,以此序列为参数对图像矩阵进行魔方变换后得到加密图像,解密算法是加密算法的逆过程,实验结果表明,该算法能够得到令人满意的结果。  相似文献   
994.
通过改变系统李雅普诺夫指数对工业过程控制 中的混沌现象进行控制,并提出了一种确定控制区域的方法.理论分析和仿真实验结果表明 ,该控制策略是有效的,可以实现系统的快速稳定.  相似文献   
995.
研究了一个新混沌系统的控制问题.基于自适应滑模变结构控制的方法,用该控制律,即使系统存在输入饱和及外界扰动,也可以将混沌系统的状态渐进稳定到指定的平衡点.该控制律对外界扰动俱有鲁棒性.数字仿真表明,其控制效果极好.  相似文献   
996.
With the development of digitalization in healthcare, more and more information is delivered and stored in digital form, facilitating people’s lives significantly. In the meanwhile, privacy leakage and security issues come along with it. Zero watermarking can solve this problem well. To protect the security of medical information and improve the algorithm’s robustness, this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform (NSST) and Schur decomposition. Firstly, the low-frequency subband image of the original medical image is obtained by NSST and chunked. Secondly, the Schur decomposition of low-frequency blocks to get stable values, extracting the maximum absolute value of the diagonal elements of the upper triangle matrix after the Schur decomposition of each low-frequency block and constructing the transition matrix from it. Then, the mean of the matrix is compared to each element’s value, creating a feature matrix by combining perceptual hashing, and selecting 32 bits as the feature sequence. Finally, the feature vector is exclusive OR (XOR) operated with the encrypted watermark information to get the zero watermark and complete registration with a third-party copyright certification center. Experimental data show that the Normalized Correlation (NC) values of watermarks extracted in random carrier medical images are above 0.5, with higher robustness than traditional algorithms, especially against geometric attacks and achieve watermark information invisibility without altering the carrier medical image.  相似文献   
997.
为了分析隧道延时爆破时滞信号动力系统的非线性特征,在对新悬泉寺隧道爆破信号准确采集的基础上,运用混沌理论研究了经频率切片小波变换后各频带重构子信号的混沌动力学行为。通过子信号吸引子相轨迹特征对隧道爆破信号系统状态进行了直观描述和定量分析。结果表明:隧道爆破振动信号具有混沌特征,不同频带子信号吸引子在二维相空间一定区域内具有特定层次结构且永不封闭椭圆形轨迹。随着频率的增大,混沌吸引子在相空间的形态表现为椭圆轨迹的长/短轴之比逐渐减小,混沌吸引子在相空间沿长轴方向收缩,沿短轴扩展并最终趋于稳定,信号高频噪声具有弱混沌特征。混沌吸引子形态的演化过程有助于爆破信号幅值、能量信息的精确提取和主频有效判别,为隧道爆破信号非线性特征提取提供了新的思路。  相似文献   
998.
研究了参数不确定离散混沌系统的控制问题.通过Takagi-Sugeno(TS)模糊动态模型和脉冲控制技术,建立了参数不确定离散混沌系统的Takagi-Sugeno模糊脉冲控制模型,然后利用矩阵分析和Lyapunov稳定性理论,得到了参数不确定离散混沌系统控制的一个充分条件,最后通过实例证实了该结果的正确性,相比传统的控制方法,基于Takagi-Sugeno模型的模糊脉冲控制方法具有一定的优越性.  相似文献   
999.
The commercialization of the fifth-generation (5G) wireless network has begun. Massive devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to deliver a variety of valuable services to network users. However, there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities. For secure end-to-end communication, key agreement and user authentication have been proposed. However, when billions of massive devices are networked to collect and analyze complex user data, more stringent security approaches are required. Data integrity, non-repudiation, and authentication necessitate special-purpose subtree-based signature mechanisms that are pretty difficult to create in practice. To address this issue, this work provides an efficient, provably secure, lightweight subtree-based online/offline signature procedure (SBOOSP) and its aggregation (Agg-SBOOSP) for massive devices in 5G WSNs using conformable chaotic maps. The SBOOSP enables multi-time offline storage access while reducing processing time. As a result, the signer can utilize the pre-stored offline information in polynomial time. This feature distinguishes our presented SBOOSP from previous online/offline-signing procedures that only allow for one signature. Furthermore, the new procedure supports a secret key during the pre-registration process, but no secret key is necessary during the offline stage. The suggested SBOOSP is secure in the logic of unforgeability on the chosen message attack in the random oracle. Additionally, SBOOSP and Agg-SBOOSP had the lowest computing costs compared to other contending schemes. Overall, the suggested SBOOSP outperforms several preliminary security schemes in terms of performance and computational overhead.  相似文献   
1000.
Big health data collection and storing for further analysis is a challenging task because this knowledge is big and has many features. Several cloud-based IoT health providers have been described in the literature previously. Furthermore, there are a number of issues related to time consumed and overall network performance when it comes to big data information. In the existing method, less performed optimization algorithms were used for optimizing the data. In the proposed method, the Chaotic Cuckoo Optimization algorithm was used for feature selection, and Convolutional Support Vector Machine (CSVM) was used. The research presents a method for analyzing healthcare information that uses in future prediction. The major goal is to take a variety of data while improving efficiency and minimizing process time. The suggested method employs a hybrid method that is divided into two stages. In the first stage, it reduces the features by using the Chaotic Cuckoo Optimization algorithm with Levy flight, opposition-based learning, and distributor operator. In the second stage, CSVM is used which combines the benefits of convolutional neural network (CNN) and SVM. The CSVM modifies CNN’s convolution product to learn hidden deep inside data sources. For improved economic flexibility, greater protection, greater analytics with confidentiality, and lower operating cost, the suggested approach is built on fog computing. Overall results of the experiments show that the suggested method can minimize the number of features in the datasets, enhances the accuracy by 82%, and decrease the time of the process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号