首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   43篇
  免费   0篇
  国内免费   1篇
化学   2篇
力学   3篇
数学   7篇
物理学   32篇
  2016年   1篇
  2007年   1篇
  2005年   1篇
  2004年   2篇
  2003年   1篇
  2002年   3篇
  2001年   1篇
  2000年   4篇
  1999年   4篇
  1998年   2篇
  1997年   1篇
  1996年   3篇
  1995年   3篇
  1994年   2篇
  1993年   6篇
  1988年   3篇
  1987年   1篇
  1984年   1篇
  1981年   2篇
  1980年   1篇
  1978年   1篇
排序方式: 共有44条查询结果,搜索用时 312 毫秒
1.
2.
3.
A highly efficient, low-order model for vortex-induced vibration of flexible cables at low Reynolds number has been developed. A coupled map lattice (CML) wake model, based on circle maps, is combined with a cable model (linear wave equation). With this model, both the self-excited response of the cable oscillation in the crossflow direction and the resulting wake structures are examined at Re = 100. This represents an improvement over earlier CML models capable of only modelling wakes behind externally forced cables. For comparison, spectral-element based numerical simulations, in addition to experiments on a freely vibrating cable flow, were conducted. The freely vibrating CML model predicted lace-like structures consistent with these numerical simulations and experimental results. Little difference was noted between the vortex shedding wake patterns determined for forced cables (from previous CML models) and freely vibrating cables. The freely vibrating CML matched experimental data for maximum cable amplitude reasonably well over a range of mass-damping parameter employed in offshore structural applications.  相似文献   
4.
A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presentedMost of this work was done while he was with Rome CryptoDesign Center, Gemplus, Italy  相似文献   
5.
The motion of a holonomic scleronomic non-conservative mechanicalsystem with minimal dissipation is considered. As applicationsof the theory several problems are studied in detail.  相似文献   
6.
Fusion cross-sections for the 7Li + 12C reaction have been measured at energies above the Coulomb barrier by the direct detection of evaporation residues. The heavy evaporation residues with energies below 3 MeV could not be separated out from the α-particles in the spectrum and hence their contribution was estimated using statistical model calculations. The present work indicates that suppression of fusion cross-sections due to the breakup of 7Li may not be significant for 7Li + 12C reaction at energies around the barrier.  相似文献   
7.
This paper deals with a comparison between experimental observations in a low-Reynolds-number wake behind an oscillating cylinder and the universal properties of a sine circle map. When the limit cycle due to the natural vortex shedding in the wake is modulated at a second frequency by oscillating the cylinder transversely, one obtains in phase space a flow on a two torus. The nonlinear interaction between the two oscillators results in Arnol’d tongues due to phase locking, the devil’s staircase along the critical line, and a transition from order to chaosvia the quasiperiodic route. The sine circle map describes these features adequately. A comparison between the experiment and the theory is made in terms of multifractal formalism and trajectory scaling function.  相似文献   
8.
The alternating step generator is a well-known keystream generator consisting of two stop/go clocked LFSRs, LFSR1 and LFSR2, whose clocks are controlled by another LFSR, LFSR3, which is clocked regularly. A probabilistic analysis of this generator is conducted which shows that the posterior probabilites of individual bits of the first derivatives of the regularly clocked LFSR1 and LFSR2 sequences, when conditioned on a given segment of the first derivative of the keystream sequence, can be computed efficiently in a number of probabilistic models of interest. The expected values of these probabilities, for a random keystream sequence, are derived by an approximate theoretical analysis and are also verified by systematic computer experiments. It is pointed out that these posterior probabilities can be enhanced in a resynchronization scenario and thus used for a low-complexity fast correlation attack on the two LFSRs. More generally, it is argued that even without resynchronization these probabilities may be significantly different from one half for fast correlation attacks based on iterative decoding algorithms to be successful, although with incresead complexity. A related method for computing the posterior probabilities of individual bits of the LFSR3 sequence, when conditioned on both the keystream sequence and the LFSR1 and LFSR2 sequences, is also developed. As these posterior probabilities are much more different from one half, they can be used for a low-complexity fast correlation attack on LFSR3, provided that the initial states of LFSR1 and LFSR2 are previously reconstructed.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号