全文获取类型
收费全文 | 71篇 |
免费 | 14篇 |
国内免费 | 5篇 |
专业分类
综合类 | 9篇 |
化学工业 | 2篇 |
机械仪表 | 2篇 |
能源动力 | 3篇 |
无线电 | 17篇 |
一般工业技术 | 10篇 |
自动化技术 | 47篇 |
出版年
2023年 | 1篇 |
2018年 | 3篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 6篇 |
2013年 | 3篇 |
2012年 | 6篇 |
2011年 | 12篇 |
2010年 | 1篇 |
2009年 | 3篇 |
2008年 | 7篇 |
2007年 | 3篇 |
2006年 | 4篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2000年 | 5篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有90条查询结果,搜索用时 31 毫秒
1.
2.
This paper describes an algorithm which produces all ideals compatible with a given surjective Frobenius near-splitting. 相似文献
3.
Irreducible decomposition of monomial ideals has an increasing number of applications from biology to pure math. This paper presents the Slice Algorithm for computing irreducible decompositions, Alexander duals and socles of monomial ideals. The paper includes experiments showing good performance in practice. 相似文献
4.
5.
文伟 《广东工业大学学报》2011,28(1):58-61
在矩阵A和A有相同分块的奇异值分解和乘法扰动下,对于母矩阵为A的行延拓矩阵Rk(A)与其扰动矩阵RK(A),使用奇异值的双分离度获得左右奇异空间的分离,研究了延拓矩阵Rk(A)与其扰动矩阵RK(A)的奇异空间在Frobenius范数下的扰动界. 相似文献
6.
7.
In this paper, motivated by the restrictive conditions required to obtain an exact chained form, we propose a quadratic normal
form around a one-dimensional equilibrium submanifold for systems which are in a chained form in their first approximation.
In the case considered here, in contrast to the case of approximated feedback linearization, not all the state and input components
have the same approximation meaning. Because of this, we use a very simplified version of dilation, which is a useful way
to design a homogeneous control law for driftless systems.
Date received: December 2, 1999. Date revised: October 24, 2001. 相似文献
8.
We propose two improved scalar multiplication methods on elliptic curves over Fqn where q = 2m using Frobenius expansion. The scalar multiplication of elliptic curves defined over subfield Fq can be sped up by Frobenius expansion. Previous methods are restricted to the case of a small m. However, when m is small, it is hard to find curves having good cryptographic properties. Our methods are suitable for curves defined over medium‐sized fields, that is, 10 ≤ m ≤ 20. These methods are variants of the conventional multiple‐base binary (MBB) method combined with the window method. One of our methods is for a polynomial basis representation with software implementation, and the other is for a normal basis representation with hardware implementation. Our software experiment shows that it is about 10% faster than the MBB method, which also uses Frobenius expansion, and about 20% faster than the Montgomery method, which is the fastest general method in polynomial basis implementation. 相似文献
9.
M.T. Kamali 《International Journal of Engineering Science》2006,44(10):633-649
This paper is devoted to the study of scattering of plane harmonic waves by a piezoelectric sphere with spherical isotropy embedded in an unbounded isotropic polymer matrix. The scattered displacement field and the electric potential in the matrix are expressed in terms of spherical vector wave functions and spherical harmonic functions, respectively. For the field points inside the inhomogeneity, new displacement functions are introduced. Expansion of the new displacement functions and the electric potential in terms of spherical harmonic functions, the equations of motion and electrostatic lead to four second order ordinary differential equations (odes), where three of them are coupled. The coupled system of odes is solved by the generalized Frobenius series. This approach is readily used to handle low and high frequencies. Three different types of piezoelectric inhomogeneities, PZT-4, PZT-5H, and BaTiO3 are considered and the associated piezoelectric effects on the electro-mechanical fields, differential and total scattering cross-sections are addressed. 相似文献
10.
Volker Müller 《Journal of Cryptology》1998,11(4):219-234
We discuss new algorithms for multiplying points on elliptic curves defined over small finite fields of characteristic two.
This algorithm is an extension of previous results by Koblitz, Meier, and Staffelbach. Experimental results show that the
new methods can give a running time improvement of up to 50 % compared with the ordinary binary algorithm for multiplication.
Finally, we present a table of elliptic curves, which are well suited for elliptic curve public key cryptosystems, and for
which the new algorithm can be used.
Received 14 January 1997 and revised 4 September 1997 相似文献