首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   15篇
  国内免费   4篇
电工技术   6篇
综合类   7篇
化学工业   16篇
金属工艺   15篇
机械仪表   12篇
建筑科学   21篇
矿业工程   3篇
能源动力   7篇
轻工业   9篇
水利工程   1篇
石油天然气   3篇
无线电   28篇
一般工业技术   9篇
冶金工业   15篇
原子能技术   8篇
自动化技术   117篇
  2023年   1篇
  2022年   3篇
  2021年   1篇
  2020年   6篇
  2019年   6篇
  2018年   5篇
  2017年   9篇
  2016年   5篇
  2015年   4篇
  2014年   13篇
  2013年   15篇
  2012年   11篇
  2011年   21篇
  2010年   18篇
  2009年   20篇
  2008年   26篇
  2007年   27篇
  2006年   11篇
  2005年   8篇
  2004年   18篇
  2003年   13篇
  2002年   11篇
  2001年   8篇
  2000年   3篇
  1999年   6篇
  1998年   1篇
  1997年   4篇
  1995年   2篇
  1982年   1篇
排序方式: 共有277条查询结果,搜索用时 11 毫秒
21.
商品防伪是一项系统工程,现有防伪措施在有效性和易操作性之间不能达到很好的统一,本文在研究商品防伪机制的基础上提出了一种有效解决上述问题的新方案.该方案通过IDEA比特流重组的加密算法对商品信息进行加密,以主密钥机制采用椭圆曲线密码算法ECC实现对IDEA密钥的自动化安全管理,而客户可依据加密产生的防伪码通过电话或网站快速准确认证其对应商品的真伪.理论分析和系统的实际运行表明该方案是一种有效、安全的新型实用方案.  相似文献   
22.
A general discussion of the including approximation of a curve by a fat arc is given followed by an algorithm for constructing an including fat arc for a parametric Bézier curve. An example of applying the algorithm is given. The results for a fat arc are then used to develop an including approximation for a curve segment using a fat biarc. An algorithm for a fat biarc including approximation is provided followed by examples of Bézier curves being included by a fat biarc.  相似文献   
23.
Non-self-intersection is both a topological and a geometric property. It is known that non-self-intersecting regular Bézier curves have non-self-intersecting control polygons, after sufficiently many uniform subdivisions. Here a sufficient condition is given within ℝ3 for a non-self-intersecting, regular C 2 cubic Bézier curve to be ambient isotopic to its control polygon formed after sufficiently many subdivisions. The benefit of using the control polygon as an approximant for scientific visualization is presented in this paper.  相似文献   
24.
IDEA加密标准在开发系统时的一些改进   总被引:3,自引:0,他引:3  
分析介绍了IDEA国际数据加密标准,提出了解决明文最后一个不完整分组的新方法(适用于其他分组加密算法),简化了用户密钥管理(适用于所有加密算法),并在其他方面也提出了有实际意义的处理方法。  相似文献   
25.
We present a multiresolution morphing algorithm using ``as-rigid-as-possible' shape interpolation combined with an angle-length based multiresolution decomposition of simple 2D piecewise curves. This novel multiresolution representation is defined intrinsically and has the advantage that the details' orientation follows any deformation naturally. The multiresolution morphing algorithm consists of transforming separately the coarse and detail coefficients of the multiresolution decomposition. Thus all LoD (level of detail) applications like LoD display, compression, LoD editing etc. can be applied directly to all morphs without any extra computation. Furthermore, the algorithm can robustly morph between very large size polygons with many local details as illustrated in numerous figures. The intermediate morphs behave natural and least-distorting due to the particular intrinsic multiresolution representation.  相似文献   
26.
Very recently, in order to unify the notions of fuzzy metric space and metric-like space, Shukla and Abbas introduced the concept of fuzzy metric-like space and proved some fixed-point results in this setting. In this article, we modify the notion of Cauchy sequence and completeness to generalize their results. Thus, we extend their theorems to a more general framework, which is also appropriate to generalize some recent, well-known results in this line of research. Furthermore, several examples are presented to illustrate the significance of our results.  相似文献   
27.
We consider the stochastic input-output properties of a simple non-linear dynamical system, the so-called Page-Hinkley detector, playing a key role in change detection, and also in queuing theory. We show that for L-mixing inputs with negative expectation the output process of this system is L-mixing. The result is applied to get an upper bound for the false alarm rate. The proof is then adapted to get a similar result for the case of random i.i.d. inputs. Possible extensions and open problems are given in the discussion.  相似文献   
28.
29.
对C^3I系统的信息安全性进行了分析,讨论了安全体系结构及数据保密的实现途径,建立了C^3I系统的安全模型,综合使用IDEA类算法、RSA相关算法、HAVAL杂凑算法设计了一个C^3I数据加密系统。  相似文献   
30.
In this paper, we present an analysis and synthesis approach for guaranteeing that the phase of a single-input, single-output closed-loop transfer function is contained in the interval [−α,α] for a given α>0 at all frequencies. Specifically, we first derive a sufficient condition involving a frequency domain inequality for guaranteeing a given phase constraint. Next, we use the Kalman–Yakubovich–Popov theorem to derive an equivalent time domain condition. In the case where , we show that frequency and time domain sufficient conditions specialize to the positivity theorem. Furthermore, using linear matrix inequalities, we develop a controller synthesis approach for guaranteeing a phase constraint on the closed-loop transfer function. Finally, we extend this synthesis approach to address mixed gain and phase constraints on the closed-loop transfer function.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号