全文获取类型
收费全文 | 258篇 |
免费 | 15篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 6篇 |
综合类 | 7篇 |
化学工业 | 16篇 |
金属工艺 | 15篇 |
机械仪表 | 12篇 |
建筑科学 | 21篇 |
矿业工程 | 3篇 |
能源动力 | 7篇 |
轻工业 | 9篇 |
水利工程 | 1篇 |
石油天然气 | 3篇 |
无线电 | 28篇 |
一般工业技术 | 9篇 |
冶金工业 | 15篇 |
原子能技术 | 8篇 |
自动化技术 | 117篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 1篇 |
2020年 | 6篇 |
2019年 | 6篇 |
2018年 | 5篇 |
2017年 | 9篇 |
2016年 | 5篇 |
2015年 | 4篇 |
2014年 | 13篇 |
2013年 | 15篇 |
2012年 | 11篇 |
2011年 | 21篇 |
2010年 | 18篇 |
2009年 | 20篇 |
2008年 | 26篇 |
2007年 | 27篇 |
2006年 | 11篇 |
2005年 | 8篇 |
2004年 | 18篇 |
2003年 | 13篇 |
2002年 | 11篇 |
2001年 | 8篇 |
2000年 | 3篇 |
1999年 | 6篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1995年 | 2篇 |
1982年 | 1篇 |
排序方式: 共有277条查询结果,搜索用时 11 毫秒
21.
商品防伪是一项系统工程,现有防伪措施在有效性和易操作性之间不能达到很好的统一,本文在研究商品防伪机制的基础上提出了一种有效解决上述问题的新方案.该方案通过IDEA比特流重组的加密算法对商品信息进行加密,以主密钥机制采用椭圆曲线密码算法ECC实现对IDEA密钥的自动化安全管理,而客户可依据加密产生的防伪码通过电话或网站快速准确认证其对应商品的真伪.理论分析和系统的实际运行表明该方案是一种有效、安全的新型实用方案. 相似文献
22.
A general discussion of the including approximation of a curve by a fat arc is given followed by an algorithm for constructing an including fat arc for a parametric Bézier curve. An example of applying the algorithm is given. The results for a fat arc are then used to develop an including approximation for a curve segment using a fat biarc. An algorithm for a fat biarc including approximation is provided followed by examples of Bézier curves being included by a fat biarc. 相似文献
23.
Non-self-intersection is both a topological and a geometric property. It is known that non-self-intersecting regular Bézier
curves have non-self-intersecting control polygons, after sufficiently many uniform subdivisions. Here a sufficient condition is given within ℝ3 for a non-self-intersecting, regular C
2 cubic Bézier curve to be ambient isotopic to its control polygon formed after sufficiently many subdivisions. The benefit
of using the control polygon as an approximant for scientific visualization is presented in this paper. 相似文献
24.
IDEA加密标准在开发系统时的一些改进 总被引:3,自引:0,他引:3
分析介绍了IDEA国际数据加密标准,提出了解决明文最后一个不完整分组的新方法(适用于其他分组加密算法),简化了用户密钥管理(适用于所有加密算法),并在其他方面也提出了有实际意义的处理方法。 相似文献
25.
We present a multiresolution morphing algorithm using ``as-rigid-as-possible' shape interpolation combined with an angle-length
based multiresolution decomposition of simple 2D piecewise curves. This novel multiresolution representation is defined intrinsically
and has the advantage that the details' orientation follows any deformation naturally. The multiresolution morphing algorithm
consists of transforming separately the coarse and detail coefficients of the multiresolution decomposition. Thus all LoD
(level of detail) applications like LoD display, compression, LoD editing etc. can be applied directly to all morphs without
any extra computation. Furthermore, the algorithm can robustly morph between very large size polygons with many local details
as illustrated in numerous figures. The intermediate morphs behave natural and least-distorting due to the particular intrinsic
multiresolution representation. 相似文献
26.
Satish Shukla Dhananjay Gopal Antonio-Francisco Roldán-López-de-Hierro 《国际通用系统杂志》2016,45(7-8):815-829
Very recently, in order to unify the notions of fuzzy metric space and metric-like space, Shukla and Abbas introduced the concept of fuzzy metric-like space and proved some fixed-point results in this setting. In this article, we modify the notion of Cauchy sequence and completeness to generalize their results. Thus, we extend their theorems to a more general framework, which is also appropriate to generalize some recent, well-known results in this line of research. Furthermore, several examples are presented to illustrate the significance of our results. 相似文献
27.
We consider the stochastic input-output properties of a simple non-linear dynamical system, the so-called Page-Hinkley detector, playing a key role in change detection, and also in queuing theory. We show that for L-mixing inputs with negative expectation the output process of this system is L-mixing. The result is applied to get an upper bound for the false alarm rate. The proof is then adapted to get a similar result for the case of random i.i.d. inputs. Possible extensions and open problems are given in the discussion. 相似文献
28.
29.
30.
In this paper, we present an analysis and synthesis approach for guaranteeing that the phase of a single-input, single-output closed-loop transfer function is contained in the interval [−α,α] for a given α>0 at all frequencies. Specifically, we first derive a sufficient condition involving a frequency domain inequality for guaranteeing a given phase constraint. Next, we use the Kalman–Yakubovich–Popov theorem to derive an equivalent time domain condition. In the case where , we show that frequency and time domain sufficient conditions specialize to the positivity theorem. Furthermore, using linear matrix inequalities, we develop a controller synthesis approach for guaranteeing a phase constraint on the closed-loop transfer function. Finally, we extend this synthesis approach to address mixed gain and phase constraints on the closed-loop transfer function. 相似文献