全文获取类型
收费全文 | 365篇 |
免费 | 26篇 |
国内免费 | 25篇 |
专业分类
电工技术 | 4篇 |
综合类 | 30篇 |
化学工业 | 13篇 |
金属工艺 | 2篇 |
机械仪表 | 17篇 |
建筑科学 | 15篇 |
矿业工程 | 8篇 |
能源动力 | 7篇 |
轻工业 | 11篇 |
水利工程 | 2篇 |
石油天然气 | 5篇 |
武器工业 | 22篇 |
无线电 | 51篇 |
一般工业技术 | 15篇 |
冶金工业 | 1篇 |
原子能技术 | 1篇 |
自动化技术 | 212篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2017年 | 3篇 |
2016年 | 5篇 |
2015年 | 2篇 |
2014年 | 12篇 |
2013年 | 13篇 |
2012年 | 33篇 |
2011年 | 34篇 |
2010年 | 37篇 |
2009年 | 41篇 |
2008年 | 46篇 |
2007年 | 30篇 |
2006年 | 32篇 |
2005年 | 28篇 |
2004年 | 15篇 |
2003年 | 26篇 |
2002年 | 9篇 |
2001年 | 3篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1980年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有416条查询结果,搜索用时 15 毫秒
101.
三维视景仿真依据仿真目的,可实时再现导弹攻击目标的全过程,为激光制导武器半实物仿真的飞行仿真、航迹规划等提供了直观的分析手段。通过Vega prime和Creator建立了导弹攻击目标的三维视景仿真系统中所需的三维实体模型、地形模型、天空、海面、雪地和碰撞等特殊效果并对其进行优化处理。依据导弹弹道解算模型实时解算导弹弹道参数,通过人机交互界面实时显示导弹飞行的位置和姿态,实现了导弹攻击目标的可视化仿真。 相似文献
102.
柯老和孙琦教授在[1]中提出了一个猜想:任意2n-1(n≥1)个有理整数中必有n个整数之和能为n整除。本文目的是将这一猜想推广到任一代数数域的代数整数范围中去。 相似文献
103.
为了提高仿真的逼真程度,本文介绍了Vega Prime采用粒子系统来模拟环境特效,Vega Prime提供了简单易用的编辑粒子系统特效的图形化用户模块,即Lynx Prime。根据该模块重点研究特定粒子系统的生成、属性及运动模型上。并在Vega Prime基础上阐述了爆炸特效的实现技术。 相似文献
104.
105.
针对RSA加密算法的加密速度进行了研究,在大数模幂、模乘和平方等运算上作了改进,提高了RSA加密算法的执行效率.最后在模拟环境中对该改进算法进行了测试. 相似文献
106.
R. Ameri R. Mahjoob M. Mootamani 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(9):901-908
Let R be a commutative ring with identity and let M be an R-module. We topologize L − Spec(M), the collection of all prime L-submodules of M, analogous to that for FSpec(R), the spectrum of fuzzy prime ideals of R, and investigate the properties of this topological space. In particular, we will study the relationship between L − Spec(M) and L − Spec(R/Ann(M)) and obtain some results. 相似文献
107.
Sofiane Lagraa Hamida Seba Riadh Khennoufa Abir M׳Baya Hamamache Kheddouci 《Pattern recognition》2014
Graphs are universal modeling tools. They are used to represent objects and their relationships in almost all domains: they are used to represent DNA, images, videos, social networks, XML documents, etc. When objects are represented by graphs, the problem of their comparison is a problem of comparing graphs. Comparing objects is a key task in our daily life. It is the core of a search engine, the backbone of a mining tool, etc. Nowadays, comparing objects faces the challenge of the large amount of data that this task must deal with. Moreover, when graphs are used to model these objects, it is known that graph comparison is very complex and computationally hard especially for large graphs. So, research on simplifying graph comparison gainedan interest and several solutions are proposed. In this paper, we explore and evaluate a new solution for the comparison of large graphs. Our approach relies on a compact encoding of graphs called prime graphs. Prime graphs are smaller and simpler than the original ones but they retain the structure and properties of the encoded graphs. We propose to approximate the similarity between two graphs by comparing the corresponding prime graphs. Simulations results show that this approach is effective for large graphs. 相似文献
108.
109.
《国际计算机数学杂志》2012,89(7):797-806
This paper use the well-discussed PVM (Parallel Virtual Machine) software with several personal computers, and adopt the widespread Microsoft Windows '98 operating system as our operation platform to construct a heterogeneous PCs cluster. By engaging the related researches of PC cluster system and cluster computing theory, we apply our heterogeneous PC cluster computing system to generate more secure parameters for some public key cryptosystems such as RSA. Copes with each parameter's related mathematic theory's restriction, enormous computation power is needed to get better computation performance in generating these parameters. In this paper, we contribute heterogeneous PCs combined with the PVM software to cryptosystem parameters, which is conformed to today's safety specification and requirement. We practically generate these data to prove that computer cluster can effectively accumulate enormous computation power, and then demonstrate the cluster computation application in finding strong primes which are needed in some public key cryptosystems. 相似文献
110.
《国际计算机数学杂志》2012,89(8):977-983
A new method for obtaining a two-level collective minimal cover for a set of incompletely-specified switching functions $S={f_1,f_2,ldots,f_n}$ is presented. The method relies on the introduction of a single auxiliary function F whose subfunctions (restrictions) with respect to some additional auxiliary variables $y_1,y_2,ldots,y_{n-1}$ are certain members of S . The complete sum of F has full information on the multiple-output prime implicants (MOPIs) of the set of functions S . A particularly constrained minimal cover for F contains only labeled versions of some paramount prime implicants (PPIs) of S and can be used to construct a multiple-output minimal cover for S . The present method can proceed by map, algebraic or tabular techniques, though only the map version is presented herein. This version employs a single map whose construction avoids the ANDing operations needed in the classical method, and whose size is almost one half the total size of the maps used by the classical method, and whose entries can be variable as well as constant. The minimization process is a direct two-step technique that avoids constructing the set of all PPIs as it produces only these PPIs needed in the minimal cover. Details of the method are carefully explained and illustrated via a typical example. 相似文献