首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   365篇
  免费   26篇
  国内免费   25篇
电工技术   4篇
综合类   30篇
化学工业   13篇
金属工艺   2篇
机械仪表   17篇
建筑科学   15篇
矿业工程   8篇
能源动力   7篇
轻工业   11篇
水利工程   2篇
石油天然气   5篇
武器工业   22篇
无线电   51篇
一般工业技术   15篇
冶金工业   1篇
原子能技术   1篇
自动化技术   212篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2020年   4篇
  2019年   2篇
  2018年   1篇
  2017年   3篇
  2016年   5篇
  2015年   2篇
  2014年   12篇
  2013年   13篇
  2012年   33篇
  2011年   34篇
  2010年   37篇
  2009年   41篇
  2008年   46篇
  2007年   30篇
  2006年   32篇
  2005年   28篇
  2004年   15篇
  2003年   26篇
  2002年   9篇
  2001年   3篇
  2000年   4篇
  1999年   2篇
  1998年   4篇
  1997年   3篇
  1996年   4篇
  1995年   4篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1980年   1篇
  1977年   1篇
排序方式: 共有416条查询结果,搜索用时 15 毫秒
101.
三维视景仿真依据仿真目的,可实时再现导弹攻击目标的全过程,为激光制导武器半实物仿真的飞行仿真、航迹规划等提供了直观的分析手段。通过Vega prime和Creator建立了导弹攻击目标的三维视景仿真系统中所需的三维实体模型、地形模型、天空、海面、雪地和碰撞等特殊效果并对其进行优化处理。依据导弹弹道解算模型实时解算导弹弹道参数,通过人机交互界面实时显示导弹飞行的位置和姿态,实现了导弹攻击目标的可视化仿真。  相似文献   
102.
柯老和孙琦教授在[1]中提出了一个猜想:任意2n-1(n≥1)个有理整数中必有n个整数之和能为n整除。本文目的是将这一猜想推广到任一代数数域的代数整数范围中去。  相似文献   
103.
为了提高仿真的逼真程度,本文介绍了Vega Prime采用粒子系统来模拟环境特效,Vega Prime提供了简单易用的编辑粒子系统特效的图形化用户模块,即Lynx Prime。根据该模块重点研究特定粒子系统的生成、属性及运动模型上。并在Vega Prime基础上阐述了爆炸特效的实现技术。  相似文献   
104.
虚拟大气环境模拟仿真的研究   总被引:1,自引:0,他引:1  
为更好地实现视景仿真的实时场景渲染,使虚拟环境更加逼真形象,提出了云彩和薄雾的实现方法,给出了虚拟大气环境的模拟仿真过程.Vega是一个先进的虚拟场景开发工具,采用Vega开发虚拟大气场景,在大气模拟仿真领域有着非常广泛的应用前景.  相似文献   
105.
针对RSA加密算法的加密速度进行了研究,在大数模幂、模乘和平方等运算上作了改进,提高了RSA加密算法的执行效率.最后在模拟环境中对该改进算法进行了测试.  相似文献   
106.
Let R be a commutative ring with identity and let M be an R-module. We topologize LSpec(M), the collection of all prime L-submodules of M, analogous to that for FSpec(R), the spectrum of fuzzy prime ideals of R, and investigate the properties of this topological space. In particular, we will study the relationship between LSpec(M) and LSpec(R/Ann(M)) and obtain some results.  相似文献   
107.
Graphs are universal modeling tools. They are used to represent objects and their relationships in almost all domains: they are used to represent DNA, images, videos, social networks, XML documents, etc. When objects are represented by graphs, the problem of their comparison is a problem of comparing graphs. Comparing objects is a key task in our daily life. It is the core of a search engine, the backbone of a mining tool, etc. Nowadays, comparing objects faces the challenge of the large amount of data that this task must deal with. Moreover, when graphs are used to model these objects, it is known that graph comparison is very complex and computationally hard especially for large graphs. So, research on simplifying graph comparison gainedan interest and several solutions are proposed. In this paper, we explore and evaluate a new solution for the comparison of large graphs. Our approach relies on a compact encoding of graphs called prime graphs. Prime graphs are smaller and simpler than the original ones but they retain the structure and properties of the encoded graphs. We propose to approximate the similarity between two graphs by comparing the corresponding prime graphs. Simulations results show that this approach is effective for large graphs.  相似文献   
108.
109.

This paper use the well-discussed PVM (Parallel Virtual Machine) software with several personal computers, and adopt the widespread Microsoft Windows '98 operating system as our operation platform to construct a heterogeneous PCs cluster. By engaging the related researches of PC cluster system and cluster computing theory, we apply our heterogeneous PC cluster computing system to generate more secure parameters for some public key cryptosystems such as RSA. Copes with each parameter's related mathematic theory's restriction, enormous computation power is needed to get better computation performance in generating these parameters. In this paper, we contribute heterogeneous PCs combined with the PVM software to cryptosystem parameters, which is conformed to today's safety specification and requirement. We practically generate these data to prove that computer cluster can effectively accumulate enormous computation power, and then demonstrate the cluster computation application in finding strong primes which are needed in some public key cryptosystems.  相似文献   
110.

A new method for obtaining a two-level collective minimal cover for a set of incompletely-specified switching functions $S={f_1,f_2,ldots,f_n}$ is presented. The method relies on the introduction of a single auxiliary function F whose subfunctions (restrictions) with respect to some additional auxiliary variables $y_1,y_2,ldots,y_{n-1}$ are certain members of S . The complete sum of F has full information on the multiple-output prime implicants (MOPIs) of the set of functions S . A particularly constrained minimal cover for F contains only labeled versions of some paramount prime implicants (PPIs) of S and can be used to construct a multiple-output minimal cover for S . The present method can proceed by map, algebraic or tabular techniques, though only the map version is presented herein. This version employs a single map whose construction avoids the ANDing operations needed in the classical method, and whose size is almost one half the total size of the maps used by the classical method, and whose entries can be variable as well as constant. The minimization process is a direct two-step technique that avoids constructing the set of all PPIs as it produces only these PPIs needed in the minimal cover. Details of the method are carefully explained and illustrated via a typical example.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号