全文获取类型
收费全文 | 2135篇 |
免费 | 167篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 18篇 |
综合类 | 1篇 |
化学工业 | 510篇 |
金属工艺 | 72篇 |
机械仪表 | 126篇 |
建筑科学 | 78篇 |
矿业工程 | 7篇 |
能源动力 | 76篇 |
轻工业 | 341篇 |
水利工程 | 24篇 |
石油天然气 | 15篇 |
无线电 | 128篇 |
一般工业技术 | 327篇 |
冶金工业 | 44篇 |
原子能技术 | 14篇 |
自动化技术 | 523篇 |
出版年
2024年 | 8篇 |
2023年 | 27篇 |
2022年 | 56篇 |
2021年 | 124篇 |
2020年 | 91篇 |
2019年 | 100篇 |
2018年 | 113篇 |
2017年 | 102篇 |
2016年 | 111篇 |
2015年 | 83篇 |
2014年 | 108篇 |
2013年 | 213篇 |
2012年 | 162篇 |
2011年 | 205篇 |
2010年 | 123篇 |
2009年 | 122篇 |
2008年 | 105篇 |
2007年 | 89篇 |
2006年 | 68篇 |
2005年 | 50篇 |
2004年 | 43篇 |
2003年 | 47篇 |
2002年 | 26篇 |
2001年 | 20篇 |
2000年 | 17篇 |
1999年 | 13篇 |
1998年 | 13篇 |
1997年 | 7篇 |
1996年 | 12篇 |
1995年 | 8篇 |
1994年 | 8篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 6篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1981年 | 2篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1973年 | 1篇 |
排序方式: 共有2304条查询结果,搜索用时 31 毫秒
61.
Paulo H. da Rocha Henrique C. Ferreira Michael C. Porsch Roberto M. Sales 《Control Engineering Practice》2009,17(10):1148-1156
Electromagnetic suspension systems are inherently nonlinear and often face hardware limitation when digitally controlled. The main contributions of this paper are: the design of a nonlinear H∞ controller, including dynamic weighting functions, applied to a large gap electromagnetic suspension system and the presentation of a procedure to implement this controller on a fixed-point DSP, through a methodology able to translate a floating-point algorithm into a fixed-point algorithm by using l∞ norm minimization due to conversion error. Experimental results are also presented, in which the performance of the nonlinear controller is evaluated specifically in the initial suspension phase. 相似文献
62.
Marcos Sandim Douglas Cedrim Luis Gustavo Nonato Paulo Pagliosa Afonso Paiva 《Computer Graphics Forum》2016,35(2):215-224
This paper presents a novel method to detect free‐surfaces on particle‐based volume representation. In contrast to most particle‐based free‐surface detection methods, which perform the surface identification based on physical and geometrical properties derived from the underlying fluid flow simulation, the proposed approach only demands the spatial location of the particles to properly recognize surface particles, avoiding even the use of kernels. Boundary particles are identified through a Hidden Point Removal (HPR) operator used for visibility test. Our method is very simple, fast, easy to implement and robust to changes in the distribution of particles, even when facing large deformation of the free‐surface. A set of comparisons against state‐of‐the‐art boundary detection methods show the effectiveness of our approach. The good performance of our method is also attested in the context of fluid flow simulation involving free‐surface, mainly when using level‐sets for rendering purposes. 相似文献
63.
Yang Yang Shigeo Hirose Paulo Debenest Michele Guarnieri Norimitsu Izumi Koichi Suzumori 《Advanced Robotics》2016,30(21):1415-1429
To avert potential crisis from Japan’s aging infrastructure and declining birth rate, the Japanese Government is planning to introduce robotic technology for the inspection of social infrastructure (such as pipes, dams, and bridges). Recording underwater positions is a difficult task for human divers who undertake conventional dam inspections. This study presents the Anchor Diver 5.2 system for efficient and effectual dam inspection. Anchor Diver 5.2 is based on an extended-tether-maneuvered remotely operated vehicle (ROV) equipped with cameras. The ROV is lowered into water by a hoist system from a boat and implements a visual survey of the concrete underwater structure. To improve the visibility of the ROV in murky and cloudy water, a novel concept named Water Loupe is proposed. In addition, a simple boat-fixing method is proposed to provide a stable base on the water surface, and the underwater position of the ROV, which cannot be accessed by global positioning systems, is recorded using a feasible localization method. Finally, the developed system was evaluated in field experiments conducted in the Amagase Dam, Japan, and its merits and problems are discussed. 相似文献
64.
In the context of fault detection and isolation of linear parameter‐varying systems, a challenging task appears when the dynamics and the available measurements render the model unobservable, which invalidates the use of standard set‐valued observers. Two results are obtained in this paper, namely, using a left‐coprime factorization, one can achieve set‐valued estimates with ultimately bounded hyper‐volume and convergence dependent on the slowest unobservable mode; and by rewriting the set‐valued observer equations and taking advantage of a coprime factorization, it is possible to have a low‐complexity fault detection and isolation method. Performance is assessed through simulation, illustrating, in particular, the detection time for various types of faults. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
65.
Carlos Ferreira Lucas Guardalben Tomé Gomes Susana Sargento Paulo Salvador Daniel Robalo Fernando J. Velez 《Journal of Network and Systems Management》2017,25(2):416-456
Nowadays, the prevailing use of networks based on traditional centralized management systems reflects on a fast increase of the management costs. The growth in the number of network equipments and services reinforces the need to distribute the management responsibilities throughout the network devices. In this approach, each device executes common network management functionalities, being part of the overall network management platform. In this paper, we present a Unified Distributed Network Management (UDNM) framework that provides a unified (wired and wireless) management network solution, where further different network services can take part of this infrastructure, e.g., flow monitoring, accurate routing decisions, distributed policies dissemination, etc. This framework is divided in two main components: (A) Situation awareness, which sets up initial information through bootstrapping, discovery, fault-management process and exchange of management information; (B) Autonomic Decision System (ADS) that performs distributed decisions in the network with incomplete information. We deploy the UDNM framework in a testbed which involves two cities (\(\approx\)250 km between), different standards (IEEE 802.3, IEEE 802.11 and IEEE 802.16e) and network technologies, such as, wired virtual grid, wireless ad-hoc gateways, ad-hoc mobile access devices. The UDNM framework integrates management functionalities into the managed devices, proving to be a lightweight and easy-respond framework. The performance analysis shows that the UDNM framework is feasible to unify devices management functionalities and to take accurate decisions on top of a real network. 相似文献
66.
It is known that the dynamic equations of motion for constrained mechanical multibody systems are frequently formulated using the Newton–Euler’s approach, which is augmented with the acceleration constraint equations. This formulation results in the establishment of a mixed set of partial differential and algebraic equations, which are solved in order to predict the dynamic behavior of general multibody systems. The classical solution of the equations of motion is highly prone to constraints violation because the position and velocity constraint equations are not fulfilled. In this work, a general and comprehensive methodology to eliminate the constraints violation at the position and velocity levels is offered. The basic idea of the described approach is to add corrective terms to the position and velocity vectors with the intent to satisfy the corresponding kinematic constraint equations. These corrective terms are evaluated as a function of the Moore–Penrose generalized inverse of the Jacobian matrix and of the kinematic constraint equations. The described methodology is embedded in the standard method to solve the equations of motion based on the technique of Lagrange multipliers. Finally, the effectiveness of the described methodology is demonstrated through the dynamic modeling and simulation of different planar and spatial multibody systems. The outcomes in terms of constraints violation at the position and velocity levels, conservation of the total energy and computational efficiency are analyzed and compared with those obtained with the standard Lagrange multipliers method, the Baumgarte stabilization method, the augmented Lagrangian formulation, the index-1 augmented Lagrangian, and the coordinate partitioning method. 相似文献
67.
Tiago?OliveiraEmail author Ken?Satoh Paulo?Novais José?Neves Hiroshi?Hosobe 《Autonomous Agents and Multi-Agent Systems》2017,31(3):656-695
In this work a default revision mechanism is introduced into speculative computation to manage incomplete information. The default revision is supported by a method for the generation of default constraints based on Bayesian networks. The method enables the generation of an initial set of defaults which is used to produce the most likely scenarios during the computation, represented by active processes. As facts arrive, the Bayesian network is used to derive new defaults. The objective with such a new dynamic mechanism is to keep the active processes coherent with arrived facts. This is achieved by changing the initial set of default constraints during the reasoning process in speculative computation. A practical example in clinical decision support is described. 相似文献
68.
A broadcasting multiple blind signature scheme based on quantum GHZ entanglement has been presented recently. It is said that the scheme’s unconditional security is guaranteed by adopting quantum key preparation, quantum encryption algorithm and quantum entanglement. In this paper, we prove that each signatory can get the signed message just by an intercept–resend attack. Then, we show there still exist some participant attacks and external attacks. Specifically, we verify the message sender Alice can impersonate each signatory to sign the message at will, and so is the signature collector Charlie. Also, we demonstrate that the receiver Bob can forge the signature successfully, and with respect to the external attacks, the eavesdropper Eve can modify the signature at random. Besides, we discover Eve can change the signed message at random, and Eve can impersonate Alice as the message sender without being discovered. In particular, we propose an improved scheme based on the original one and show that it is secure against not only the attacks mentioned above but also some collusion attacks. 相似文献
69.
Position USBL/DVL sensor-based navigation filter in the presence of unknown ocean currents 总被引:2,自引:0,他引:2
Marco Morgado Pedro Batista Paulo Oliveira Carlos SilvestreAuthor vitae 《Automatica》2011,47(12):2604-2614
This paper presents a novel approach to the design of globally asymptotically stable (GAS) position and velocity filters for Autonomous Underwater Vehicles (AUVs) based directly on the sensor readings of an Ultra-short Baseline (USBL) acoustic array system and a Doppler Velocity Log (DVL). The proposed methodology is based on an equivalent linear time-varying (LTV) system that fully captures the dynamics of the nonlinear system, allowing for the use of powerful linear system analysis and filtering design tools that yield GAS filter error dynamics. Numerical results using Monte Carlo simulations and comparison to the Bayesian Cramér Rao Bound (BCRB) reveal that the performance of the proposed filter is tight to this theoretical estimation error lower bound. In comparison with other approaches, the present solution achieves the same level of performance of the Extended Kalman Filter (EKF), which does not offer GAS guarantees, and outperforms other classical filtering approaches designed in inertial coordinates instead of the body-fixed coordinate frame. 相似文献
70.
Henrique Moniz Nuno Ferreira Neves Miguel Correia Paulo Ver��ssimo 《Distributed Computing》2011,24(3-4):165-175
Wireless ad-hoc networks are being increasingly used in diverse contexts, ranging from casual meetings to disaster recovery operations. A promising approach is to model these networks as distributed systems prone to dynamic communication failures. This captures transitory disconnections in communication due to phenomena like interference and collisions, and permits an efficient use of the wireless broadcasting medium. This model, however, is bound by the impossibility result of Santoro and Widmayer, which states that, even with strong synchrony assumptions, there is no deterministic solution to any non-trivial form of agreement if n ? 1 or more messages can be lost per communication round in a system with n processes. In this paper we propose a novel way to circumvent this impossibility result by employing randomization. We present a consensus protocol that ensures safety in the presence of an unrestricted number of omission faults, and guarantees progress in rounds where such faults are bounded by ${f \,{\leq}\,\lceil \frac{n}{2} \rceil (n\,{-}\,k)\,{+}\,k\,{-}\,2}$ , where k is the number of processes required to decide, eventually assuring termination with probability 1. 相似文献