全文获取类型
收费全文 | 32703篇 |
免费 | 4041篇 |
国内免费 | 2343篇 |
专业分类
电工技术 | 8817篇 |
综合类 | 3415篇 |
化学工业 | 1311篇 |
金属工艺 | 1297篇 |
机械仪表 | 2188篇 |
建筑科学 | 1934篇 |
矿业工程 | 836篇 |
能源动力 | 787篇 |
轻工业 | 735篇 |
水利工程 | 683篇 |
石油天然气 | 731篇 |
武器工业 | 406篇 |
无线电 | 5133篇 |
一般工业技术 | 2173篇 |
冶金工业 | 1087篇 |
原子能技术 | 280篇 |
自动化技术 | 7274篇 |
出版年
2024年 | 84篇 |
2023年 | 336篇 |
2022年 | 619篇 |
2021年 | 767篇 |
2020年 | 980篇 |
2019年 | 772篇 |
2018年 | 794篇 |
2017年 | 990篇 |
2016年 | 1090篇 |
2015年 | 1322篇 |
2014年 | 2230篇 |
2013年 | 2128篇 |
2012年 | 2602篇 |
2011年 | 2728篇 |
2010年 | 2136篇 |
2009年 | 2240篇 |
2008年 | 2173篇 |
2007年 | 2365篇 |
2006年 | 2066篇 |
2005年 | 1787篇 |
2004年 | 1457篇 |
2003年 | 1316篇 |
2002年 | 1076篇 |
2001年 | 1042篇 |
2000年 | 791篇 |
1999年 | 706篇 |
1998年 | 519篇 |
1997年 | 425篇 |
1996年 | 355篇 |
1995年 | 278篇 |
1994年 | 195篇 |
1993年 | 157篇 |
1992年 | 146篇 |
1991年 | 95篇 |
1990年 | 65篇 |
1989年 | 83篇 |
1988年 | 48篇 |
1987年 | 20篇 |
1986年 | 22篇 |
1985年 | 22篇 |
1984年 | 15篇 |
1983年 | 12篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1979年 | 3篇 |
1975年 | 2篇 |
1964年 | 2篇 |
1963年 | 2篇 |
1961年 | 2篇 |
1959年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 390 毫秒
991.
一类基于观测器的非线性网络化控制系统的绝对稳定性 总被引:1,自引:0,他引:1
主要考虑了基于观测器的Lurie网络化控制系统的绝对稳定性问题. 由于采用了基于观测器的反馈控制器, 传感器到控制器的网络诱导时延和控制器到执行器的网络诱导时延不再能合并到一起处理. 首先通过状态增广方法将Lurie网络化控制系统建模为一个多时滞的Lurie系统, 然后利用Newton-Leibniz公式和添加自由权矩阵的方法给出了时滞依赖的稳定性条件. 在此基础上, 给出三种求解控制器和观测器增益矩阵的方法. 此外, 还分别给出了被控对象存在范数有界不确定性和结构不确定性时系统的鲁棒稳定性条件及鲁棒控制器设计方法, 所有得到的结果都是以线性矩阵不等式的形式给出的. 便于利用线性矩阵不等式工具包进行求解. 最后, 通过两个仿真算例说明了方法的可行性和有效性. 相似文献
992.
993.
This paper considers the flexible flow line problem with unrelated parallel machines at each stage and with a bottleneck stage on the line. The objective of the problem is to minimize the total tardiness. Two bottleneck-based heuristics with three machine selection rules are proposed to solve the problem. The heuristics first develop an indicator to identify a bottleneck stage in the flow line, and then separate the flow line into the upstream stages, the bottleneck stage, and the downstream stages. The upstream stages are the stages ahead of the bottleneck stage and the downstream stages are the stages behind the bottleneck stage. A new approach is developed to find the arrival times of the jobs at the bottleneck stage. Using the new approach, the bottleneck-based heuristics develop two decision rules to iteratively schedule the jobs at the bottleneck stage, the upstream stages, and the downstream stages. In order to evaluate the performance of the bottleneck-based heuristics, seven commonly used dispatching rules and a basic tabu search algorithm are investigated for comparison purposes. Seven experimental factors are used to design 128 production scenarios, and ten test problems are generated for each scenario. Computational results show that the bottleneck-based heuristics significantly outperform all the dispatching rules for the test problems. Although the effective performance of the bottleneck-based heuristics is inferior to the basic tabu search algorithm, the bottleneck-based heuristics are much more efficient than the tabu search algorithm. Also, a test of the effect of the experimental factors on the dispatching rules, the bottleneck-based heuristics, and the basic tabu search algorithm is performed, and some interesting insights are discovered. 相似文献
994.
Fault-tolerant scheduling is an imperative step for large-scale computational Grid systems, as often geographically distributed nodes co-operate to execute a task. By and large, primary-backup approach is a common methodology used for fault tolerance wherein each task has a primary and a backup on two different processors. In this paper, we address the problem of how to schedule DAGs in Grids with communication delays so that service failures can be avoided in the presence of processors faults. The challenge is, that as tasks in a DAG have dependence on each other, a task must be scheduled to make sure that it will succeed when any of its predecessors fails due to a processor failure. We first propose a communication model and determine when communications between a backup and backups of its successors are necessary. Then we determine when a backup can start and its eligible processors so as to guarantee that every DAG can complete upon any processor failure. We develop two algorithms to schedule backups, which minimize response time and replication cost, respectively. We also develop a suboptimal algorithm which targets minimizing replication cost while not affecting response time. We conduct extensive simulation experiments to quantify the performance of the proposed algorithms. 相似文献
995.
996.
WANG Yong WANG Wei & LIU GuoPing Research Center of Information Control Dalian University of Technology Dalian China Faculty of Advanced Technology University of Glamorgan Pontypridd CF DL UK CTGT Center in Harbin Institute of Technology Harbin 《中国科学:信息科学(英文版)》2010,(6):1216-1223
This paper deals with the problem of exponential stability for a class of linear discrete switched systems with constant delays.The switched systems consist of stable and unstable subsystems.Based on the average dwell time method, some switching signals will be found to guarantee exponential stability of these systems.The explicit state decay estimation is also given in the form of the solutions of linear matrix inequalities(LMIs).An example relating to networked control systems(NCSs) illustrates the effect... 相似文献
997.
This paper is concerned with the problem of assessing the stability of linear systems with a single time-delay. Stability analysis of linear systems with time-delays is complicated by the need to locate the roots of a transcendental characteristic equation. In this paper we show that a linear system with a single time-delay is stable independent of delay if and only if a certain rational function parameterized by an integer k and a positive real number T has only stable roots for any finite T≥0 and any k≥2. We then show how this stability result can be further simplified by analyzing the roots of an associated polynomial parameterized by a real number δ in the open interval (0,1). The paper is closed by showing counterexamples where stability of the roots of the rational function when k=1 is not sufficient for stability of the associated linear system with time-delay. We also introduce a variation of an existing frequency-sweeping necessary and sufficient condition for stability independent of delay which resembles the form of a generalized Nyquist criterion. The results are illustrated by numerical examples. 相似文献
998.
Joon-Young Choi 《Automatica》2009,45(10):2462-2466
We consider a class of nonlinear time delay systems created by generalizing the model for FAST TCP, an Internet congestion control algorithm. We achieve a time delay independent sufficient condition for the global asymptotic stability of the class of systems. The sufficient condition is verified by constructing two sequences that represent the lower and upper bound variations of the system trajectory in time, and showing that the two sequences converge to the equilibrium point of the system. The simulation results exemplify that the sufficient condition is valid for global asymptotic stability, and that the sufficient condition is a close approximation to the unknown necessary and sufficient condition for global asymptotic stability. 相似文献
999.
Due to time spent in computation and transfer, control input is usually subject to delays. Problems of deterministic systems with input delay have received considerable attention. However, relatively few works are concerned with problems of stochastic system with input delay. This paper studies delayed-feedback stabilization of uncertain stochastic systems. Based on a new delay-dependent stability criterion established in this paper, a robust delayed-state-feedback controller that exponentially stabilizes the uncertain stochastic systems is proposed. Numerical examples are given to verify the effectiveness and less conservativeness of the proposed method. 相似文献
1000.
G. Louloudis B. Gatos I. Pratikakis C. HalatsisAuthor vitae 《Pattern recognition》2009,42(12):3169-3183
In this paper, we present a segmentation methodology of handwritten documents in their distinct entities, namely, text lines and words. Text line segmentation is achieved by applying Hough transform on a subset of the document image connected components. A post-processing step includes the correction of possible false alarms, the detection of text lines that Hough transform failed to create and finally the efficient separation of vertically connected characters using a novel method based on skeletonization. Word segmentation is addressed as a two class problem. The distances between adjacent overlapped components in a text line are calculated using the combination of two distance metrics and each of them is categorized either as an inter- or an intra-word distance in a Gaussian mixture modeling framework. The performance of the proposed methodology is based on a consistent and concrete evaluation methodology that uses suitable performance measures in order to compare the text line segmentation and word segmentation results against the corresponding ground truth annotation. The efficiency of the proposed methodology is demonstrated by experimentation conducted on two different datasets: (a) on the test set of the ICDAR2007 handwriting segmentation competition and (b) on a set of historical handwritten documents. 相似文献