首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32703篇
  免费   4041篇
  国内免费   2343篇
电工技术   8817篇
综合类   3415篇
化学工业   1311篇
金属工艺   1297篇
机械仪表   2188篇
建筑科学   1934篇
矿业工程   836篇
能源动力   787篇
轻工业   735篇
水利工程   683篇
石油天然气   731篇
武器工业   406篇
无线电   5133篇
一般工业技术   2173篇
冶金工业   1087篇
原子能技术   280篇
自动化技术   7274篇
  2024年   84篇
  2023年   336篇
  2022年   619篇
  2021年   767篇
  2020年   980篇
  2019年   772篇
  2018年   794篇
  2017年   990篇
  2016年   1090篇
  2015年   1322篇
  2014年   2230篇
  2013年   2128篇
  2012年   2602篇
  2011年   2728篇
  2010年   2136篇
  2009年   2240篇
  2008年   2173篇
  2007年   2365篇
  2006年   2066篇
  2005年   1787篇
  2004年   1457篇
  2003年   1316篇
  2002年   1076篇
  2001年   1042篇
  2000年   791篇
  1999年   706篇
  1998年   519篇
  1997年   425篇
  1996年   355篇
  1995年   278篇
  1994年   195篇
  1993年   157篇
  1992年   146篇
  1991年   95篇
  1990年   65篇
  1989年   83篇
  1988年   48篇
  1987年   20篇
  1986年   22篇
  1985年   22篇
  1984年   15篇
  1983年   12篇
  1982年   4篇
  1981年   6篇
  1979年   3篇
  1975年   2篇
  1964年   2篇
  1963年   2篇
  1961年   2篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 390 毫秒
991.
一类基于观测器的非线性网络化控制系统的绝对稳定性   总被引:1,自引:0,他引:1  
赵翔辉  郝飞 《自动化学报》2009,35(7):933-944
主要考虑了基于观测器的Lurie网络化控制系统的绝对稳定性问题. 由于采用了基于观测器的反馈控制器, 传感器到控制器的网络诱导时延和控制器到执行器的网络诱导时延不再能合并到一起处理. 首先通过状态增广方法将Lurie网络化控制系统建模为一个多时滞的Lurie系统, 然后利用Newton-Leibniz公式和添加自由权矩阵的方法给出了时滞依赖的稳定性条件. 在此基础上, 给出三种求解控制器和观测器增益矩阵的方法. 此外, 还分别给出了被控对象存在范数有界不确定性和结构不确定性时系统的鲁棒稳定性条件及鲁棒控制器设计方法, 所有得到的结果都是以线性矩阵不等式的形式给出的. 便于利用线性矩阵不等式工具包进行求解. 最后, 通过两个仿真算例说明了方法的可行性和有效性.  相似文献   
992.
提出一种针对缓存容量受限的容迟移动网络的多复制路由和缓存管理的方法。该方法能充分利用有限的网络资源,实现更高的传送成功率,降低平均发送延迟,同时实现不同重要性报文的服务质量分级。  相似文献   
993.
This paper considers the flexible flow line problem with unrelated parallel machines at each stage and with a bottleneck stage on the line. The objective of the problem is to minimize the total tardiness. Two bottleneck-based heuristics with three machine selection rules are proposed to solve the problem. The heuristics first develop an indicator to identify a bottleneck stage in the flow line, and then separate the flow line into the upstream stages, the bottleneck stage, and the downstream stages. The upstream stages are the stages ahead of the bottleneck stage and the downstream stages are the stages behind the bottleneck stage. A new approach is developed to find the arrival times of the jobs at the bottleneck stage. Using the new approach, the bottleneck-based heuristics develop two decision rules to iteratively schedule the jobs at the bottleneck stage, the upstream stages, and the downstream stages. In order to evaluate the performance of the bottleneck-based heuristics, seven commonly used dispatching rules and a basic tabu search algorithm are investigated for comparison purposes. Seven experimental factors are used to design 128 production scenarios, and ten test problems are generated for each scenario. Computational results show that the bottleneck-based heuristics significantly outperform all the dispatching rules for the test problems. Although the effective performance of the bottleneck-based heuristics is inferior to the basic tabu search algorithm, the bottleneck-based heuristics are much more efficient than the tabu search algorithm. Also, a test of the effect of the experimental factors on the dispatching rules, the bottleneck-based heuristics, and the basic tabu search algorithm is performed, and some interesting insights are discovered.  相似文献   
994.
Fault-tolerant scheduling is an imperative step for large-scale computational Grid systems, as often geographically distributed nodes co-operate to execute a task. By and large, primary-backup approach is a common methodology used for fault tolerance wherein each task has a primary and a backup on two different processors. In this paper, we address the problem of how to schedule DAGs in Grids with communication delays so that service failures can be avoided in the presence of processors faults. The challenge is, that as tasks in a DAG have dependence on each other, a task must be scheduled to make sure that it will succeed when any of its predecessors fails due to a processor failure. We first propose a communication model and determine when communications between a backup and backups of its successors are necessary. Then we determine when a backup can start and its eligible processors so as to guarantee that every DAG can complete upon any processor failure. We develop two algorithms to schedule backups, which minimize response time and replication cost, respectively. We also develop a suboptimal algorithm which targets minimizing replication cost while not affecting response time. We conduct extensive simulation experiments to quantify the performance of the proposed algorithms.  相似文献   
995.
996.
This paper deals with the problem of exponential stability for a class of linear discrete switched systems with constant delays.The switched systems consist of stable and unstable subsystems.Based on the average dwell time method, some switching signals will be found to guarantee exponential stability of these systems.The explicit state decay estimation is also given in the form of the solutions of linear matrix inequalities(LMIs).An example relating to networked control systems(NCSs) illustrates the effect...  相似文献   
997.
Fernando O.  Maurício C.  Reinaldo M.   《Automatica》2009,45(9):2128-2133
This paper is concerned with the problem of assessing the stability of linear systems with a single time-delay. Stability analysis of linear systems with time-delays is complicated by the need to locate the roots of a transcendental characteristic equation. In this paper we show that a linear system with a single time-delay is stable independent of delay if and only if a certain rational function parameterized by an integer k and a positive real number T has only stable roots for any finite T≥0 and any k≥2. We then show how this stability result can be further simplified by analyzing the roots of an associated polynomial parameterized by a real number δ in the open interval (0,1). The paper is closed by showing counterexamples where stability of the roots of the rational function when k=1 is not sufficient for stability of the associated linear system with time-delay. We also introduce a variation of an existing frequency-sweeping necessary and sufficient condition for stability independent of delay which resembles the form of a generalized Nyquist criterion. The results are illustrated by numerical examples.  相似文献   
998.
Joon-Young Choi 《Automatica》2009,45(10):2462-2466
We consider a class of nonlinear time delay systems created by generalizing the model for FAST TCP, an Internet congestion control algorithm. We achieve a time delay independent sufficient condition for the global asymptotic stability of the class of systems. The sufficient condition is verified by constructing two sequences that represent the lower and upper bound variations of the system trajectory in time, and showing that the two sequences converge to the equilibrium point of the system. The simulation results exemplify that the sufficient condition is valid for global asymptotic stability, and that the sufficient condition is a close approximation to the unknown necessary and sufficient condition for global asymptotic stability.  相似文献   
999.
Due to time spent in computation and transfer, control input is usually subject to delays. Problems of deterministic systems with input delay have received considerable attention. However, relatively few works are concerned with problems of stochastic system with input delay. This paper studies delayed-feedback stabilization of uncertain stochastic systems. Based on a new delay-dependent stability criterion established in this paper, a robust delayed-state-feedback controller that exponentially stabilizes the uncertain stochastic systems is proposed. Numerical examples are given to verify the effectiveness and less conservativeness of the proposed method.  相似文献   
1000.
In this paper, we present a segmentation methodology of handwritten documents in their distinct entities, namely, text lines and words. Text line segmentation is achieved by applying Hough transform on a subset of the document image connected components. A post-processing step includes the correction of possible false alarms, the detection of text lines that Hough transform failed to create and finally the efficient separation of vertically connected characters using a novel method based on skeletonization. Word segmentation is addressed as a two class problem. The distances between adjacent overlapped components in a text line are calculated using the combination of two distance metrics and each of them is categorized either as an inter- or an intra-word distance in a Gaussian mixture modeling framework. The performance of the proposed methodology is based on a consistent and concrete evaluation methodology that uses suitable performance measures in order to compare the text line segmentation and word segmentation results against the corresponding ground truth annotation. The efficiency of the proposed methodology is demonstrated by experimentation conducted on two different datasets: (a) on the test set of the ICDAR2007 handwriting segmentation competition and (b) on a set of historical handwritten documents.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号