首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5417篇
  免费   970篇
  国内免费   894篇
电工技术   460篇
技术理论   1篇
综合类   585篇
化学工业   114篇
金属工艺   34篇
机械仪表   251篇
建筑科学   276篇
矿业工程   60篇
能源动力   63篇
轻工业   65篇
水利工程   119篇
石油天然气   118篇
武器工业   38篇
无线电   595篇
一般工业技术   462篇
冶金工业   248篇
原子能技术   195篇
自动化技术   3597篇
  2024年   7篇
  2023年   106篇
  2022年   202篇
  2021年   203篇
  2020年   252篇
  2019年   249篇
  2018年   197篇
  2017年   251篇
  2016年   283篇
  2015年   294篇
  2014年   344篇
  2013年   437篇
  2012年   412篇
  2011年   370篇
  2010年   323篇
  2009年   396篇
  2008年   392篇
  2007年   394篇
  2006年   338篇
  2005年   333篇
  2004年   261篇
  2003年   210篇
  2002年   194篇
  2001年   150篇
  2000年   136篇
  1999年   111篇
  1998年   91篇
  1997年   65篇
  1996年   48篇
  1995年   46篇
  1994年   36篇
  1993年   37篇
  1992年   32篇
  1991年   18篇
  1990年   18篇
  1989年   12篇
  1988年   3篇
  1987年   2篇
  1986年   5篇
  1985年   4篇
  1984年   2篇
  1983年   3篇
  1982年   2篇
  1980年   3篇
  1976年   2篇
  1966年   1篇
  1961年   1篇
  1959年   1篇
  1957年   1篇
  1955年   1篇
排序方式: 共有7281条查询结果,搜索用时 46 毫秒
11.
A discrete event system possesses the property of detectability if it allows an observer to perfectly estimate the current state of the system after a finite number of observed symbols, i.e., detectability captures the ability of an observer to eventually perfectly estimate the system state. In this paper we analyze detectability in stochastic discrete event systems (SDES) that can be modeled as probabilistic finite automata. More specifically, we define the notion of A-detectability, which characterizes our ability to estimate the current state of a given SDES with increasing certainty as we observe more output symbols. The notion of A-detectability is differentiated from previous notions for detectability in SDES because it takes into account the probability of problematic observation sequences (that do not allow us to perfectly deduce the system state), whereas previous notions for detectability in SDES considered each observation sequence that can be generated by the underlying system. We discuss observer-based techniques that can be used to verify A-detectability, and provide associated necessary and sufficient conditions. We also prove that A-detectability is a PSPACE-hard problem.  相似文献   
12.
Schedules of supply chains are generated with buffers to absorb the effect of disruptive events that could occur during their execution. Schedules can be systematically repaired through specific modifications within buffers by using appropriate decision models that consider the distributed nature of a supply chain. To this aim, information of disruptive events at occurrence or in advance allows decision models to make better decisions. To detect and predict disruptive events along a schedule execution, a service-oriented monitoring subsystem that uses a reference model for defining monitoring models was proposed. This subsystem offers services for collecting execution data of a schedule and environment data, and assessing them to detect/anticipate disruptive events. Because of the distributed nature and the complexity of these services functionalities, this paper presents an agent-based approach for their implementation. This technology allows dealing with supply chain monitoring by structuring monitoring subsystem functionalities as a set of autonomous entities. These entities are able to perform tailored plans created at execution time to concurrently monitor different schedules. A case study is described to try out the implemented prototype system.  相似文献   
13.
With the rapid development in business transactions, especially in recent years, it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way. Online business transactions have increased, especially when the user or customer cannot obtain the required service. For example, with the spread of the epidemic Coronavirus (COVID-19) throughout the world, there is a dire need to rely more on online business processes. In order to improve the efficiency and performance of E-business structure, a web server log must be well utilized to have the ability to trace and record infinite user transactions. This paper proposes an event stream mechanism based on formula patterns to enhance business processes and record all user activities in a structured log file. Each user activity is recorded with a set of tracing parameters that can predict the behavior of the user in business operations. The experimental results are conducted by applying clustering-based classification algorithms on two different datasets; namely, Online Shoppers Purchasing Intention and Instacart Market Basket Analysis. The clustering process is used to group related objects into the same cluster, then the classification process measures the predicted classes of clustered objects. The experimental results record provable accuracy in predicting user preferences on both datasets.  相似文献   
14.
This paper concerns the multi‐plant networked control system with external perturbations by applying the adaptive model‐based event‐triggered control strategy. Compared with existing works, we introduce multiple plants topology in order to smooth the information exchanges among different plants. Gained insight into the adaptive model features in the view of event‐triggered thought, the event‐triggered rules, determining when the control inputs update, are obtained using the Lyapunov technique to reduce the communication cost. By designing some adaptive updating laws combined with the concept of event‐triggered, the unknown parameters in uncertain multi‐plant networked control systems are real‐time online estimated and adjusted with respect to the relevant nominal systems at event‐triggered instants. To avoid Zeno phenomena, a lower bound of event‐triggered execution interval is discussed. Furthermore, given the external perturbations, gain stability theory is introduced to analyze the stability of multi‐plant networked control systems with bounded perturbations, and then the sufficient conditions related to the multiple plants topology structure are derived. Finally, a numerical simulation is provided to illustrate the effectiveness of our theoretic results.  相似文献   
15.
The typical development of total volumetric change in the focal areas of seismic events, corresponding to destress blasting, is characterized as an explosive phase followed by an implosive phase and with alternating additional phases following on from that. In a few cases, a non-typical development of volumetric change was identified, where the first phase was implosive and the second phase, explosive. This development is mainly typical for induced seismic events recorded during mining, not for destress blasting.Seismic events were recorded during longwall mining in the Czech part of the Upper Silesian Coal Basin, where the destress blasting technique is used as a rockburst prevention active measure.Kinematic source processes in the focal areas of selected seismic events were analyzed by the seismic moment tensor inversion method, as well as by studying geomechanical rock mass conditions at the localities of the seismic events. The main goal of the analysis was to attempt to identify the reasons for non-typical development of volumetric changes in these cases. Volumetric changes were analyzed for seismic events with energy greater than 104 J, recorded in the period of time from 1993 to 2009(1109 events). 80%(891) of the recorded seismic events were induced seismic events that were registered during longwall mining and 20%(218) corresponded to destress blasting events. Research shows that the main reason for the non-typical development of volumetric changes in the focal areas of seismic events is an association with destress blasting in the rock mass, which is very close to rock mass overstressing. The detonation of explosives in boreholes, which would dominate the first phase of volumetric changes, probably obscured stress release in the rock mass, as manifested in the first implosion phase of the volumetric changes in this case.  相似文献   
16.
This paper presents parallel multipopulation differential evolutionary particle swarm optimization (DEEPSO) for voltage and reactive power control (VQC). The problem can be formulated as a mixed integer nonlinear optimization problem and various evolutionary computation techniques have been applied to the problem including PSO, differential evolution (DE), and DEEPSO. Since VQC is one of the online controls, speed‐up of computation is required. Moreover, there is still room for improvement in solution quality. This paper applies parallel multipopulation DEEPSO in order to speed up the calculation and improve solution quality. The proposed method is applied to IEEE 30, 57, and 118 bus systems. The results indicate that the proposed method can realize fast computation and minimize more active power losses than the conventional evolutionary computation techniques.  相似文献   
17.
Metro shield construction will inevitably cause changes in the stress and strain state of the surrounding soil, resulting in stratum deformation and surface settlement (SS), which will seriously endanger the safety of nearby buildings, roads and underground pipe networks. Therefore, in the design and construction stage, optimizing the shield construction parameters (SCP) is the key to reducing the SS rate and increasing the safe driving speed (DS). However, optimization of existing SCP are challenged by the need to construct a unified multiobjective model for optimization that are efficient, convenient, and widely applicable. This paper innovatively proposes a hybrid intelligence framework that combines random forest (RF) and non-dominant classification genetic algorithm II (NSGA-II), which overcomes the shortcomings of time-consuming and high cost for the establishment and verification of traditional prediction models. First, RF is used to rank the importance of 10 influencing factors, and the nonlinear mapping relationship between the main SCP and the two objectives is constructed as the fitness function of the NSGA-II algorithm. Second, a multiobjective optimization framework for RF-NSGA-II is established, based on which the optimal Pareto front is calculated, and reasonable optimized control ranges for the SCP are obtained. Finally, a case study in the Wuhan Rail Transit Line 6 project is examined. The results show that the SS is reduced by 12.5% and the DS is increased by 2.5% with the proposed framework. Meanwhile, the prediction results are compared with the back-propagation neural network (BPNN), support vector machine (SVM), and gradient boosting decision tree (GBDT). The findings indicate that the RF-NSGA-II framework can not only meet the requirements of SS and DS calculation, but also used as a support tool for real-time optimization and control of SCP.  相似文献   
18.
多堆厂址一级概率安全评价(PSA)研究中,机组数目的增加使得建模工作量剧增,给整个核电厂的风险评估带来困难。结合已有基础,本文研究了多堆厂址始发事件分析的筛选方法,提出利用堆芯损伤频率(CDF)上下限值评估方法,分析厂址内不同机组数对厂址CDF的影响。结果表明,双机组厂址适合优先进行具体分析。针对双机组核电站,对多堆厂址内各始发事件进行筛选。结果表明,丧失厂外电、丧失热阱等事件适合建模分析,并对其他筛选结果给出后续分析建议,为多堆厂址一级PSA后续事故序列建模工作提供了重要基础。  相似文献   
19.
This article concerns the event-triggered fuzzy filter design for Takagi-Sugeno (T-S) fuzzy systems subject to deception attacks under the stochastic multiple time-varying delays. A sequence of random variables, which are mutually independent but obey the Bernoulli distribution, is introduced to account for the randomly occurring communication delays. In order to efficiently utilize limited network communication bandwidth resources, the event-triggering scheme is adopted. A fuzzy filter with the attacked input signal is presented. Moreover, due to communication delays caused by event-triggering schemes and transmission, the filter adopts non-synchronous premise variables with the system. Then, by utilizing a model transformation technique, the fuzzy systems are developed. Furthermore, using the piecewise Lyapunov functional method technique, the resulting criterion provides sufficient conditions to ensure that fuzzy systems under deception attacks are stochastically stable with an H performance. Accordingly, the conditions for the co-design of the fuzzy filter and event-triggering schemes are given. Finally, numerical simulation with the industrial process provided to verify the proposed event-triggered design.  相似文献   
20.
为进一步抑制高危岗位矿工违章行为,基于计划行为理论,从有限理性角度出发,引入安全管理者奖励机制,建立煤矿高危岗位矿工违章行为与安全检查员检查行为博弈模型,构建行为收益感知矩阵,对博弈双方的复制动态方程进行分析。结果表明:当检查力度和惩罚系数一定时,管理者对矿工施加的奖惩方式,主要取决于矿工的风险规避系数;在对一线矿工违章操作施加的惩罚力度不变的情况下,安全检查员加大对一线矿工的检查频率和力度,可以减少违章操作次数;在安全检查员对矿工检查力度不变的情况下,管理者加大对矿工违章行为的惩罚力度,也可以抑制违章行为。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号