首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1283篇
  免费   163篇
  国内免费   114篇
电工技术   50篇
综合类   186篇
化学工业   25篇
金属工艺   8篇
机械仪表   67篇
建筑科学   12篇
矿业工程   1篇
能源动力   7篇
轻工业   31篇
水利工程   6篇
石油天然气   7篇
武器工业   1篇
无线电   217篇
一般工业技术   174篇
冶金工业   5篇
原子能技术   8篇
自动化技术   755篇
  2024年   3篇
  2023年   14篇
  2022年   30篇
  2021年   29篇
  2020年   33篇
  2019年   36篇
  2018年   39篇
  2017年   34篇
  2016年   45篇
  2015年   49篇
  2014年   70篇
  2013年   100篇
  2012年   107篇
  2011年   105篇
  2010年   66篇
  2009年   77篇
  2008年   91篇
  2007年   64篇
  2006年   54篇
  2005年   52篇
  2004年   46篇
  2003年   40篇
  2002年   48篇
  2001年   35篇
  2000年   30篇
  1999年   17篇
  1998年   32篇
  1997年   33篇
  1996年   19篇
  1995年   21篇
  1994年   23篇
  1993年   19篇
  1992年   22篇
  1991年   9篇
  1990年   10篇
  1989年   11篇
  1988年   4篇
  1987年   7篇
  1986年   5篇
  1985年   3篇
  1984年   7篇
  1983年   3篇
  1982年   2篇
  1981年   3篇
  1979年   4篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1975年   2篇
  1972年   1篇
排序方式: 共有1560条查询结果,搜索用时 15 毫秒
1.
ABSTRACT

Chebyshev interpolation is a highly effective, intensively studied method and enjoys excellent numerical properties which provides tremendous application potential in mathematical finance. The interpolation nodes are known beforehand, implementation is straightforward and the method is numerically stable. For efficiency, a sharp error bound is essential, in particular for high-dimensional applications. For tensorized Chebyshev interpolation, we present an error bound that improves existing results significantly.  相似文献   
2.
This article presents a new approach for solving the Optimal Control Problem (OCP) of linear time-delay systems with a quadratic cost functional. The proposed method can also be used for designing optimal control time-delay systems with disturbance. In this study, the Variational Iteration Method (VIM) is employed to convert the original Time-Delay Optimal Control Problem (TDOCP) into a sequence of nonhomogeneous linear two-point boundary value problems (TPBVPs). The optimal control law obtained consists of an accurate linear feedback term and a nonlinear compensation term which is the limit of an adjoint vector sequence. The feedback term is determined by solving Riccati matrix differential equation. By using the finite-step iteration of a nonlinear compensation sequence, we can obtain a suboptimal control law. Finally, Illustrative examples are included to demonstrate the validity and applicability of the technique.  相似文献   
3.
赵兴强  赵雨龙 《电池》2020,(2):131-135
在Newman模型以及单粒子模型(SPM)的基础上,提出基于Legendre正交多项式的电池模型降阶算法;同时,将固液相物理量的分布纳入模型算法,在提高运算速度的情况下,保证运算精度。以磷酸铁锂(Li Fe PO4)正极锂离子电池为例,对导出的降阶模型进行仿真验证。与全阶模型相比,该模型所计算的电池状态量误差均能保持在2%下。  相似文献   
4.
Abstract

Cryptographic attacks are typically constructed by black-box methods and combinations of simpler properties, for example in [Generalised] Linear Cryptanalysis. In this article, we work with a more recent white-box algebraic-constructive methodology. Polynomial invariant attacks on a block cipher are constructed explicitly through the study of the space of Boolean polynomials which does not have a unique factorisation and solving the so-called Fundamental Equation (FE). Some recent invariant attacks are quite symmetric and exhibit some sort of clear structure, or work only when the Boolean function is degenerate. As a proof of concept, we construct an attack where a highly irregular product of seven polynomials is an invariant for any number of rounds for T-310 under certain conditions on the long term key and for any key and any IV. A key feature of our attack is that it works for any Boolean function which satisfies a specific annihilation property. We evaluate very precisely the probability that our attack works when the Boolean function is chosen uniformly at random.  相似文献   
5.
徐花芝  刘建涛 《山西建筑》2007,33(9):350-350,368
通过利用分段三次多项式插值法将地形图中的等高线分段来求曲线的表达式,然后对每段上的表达式采取曲率最大值法,得出等高线弯曲变化的特征点,来提取地形图中的山谷线和山脊线,并选取了某一地区的地形等高线图进行了实验,以验证该方法的正确性。  相似文献   
6.
为实现泵站管道工作状态的在线监测,保障其安全稳定运行,提出一种基于排列熵算法(permutation entropy,简称PE)的泵站压力管道监测方法。该方法充分发挥排列熵算法计算简单和敏感度高等优点,适宜于处理非线性、非平稳信号,通过在关键部位设置传感器获取泵站管道的振动信号,利用信号子序列熵值的变化判断泵站管道振动状况。将该方法应用于景电工程二期七泵站管道的运行监测,通过设置不同的运行工况进行实例验证。结果表明,在开关机组瞬间,振动信号子序列熵值的最大幅差达到0.37,机组稳定运行期间子序列熵值的最大幅差仅为0.07,根据其熵值的变化可快速方便地识别出泵站管道的运行状态,具有较高的精度与可靠度。该方法为泵站管道运行状况的在线监测提供了新思路,为结构下一步安全诊断工作提供基础,具有较好的工程实用性和推广价值。  相似文献   
7.
基于VMD的故障特征信号提取方法   总被引:2,自引:0,他引:2  
变模式分解(variational mode decomposition,简称VMD)能够将多分量信号一次性分解成多个单分量调幅调频信号(variational intrinsic mode function,简称VIMF),但对噪声比较敏感。利用VMD对噪声的敏感特性,提出了一种基于VMD的降噪方法。利用排列熵定量确定VMD分解后各分量的含噪程度,对高噪分量直接剔除,对低噪分量进行Savitzky-Golay平滑处理,然后重构信号。运用该方法降噪后,对重构信号进行变模式分解,能够有效提取故障特征信号。仿真和实例分析表明,基于VMD的降噪方法的降噪效果优于小波变换降噪方法,VMD能有效提取故障特征信号。  相似文献   
8.
John Wright 《Cryptologia》2018,42(3):222-226
In 1932, Marian Rejewski, who was a young mathematician working at the Polish Cipher Bureau, brilliantly recovered the internal wiring of the military Enigma. His initial efforts were unsuccessful because he assumed that the entry permutation was the same as in the commercial machine. Luckily he tried the identity permutation as an alternative and that proved to be correct. This note describes how Rejewski’s equations may be used to deduce the entry permutation without any guesswork, a technique that was later rediscovered by Alan Turing and by Lieutenant Andrew Gleason.  相似文献   
9.
This paper presents a step towards the design of robust non-fragile power system stabilizers (PSSs) for single-machine infinite-bus systems. To ensure resiliency of a robust PSS, the proposed approach presents a characterization of all stabilizers that can guarantee robust stability (RS) over wide range of operating conditions. A three-term controller (x1 + x2s)/(1 + x3s) is considered to accomplish the design. Necessary and sufficient stability constraints for existing of such controller at certain operating point are derived via Routh–Hurwitz criterion. Continuous variation in the operating point is tackled by an interval plant model where RS problem is reduced to simultaneous stabilization of finite number of plants according to Kharitonov theorem. Controller triplets that can robustly stabilize vertex plants are characterized in a similar manner. The most resilient controller is computed at the center of maximum-area inscribed rectangle. Simulation results confirm robustness and resiliency of the proposed stabilizer.  相似文献   
10.
We propose a new image encryption algorithm which is based on the spatiotemporal non-adjacent coupled map lattices. The system of non-adjacent coupled map lattices has more outstanding cryptography features in dynamics than the logistic map or coupled map lattices does. In the proposed image encryption, we employ a bit-level pixel permutation strategy which enables bit planes of pixels permute mutually without any extra storage space. Simulations have been carried out and the results demonstrate the superior security and high efficiency of the proposed algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号