首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   232篇
  免费   38篇
  国内免费   50篇
电工技术   8篇
综合类   21篇
化学工业   2篇
金属工艺   1篇
机械仪表   7篇
建筑科学   3篇
矿业工程   3篇
水利工程   1篇
武器工业   1篇
无线电   17篇
一般工业技术   7篇
冶金工业   2篇
自动化技术   247篇
  2024年   1篇
  2023年   3篇
  2022年   6篇
  2021年   9篇
  2020年   10篇
  2019年   2篇
  2018年   8篇
  2017年   10篇
  2016年   14篇
  2015年   11篇
  2014年   17篇
  2013年   21篇
  2012年   8篇
  2011年   11篇
  2010年   15篇
  2009年   6篇
  2008年   13篇
  2007年   20篇
  2006年   18篇
  2005年   14篇
  2004年   20篇
  2003年   8篇
  2002年   12篇
  2001年   10篇
  2000年   4篇
  1999年   3篇
  1998年   4篇
  1997年   4篇
  1996年   2篇
  1995年   8篇
  1994年   3篇
  1993年   5篇
  1992年   7篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
  1987年   1篇
  1986年   1篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1975年   2篇
排序方式: 共有320条查询结果,搜索用时 31 毫秒
1.
To design robust interval observers for uncertain continuous‐time linear systems, a new set‐integration approach is proposed to compute trajectory tubes for the estimation error. Because this approach, the order‐preserving condition on the dynamics of the estimation error is no longer required. Therefore, synthesis methods can be used to compute observer gains that reduce the impact of the system uncertainties on the accuracy of the estimated state enclosures. The performance of the proposed approach is showcased through illustrative numerical examples.  相似文献   
2.
As a powerful analysis tool of Petri nets, reachability trees are fundamental for systematically investigating many characteristics such as boundedness, liveness and reversibility. This work proposes a method to generate a reachability tree, called ωRT for short, for a class of unbounded generalized nets called ω-independent nets based on new modified reachability trees (NMRTs). ωRT can effectively decrease the number of nodes by removing duplicate and ω-duplicate nodes in the tree, and verify properties such as reachability, liveness and deadlocks. Two examples are provided to show its superiority over NMRTs in terms of tree size.   相似文献   
3.
基于快速成型技术对产品维修过程中的维修视觉可达性分析技术进行研究。分析了快速成型技术对维修性分析工作的促进作用;采用可视锥法,研究了基于快速成型技术的维修视觉可达性分析技术,提出了维修视觉可达性分析流程;从分析结论的不确定程度、观测角度两个方面分析了基于快速成型技术的维修视觉可达性分析技术的特点。  相似文献   
4.
Abstract

It is well known that using differential geometric methods, the reachability of nonlinear systems can be checked via Lie algebra. Normally, the resultant checking condition is state dependent and requires complicated recursive Lie bracket operations. In this paper, it is shown that for dyadic bilinear systems, the reachability property is actually state independent, and hence a global property of the system. Specifically, it is proved that the Lie algebra condition is equivalent to the rank conditions of two constant matrices. As examples, the reachability of two real‐world systems is examined through the new checking condition.  相似文献   
5.
针对一类非线性混成系统的可达性问题,提出了一种基于多面体包含的分析方法。首先介绍了混成系统及其可达性,讨论了如何应用多面体包含对多项式混成系统进行线性近似,并采用量词消去和非线性优化方法来构造相应的线性混成系统,然后运用验证工具SpaceEx求得原非线性混成系统的过近似可达集,并应用于验证系统的安全性。  相似文献   
6.
We consider a system defined as the product of a finite set of periodic systems on cyclic groups. It is of interest to determine if certain subgroups and unions of subgroups of the state set are reachable from a specified initial state, and in particular to determine the computational complexity of verifying such reachability. These questions are motivated by certain problems that arise in the modelling and control of discrete event systems and certain forms of periodic scheduling. Our main result is that deciding whether or not the union of a certain set of subgroups is reachable or not is NP-complete.  相似文献   
7.
Data flow analysis of distributed communicating processes   总被引:1,自引:0,他引:1  
Data flow analysis is a technique essential to the compile-time optimization of computer programs, wherein facts relevant to program optimizations are discovered by the global propagation of facts obvious locally. This paper extends several known techniques for data flow analysis of sequential programs to the static analysis of distributed communicating processes. In particular, we present iterative algorithms for detecting unreachable program statements, and for determining the values of program expressions. The latter information can be used to place bounds on the size of variables and messages. Our main innovation is theevent spanning graph, which serves as a heuristic for ordering the nodes through which data flow information is propagated. We consider bothstatic communication, where all channel arguments are constants, and the more difficultdynamic communication, where channel arguments may be variables and channels may be passed as messages.A preliminary version of this paper appeared in the proceedings of the Sixth Annual ACM Symposium on Principles of Programming Languages, pp. 257–268, June 1979.Supported by National Science Foundation Grant NSF MCS82-00269 and the Office of Naval Research Contract N00014-80-C-0647.Supported by National Science Foundation Grants NSF DCR-8505873 and NSF CCR-8704309.  相似文献   
8.
State space exploration is often used to prove properties about sequential behavior of Finite State Machines (FSMs). For example, equivalence of two machines is proved by analyzing the reachable state set of their product machine. Nevertheless, reachability analysis is infeasible on large practical examples. Combinational verification is far less expensive, but on the other hand its application is limited to combinational circuits, or particular design schemes. Finally, approximate techniques imply sufficient, not strictly necessary conditions.The purpose of this paper is to extend the applicability of purely combinational checks. This is generally achieved through state minimization, partitioning, and re-encoding the FSMs to factor out their differences. We focus on re-encoding. In particular, we present an incremental approach to re-encoding for verification that transforms the product machine traversal into a combinational verification in the best case, and into a computationally simpler product machine traversal in the general case.Experimental results demonstrate the effectiveness of this technique on medium-large circuits where other techniques may fail.  相似文献   
9.
建立临淮岗工程淹没区在不同蓄水条件下的二维非稳态FVS格式水流水质模型,基于水量、水质同步实测数据对模型进行率定验证。运用所建模型对研究区域水流水质过程进行数值模拟,定量分析了研究区域在最不利条件下对临淮岗坝前水质的影响程度。对不同库容条件下在库区北部农业用水时的库区水质浓度场进行计算分析,结果表明:当上游边界来水为功能区Ⅲ类,临淮岗坝前COD、NH3-N和TP浓度都能达到GB 3838—2002Ⅲ类水质标准;当边界条件为枯水期水质时,临淮岗坝前的NH3-N浓度超标,超标率为28%,COD及TP均能达标。  相似文献   
10.
Real systems can include two types of state variables – dynamic and static. While dynamic state variables are a common part of each system, static variables are not and their presence in a system may cause some problems if standard system theories are used. In this paper, it is shown that, due to a new system theory (NST), it is possible to work correctly with systems and subsystems which include not only dynamic state variables, but also static state variables. If standard system theories are used, static variables in the real system cause not only problems in describing systems but also some challenges in control theory. These challenges involve, for example, some questions of controllability, reachability, or observability of a plant that includes static variables or the optimal control design of a plant that includes statical state variables. Some of the challenges mentioned are addressed in this paper after a brief introduction of the NST.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号