首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   108篇
  免费   3篇
电工技术   4篇
综合类   1篇
化学工业   4篇
金属工艺   1篇
水利工程   5篇
石油天然气   20篇
无线电   7篇
一般工业技术   7篇
冶金工业   1篇
原子能技术   2篇
自动化技术   59篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2019年   2篇
  2016年   5篇
  2015年   2篇
  2014年   7篇
  2013年   5篇
  2012年   2篇
  2011年   5篇
  2010年   1篇
  2009年   7篇
  2008年   3篇
  2007年   9篇
  2006年   6篇
  2005年   10篇
  2004年   7篇
  2003年   8篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1998年   3篇
  1996年   3篇
  1995年   1篇
  1993年   2篇
  1986年   1篇
  1984年   1篇
  1982年   1篇
  1979年   1篇
  1976年   2篇
  1972年   2篇
  1970年   1篇
  1965年   1篇
  1964年   1篇
  1963年   1篇
  1960年   1篇
排序方式: 共有111条查询结果,搜索用时 265 毫秒
1.
Experimental data on the surface tension of liquid silicon are analyzed. The effect of oxygen and other impurities is discussed. A large body of data is statistically processed. The expression = 0.82–0.3 × 10–3 (T – 1685) (J/m2) is recommended for the surface tension as a function of temperature in the range from 1685 to 1830 K.Translated from Teoreticheskie Osnovy Khimicheskoi Tekhnologii, Vol. 38, No. 6, 2004, pp. 699–707.Original Russian Text Copyright © 2004 by Shishkin, Basin.  相似文献   
2.
We present an algorithm for combining the elements of subsequences of a sequence with an associative operator. The subsequences are given by a sliding window of varying size. Our algorithm is greedy and computes the result with the minimal number of operator applications.  相似文献   
3.
We have previously proposed SecureUML, an expressive UML-based language for constructing security-design models, which are models that combine design specifications for distributed systems with specifications of their security policies. Here, we show how to automate the analysis of such models in a semantically precise and meaningful way. In our approach, models are formalized together with scenarios that represent possible run-time instances. Queries about properties of the security policy modeled are expressed as formulas in UML’s Object Constraint Language. The policy may include both declarative aspects, i.e., static access-control information such as the assignment of users and permissions to roles, and programmatic aspects, which depend on dynamic information, namely the satisfaction of authorization constraints in a given scenario. We show how such properties can be evaluated, completely automatically, in the context of the metamodel of the security-design language. We demonstrate, through examples, that this approach can be used to formalize and check non-trivial security properties. The approach has been implemented in the SecureMOVA tool and all of the examples presented have been checked using this tool.  相似文献   
4.
5.
In this paper, the optimal filtering problem for polynomial system states with polynomial multiplicative noise over linear observations is treated proceeding from the general expression for the stochastic Ito differential of the optimal estimate and the error variance. As a result, the Ito differentials for the optimal estimate and error variance corresponding to the stated filtering problem are first derived. The procedure for obtaining a closed system of the filtering equations for any polynomial state with polynomial multiplicative noise over linear observations is then established, which yields the explicit closed form of the filtering equations in the particular cases of a linear state equation with linear multiplicative noise and a bilinear state equation with bilinear multiplicative noise. In the example, performance of the designed optimal filter is verified for a quadratic state with a quadratic multiplicative noise over linear observations against the optimal filter for a quadratic state with a state‐independent noise and a conventional extended Kalman–Bucy filter. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
6.
This paper proposes an optimal control algorithm for a polynomial system with a quadratic criterion over infinite horizon. The designed regulator gives a closed-form solution to the infinite horizon optimal control problem for a polynomial system with a quadratic criterion. The obtained solution consists of a feedback control law obtained by solving a Riccati algebraic equation dependent on the state. Numerical simulations in the example show advantages of the developed algorithm.  相似文献   
7.
This article presents the optimal quadratic-Gaussian controller for uncertain stochastic polynomial systems with unknown coefficients and matched deterministic disturbances over linear observations and a quadratic criterion. The optimal closed-form controller equations are obtained through the separation principle, whose applicability to the considered problem is substantiated. As intermediate results, this article gives closed-form solutions of the optimal regulator, controller and identifier problems for stochastic polynomial systems with linear control input and a quadratic criterion. The original problem for uncertain stochastic polynomial systems with matched deterministic disturbances is solved using the integral sliding mode algorithm. Performance of the obtained optimal controller is verified in the illustrative example against the conventional quadratic-Gaussian controller that is optimal for stochastic polynomial systems with known parameters and without deterministic disturbances. Simulation graphs demonstrating overall performance and computational accuracy of the designed optimal controller are included.  相似文献   
8.
9.
四川盆地天然气录井具有隐蔽性强的特点,使过平衡钻井中不易识别、发现气层,易发生井漏与井喷,对产层的解释评价也有一定难度。为此,总结和归纳了四川盆地天然气录井特点与识别方法:在常规钻井条件下的天然气识别方法主要靠气测,辅之以钻时、岩屑录井技术,并及时进行小层对比,以确保发现储层。欠平衡钻井的天然气识别方法主要有4种:①气测录井仍是判断油气显示的主要依据;②精细分析钻时,从微弱变化中明查储层;③正确录取和鉴别岩屑是及时发现储层的关键;④及时观察出口工程参数及火焰的变化,是发现气层的佐证。天然气录井中的井控工作包括:搞好地质预报预告,及时发现油气水漏显示与预警,加强坐岗记录以保证钻井安全。  相似文献   
10.
从构造、地层及生、储、盖组合特征出发,以含油气系统的基本原理为依据,划分和比较了乌尔逊、贝尔凹陷6个含油气系统的基本特征,根据各含油气系统的断陷构造样式、断裂发育特征、油气藏类型和分布,总结出双断反转型、断超反转型、断超串型型、简单双断型和无机CO2型共5种类型的含油气系统模式,以此为依据预测了海拉尔盆地其它次级断陷的含油气系统类型。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号