首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9052篇
  免费   5篇
电工技术   125篇
化学工业   206篇
金属工艺   279篇
机械仪表   44篇
建筑科学   26篇
能源动力   27篇
轻工业   3篇
水利工程   1篇
石油天然气   15篇
武器工业   2篇
无线电   284篇
一般工业技术   75篇
冶金工业   36篇
原子能技术   83篇
自动化技术   7851篇
  2024年   3篇
  2022年   2篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2015年   2篇
  2014年   210篇
  2013年   166篇
  2012年   759篇
  2011年   2267篇
  2010年   1094篇
  2009年   940篇
  2008年   664篇
  2007年   577篇
  2006年   440篇
  2005年   566篇
  2004年   516篇
  2003年   571篇
  2002年   270篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1997年   2篇
  1996年   1篇
排序方式: 共有9057条查询结果,搜索用时 0 毫秒
1.
Web proxy caches are used to reduce the strain of contemporary web traffic on web servers and network bandwidth providers. In this research, a novel approach to web proxy cache replacement which utilizes neural networks for replacement decisions is developed and analyzed. Neural networks are trained to classify cacheable objects from real world data sets using information known to be important in web proxy caching, such as frequency and recency. Correct classification ratios between 0.85 and 0.88 are obtained both for data used for training and data not used for training. Our approach is compared with Least Recently Used (LRU), Least Frequently Used (LFU) and the optimal case which always rates an object with the number of future requests. Performance is evaluated in simulation for various neural network structures and cache conditions. The final neural networks achieve hit rates that are 86.60% of the optimal in the worst case and 100% of the optimal in the best case. Byte-hit rates are 93.36% of the optimal in the worst case and 99.92% of the optimal in the best case. We examine the input-to-output mappings of individual neural networks and analyze the resulting caching strategy with respect to specific cache conditions.  相似文献   
2.
The paper presents sufficient conditions for modular (supervisory) control synthesis to equal global control synthesis. In modular control synthesis a supervisory control is synthesized for each module separately and the supervisory control consists of the parallel composition of the modular supervisory controls. The general case of the specification that is indecomposable and not necessarily contained in the plant language, which is often the case in practice, is considered. The usual assumption that all shared events are controllable is relaxed by introducing two new structural conditions relying on the global mutual controllability condition. The novel concept used as a sufficient structural condition is strong global mutual controllability. The main result uses a weaker condition called global mutual controllability together with local consistency of the specification. An example illustrates the approach.  相似文献   
3.
Control of frictional forces is required in many applications of tribology. While the problem is approached by chemical means traditionally, a recent approach was proposed to control the system mechanically to tune frictional responses. We design feedback control laws for a one-dimensional particle array sliding on a surface subject to friction. The Frenkel-Kontorova model describing the dynamics is a nonlinear interconnected system and the accessible control elements are average quantities only. We prove local stability of equilibrium points of the un-controlled system in the presence of linear and nonlinear particle interactions, respectively. We then formulate a tracking control problem, whose control objective is for the average system to reach a designated targeted velocity using accessible elements. Sufficient stabilization conditions are explicitly derived for the closed-loop error systems using the Lyapunov theory based methods. Simulation results show satisfactory performances. The results can be applied to other physical systems whose dynamics is described by the Frenkel-Kontorova model.  相似文献   
4.
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the communication graph is a tree. It is shown how the relation between tree graphs and the null space of the corresponding incidence matrix encode fundamental properties for these two multi-agent control problems.  相似文献   
5.
Hierarchical Interface-Based Supervisory Control employs interfaces that allow properties of a monolithic system to be verified through local analysis. By avoiding the need to verify properties globally, significant computational savings can be achieved. In this paper we provide local requirements for a multi-level architecture employing command-pair type interfaces. This multi-level architecture allows for a greater reduction in complexity and improved reconfigurability over the two-level case that has been previously studied since it allows the global system to be partitioned into smaller modules. This paper also provides results for synthesizing supervisors in the multi-level architecture that are locally maximally permissive with respect to a given specification and set of interfaces.  相似文献   
6.
This paper presents new a feature transformation technique applied to improve the screening accuracy for the automatic detection of pathological voices. The statistical transformation is based on Hidden Markov Models, obtaining a transformation and classification stage simultaneously and adjusting the parameters of the model with a criterion that minimizes the classification error. The original feature vectors are built up using classic short-term noise parameters and mel-frequency cepstral coefficients. With respect to conventional approaches found in the literature of automatic detection of pathological voices, the proposed feature space transformation technique demonstrates a significant improvement of the performance with no addition of new features to the original input space. In view of the results, it is expected that this technique could provide good results in other areas such as speaker verification and/or identification.  相似文献   
7.
All the various data hiding methods can be simply divided into two types: (1) the extracted important data are lossy, (2) the extracted important data are lossless. The proposed method belongs to the second type. In this paper, a module-based substitution method with lossless secret data compression function is used for concealing smoother area of secret image by modifying fewer pixels in the generated stego-image. Compared with the previous data hiding methods that extract lossless data, the generated stego-image by the proposed method is always with better quality, unless the hidden image is with very strong randomness.  相似文献   
8.
This paper presents a fast and online incremental solution for an appearance-based loop-closure detection problem in a dynamic indoor environment. Closing the loop in a dynamic environment has been an important topic in robotics for decades. Recently, PIRF-Nav has been reported as being successful in achieving high recall rate at precision 1. However, PIRF-Nav has three main disadvantages: (i) the computational expense of PIRF-Nav is beyond real-time, (ii) it utilizes a large amount of memory in the redundant process of keeping signatures of places, and (iii) it is ill-suited to an indoor environment. These factors hinder the use of PIRF-Nav in a general environment for long-term, high-speed mobile robotic applications. Therefore, this paper proposes two techniques: (i) new modified PIRF extraction that makes the system more suitable for an indoor environment and (ii) new dictionary management that can eliminate redundant searching and conserve memory consumption. The results show that our proposed method can complete tasks up to 12 times faster than PIRF-Nav with only a slight percentage decline in recall. In addition, we collected additional data from a university canteen crowded during lunch time. Even in this crowded indoor environment, our proposed method has better real-time processing performance compared with other methods.  相似文献   
9.
10.
In this paper, we study the effect of time delay on the spiking activity in Newman-Watts small-world networks of Hodgkin-Huxley neurons with non-Gaussian noise, and investigate how the non-Gaussian noise affects the delay-induced behaviors. It was found that, as the delay increases, the neuron spiking intermittently performs the most ordered and synchronized behavior when the delay lengths are integer multiples of the spiking periods, which shows multiple temporal resonances and spatial synchronizations, and reveals that the locking between the delay lengths and the spiking periods might be the mechanism behind the behaviors. It was also found that the delay-optimized spiking behaviors could be enhanced when non-Gaussian noise's deviation from the Gaussian noise is appropriate. These results show that time delay and non-Gaussian noise would cooperate to play more constructive and efficient roles in the information processing of neural networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号