首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   670篇
  免费   31篇
电工技术   12篇
化学工业   123篇
金属工艺   29篇
机械仪表   16篇
建筑科学   4篇
矿业工程   4篇
能源动力   33篇
轻工业   14篇
水利工程   1篇
石油天然气   17篇
无线电   58篇
一般工业技术   166篇
冶金工业   34篇
原子能技术   33篇
自动化技术   157篇
  2022年   18篇
  2021年   27篇
  2020年   13篇
  2019年   13篇
  2018年   21篇
  2017年   15篇
  2016年   21篇
  2015年   14篇
  2014年   26篇
  2013年   59篇
  2012年   37篇
  2011年   44篇
  2010年   32篇
  2009年   35篇
  2008年   35篇
  2007年   40篇
  2006年   28篇
  2005年   24篇
  2004年   26篇
  2003年   26篇
  2002年   23篇
  2001年   14篇
  2000年   5篇
  1999年   8篇
  1998年   18篇
  1997年   9篇
  1996年   7篇
  1995年   10篇
  1994年   4篇
  1993年   4篇
  1992年   3篇
  1991年   6篇
  1990年   3篇
  1987年   2篇
  1986年   1篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1979年   1篇
  1977年   3篇
  1976年   4篇
  1974年   3篇
  1973年   1篇
  1965年   1篇
  1963年   1篇
  1962年   1篇
  1959年   1篇
  1954年   1篇
排序方式: 共有701条查询结果,搜索用时 0 毫秒
11.
We consider an underactuated two‐link robot called the inertia wheel pendulum. The system consists of a free planar rotational pendulum and a symmetric disk attached to its end, which is directly controlled by a DC‐motor. The goal is to create stable oscillations of the pendulum, which is not directly actuated. We exploit a recently proposed feedback‐control design strategy based on motion planning via virtual holonomic constraints. This strategy is shown to be useful for design of regulators for achieving orbitally exponentially stable oscillatory motions. The main contribution is a step‐by‐step procedure on how to achieve oscillations with pre‐specified amplitude from a given range and an arbitrary independently chosen period. The theoretical results are verified via experiments with a real hardware setup. Copyright © 2009 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
12.
13.
Following calls to advance the integration of risk and business process modeling paradigms, this paper formalizes the process of incorporating risk into business process models through the principles of Value-Focused Process Engineering (VFPE). In doing so, the paper aims to extend the existing VFPE modeling notation to reflect a set of necessary constructs required to adequately represent risk in goal-oriented business-process models. The extended set of constructs is proposed to support a formal systems view of process-based risk. Process-based risk is formalized on the one hand, as a product of complex interactions between activity-based elements, and on the other hand, as a natural component of the value creation mechanism of an elementary function or a complex process. The proposed risk-aware VFPE formalism also formulates rules for decomposing risk in process models according to the organizational values, thereby enabling better risk visibility, reducing process complexity, and ensuring continuity of business processes.  相似文献   
14.
Numerically finding stabilising feedback control laws for linear systems of periodic differential equations is a nontrivial task with no known reliable solutions. The most successful method requires solving matrix differential Riccati equations with periodic coefficients. All previously proposed techniques for solving such equations involve numerical integration of unstable differential equations and consequently fail whenever the period is too large or the coefficients vary too much. Here, a new method for numerical computation of stabilising solutions for matrix differential Riccati equations with periodic coefficients is proposed. Our approach does not involve numerical solution of any differential equations. The approximation for a stabilising solution is found in the form of a trigonometric polynomial, matrix coefficients of which are found solving a specially constructed finite-dimensional semidefinite programming (SDP) problem. This problem is obtained using maximality property of the stabilising solution of the Riccati equation for the associated Riccati inequality and sampling technique. Our previously published numerical comparisons with other methods shows that for a class of problems only this technique provides a working solution. Asymptotic convergence of the computed approximations to the stabilising solution is proved below under the assumption that certain combinations of the key parameters are sufficiently large. Although the rate of convergence is not analysed, it appeared to be exponential in our numerical studies.  相似文献   
15.
In the study of data exchange one usually assumes an open-world semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only moves ‘as much data as needed’ from the source to the target to satisfy constraints of a schema mapping. It avoids some of the problems exhibited by the open-world semantics, but limits the expressivity of schema mappings. Here we propose a mixed approach: one can designate different attributes of target schemas as open or closed, to combine the additional expressivity of the open-world semantics with the better behavior of query answering in closed worlds. We define such schema mappings, and show that they cover a large space of data exchange solutions with two extremes being the known open and closed-world semantics. We investigate the problems of query answering and schema mapping composition, and prove two trichotomy theorems, classifying their complexity based on the number of open attributes. We find conditions under which schema mappings compose, extending known results to a wide range of closed-world mappings. We also provide results for restricted classes of queries and mappings guaranteeing lower complexity.  相似文献   
16.
Real-time 2D to 3D video conversion   总被引:1,自引:0,他引:1  
We present a real-time implementation of 2D to 3D video conversion using compressed video. In our method, compressed 2D video is analyzed by extracting motion vectors. Using the motion vector maps, depth maps are built for each frame and the frames are segmented to provide object-wise depth ordering. These data are then used to synthesize stereo pairs. 3D video synthesized in this fashion can be viewed using any stereoscopic display. In our implementation, anaglyph projection was selected as the 3D visualization method, because it is mostly suited to standard displays.
Ianir IdesesEmail:
  相似文献   
17.
Novel universal method for measurement of the condensation coefficient α is developed. Using this method, noticeable difference between measured (α≈0.8) and expected (α≈1) values of the condensation coefficient for sputtered Cr atoms was revealed for the first time. The effect is assumed to be a result of considerable elevation of the surface temperature during atomic condensation induced by the energy delivered to the condensation surface by sputtered atoms and from the plasma.  相似文献   
18.
La3Ga5.5Ta0.5O14 crystal recently attracted more attention due to its superior electromechanical properties and high Q × f product. We report that the first electron-beam-induced current experiment on La3Ga5.5Ta0.5O14 single crystal. This method is employed to study the effect of the crystal's grain boundary on the incident electron beam. The experimental results clearly show that when the electron beam scans over the grain boundary of the crystal, a fraction of the carriers recombine at the grain boundary and is unavailable for the current generation. This recombination rate will be enhanced when the electron beam was close to the boundary and cause a dip in the collected current. Although the crystal is an insulator, this effect still can be observed if the coating metal is proper to be chosen. It is also pointed out that the different diffusion lengths of the crystal might be due to the tilted grain boundary.  相似文献   
19.
We report remote detections of physically buried specularly reflecting objects using microwave radar at two sites: Ashalim and Tseelim in the northern region of the Negev Desert, Israel. These detections provide confirmation that microwave subsurface remote sensing is a genuine phenomenon. At Ashalim, a scatterometer operating in the P-band (441 MHz, 68 cm) was mounted on a cherry picker truck at a height of 8 m and used to detect two triangular aluminum mesh reflectors (forming a 1-m square area reflector) buried down to a depth of 8 cm in dry sand. At Tseelim, the same scatterometer was mounted on an airplane flying at an altitude of 70 m and used to detect 1-m square aluminum reflectors (each one submerged at a different location along the airplane flight path) buried down to a depth of 20 cm. The experimental results compare favorably with a theoretical model that incorporates radar absorption effects arising in the sandy subsurface layer and radar interference effects arising from phase differences between reflections from the surface and buried reflector. The theoretical modeling also predicts the detection of a subsurface reflector down to a depth of about 4.4 m. This experiment and the associated modeling approach is the first of a series of planned experiments, which we outline for the detection and the theoretical evaluation of buried reflectors using remote microwave and VHF radar. We identify potential subject areas for environmental research.  相似文献   
20.
The problem of the continuous-time H fixed-lag smoothing over the infinite horizon is studied. The first solution to the problem is derived in terms of one algebraic Riccati equation of the same dimension as in the filtering case and the mechanism by which the performance improvements with respect to the H filtering occur is clarified. It is shown that the H smoother exploits the information preview in an “H2 manner”.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号