首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   608篇
  免费   26篇
  国内免费   2篇
电工技术   15篇
综合类   1篇
化学工业   137篇
金属工艺   22篇
机械仪表   22篇
建筑科学   30篇
能源动力   31篇
轻工业   74篇
水利工程   3篇
石油天然气   13篇
无线电   48篇
一般工业技术   105篇
冶金工业   23篇
原子能技术   2篇
自动化技术   110篇
  2024年   6篇
  2023年   11篇
  2022年   23篇
  2021年   50篇
  2020年   25篇
  2019年   17篇
  2018年   39篇
  2017年   24篇
  2016年   19篇
  2015年   15篇
  2014年   33篇
  2013年   35篇
  2012年   18篇
  2011年   34篇
  2010年   28篇
  2009年   31篇
  2008年   29篇
  2007年   22篇
  2006年   18篇
  2005年   16篇
  2004年   15篇
  2003年   10篇
  2002年   12篇
  2001年   10篇
  2000年   5篇
  1999年   7篇
  1998年   9篇
  1997年   5篇
  1996年   6篇
  1994年   7篇
  1993年   7篇
  1992年   7篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   3篇
  1987年   4篇
  1986年   4篇
  1985年   7篇
  1984年   3篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
  1975年   3篇
  1974年   1篇
  1967年   1篇
排序方式: 共有636条查询结果,搜索用时 15 毫秒
41.
Modeling and Analysis of Workflows Using Petri Nets   总被引:37,自引:0,他引:37  
A workflow system, in its general form, is basically a heterogeneous and distributed information system where the tasks are performed using autonomous systems. Resources, such as databases, labor, etc. are typically required to process these tasks. Prerequisite to the execution of a task is a set of constraints that reflect the applicable business rules and user requirements.In this paper we present a Petri Net (PN) based framework that (1) facilitates specification of workflow applications, (2) serves as a powerful tool for modeling the system under study at a conceptual level, (3) allows for a smooth transition from the conceptual level to a testbed implementation and (4) enables the analysis, simulation and validation of the system under study before proceeding to implementation. Specifically, we consider three categories of task dependencies: control flow, value and external (temporal).We identify several structural properties of PN and demonstrate their use for conducting the following type of analyses: (1) identify inconsistent dependency specifications among tasks; (2) test for workflow safety, i.e. test whether the workflow terminates in an acceptable state; (3) for a given starting time, test whether it is feasible to execute a workflow with the specified temporal constraints. We also provide an implementation for conducting the above analyses.  相似文献   
42.
A field theory is constructed in the context of parameterized absolute parallelism geometry. The theory is shown to be a pure gravity one. It is capable of describing the gravitational field and a material distribution in terms of the geometric structure of the geometry used (the parallelization vector fields). Three tools are used to attribute physical properties to the geometric objects admitted by the theory. Poisson and Laplace equations are obtained in the linearized version of the theory. The spherically symmetric solution of the theory, in free space, is found to coincide with the Schwarzschild exterior solution of general relativity. The theory respects the weak equivalence principle in free space only. Gravity and the material distribution are not minimally coupled.  相似文献   
43.
This paper presents a new adaptive neuro-sliding mode control for gantry crane as varying rope length. This control method derived from combining the sliding surfaces of three subsystem of the gantry crane (trolley position, rope length, anti-swing) to draw out two system sliding surfaces: the trolley position with the anti-swing and the rope length and the anti-swing. On the based of the sliding mode control principle, drawn out the equivalent controller and the switching controller for gantry crane. But due to the uncertain parameters-nonlinear model of gantry crane with the bound disturbances, combining the neural approximate method, defined the neural controller and the compensation controller for the difference between the equivalent controller and the neural controller for two system control inputs: trolley position and rope length. The adaptive control laws for these controllers were deduced from Lyapunov’s stable criteria to asymptotically stabilize the sliding surfaces. Simulation studies are performed to illustrate the effectiveness of the proposed control.  相似文献   
44.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling.  相似文献   
45.
Theoretical calculations are presented to optimize modulation period for maximum total peak capacity in comprehensive two-dimensional HPLC (2D-HPLC) taking into account the effect of modulation on the apparent peak capacity of the first-dimension (1D) separation. Results indicate that modulation periods are most favorable when they are adjusted to approximately 2.2-4 times the standard deviation of a 1D peak in order to avoid excessively short run times at the second dimension (2D). Data are presented that effective peak capacities of several thousand in 60 min can be expected for practical 2D-HPLC conditions, utilizing 1D gradient elution followed by 2D isocratic elution, that remain at approximately 50-70% of the theoretical maximum peak capacity. This work suggests that lower modulation frequencies and longer 2D separation times than previously proposed are favorable under realistic chromatographic conditions, alleviating some practical problems associated with 2D-HPLC.  相似文献   
46.
47.
This paper addresses the problem of scheduling the timing and quantities of production of n different products over m periods for a single production facility with a prespecified capacity. We assume that the demand is deterministic and can vary from one period to another and from one product to another. The objective is to minimize the sum of production setup and inventory holding costs. For medium-size problems, optimal solution algorithms do not yet exist and therefore heuristic solution algorithms are of interest. Most of the existing heuristics make use of the “forward-pass” concept in one way or the other. Forward pass means we begin by determining the lot sizes for earlier periods before moving to study the later periods. In this paper we study the forward-pass approach as well as a different solution approach which we call the four-step algorithm. We develop the feasibility conditions for pure forward-pass algorithms. Finally, we perform a comparative evaluation study.  相似文献   
48.
49.
Opportunistic networking enables users to communicate in an environment where connectivity is intermittent or unstable. However, such networking scheme assumes that mobile nodes voluntary cooperate, which cannot be guaranteed. Some nodes can simply exhibit selfish behavior and thus diminish the effectiveness of the approach. In this paper, a game scenario is formulated in which the nodes try to convince each other to participate in packets forwarding. Each node is considered as a player in this game. When a node comes in the communication range of another, a bargaining game starts between them as part of the message forwarding process. Both players try to have a mutual agreement on a price for message forwarding. We present a new incentive mechanism called evolutionary bargaining‐based incentive scheme (EBIS) to motivate selfish nodes to cooperate in data forwarding. In EBIS, a node negotiates with other nodes to obtain an agreeable amount of credit for its forwarding service. Nodes apply a sequential bargaining game and then adapt their strategies using an evolutionary model to maximize the probability of reaching an agreement. Unlike classical bargaining games, nodes in our model are boundedly rational. In addition, we use the evolutionary stable strategy (ESS) concept to determine the adaptive strategies for the nodes. The comparison of EBIS with a benchmarked model demonstrates that EBIS performs better in terms of packet delivery ratio and average latency.  相似文献   
50.
Telecommunication Systems - In the era of Internet-of-things (IoT), the future 5G networks are supposed to provide ubiquitous connectivity, high speed, as well as low latency and energy efficiency...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号