全文获取类型
收费全文 | 656篇 |
免费 | 38篇 |
专业分类
电工技术 | 13篇 |
化学工业 | 165篇 |
金属工艺 | 5篇 |
机械仪表 | 3篇 |
建筑科学 | 18篇 |
矿业工程 | 2篇 |
能源动力 | 21篇 |
轻工业 | 83篇 |
水利工程 | 10篇 |
石油天然气 | 7篇 |
无线电 | 92篇 |
一般工业技术 | 92篇 |
冶金工业 | 42篇 |
自动化技术 | 141篇 |
出版年
2024年 | 2篇 |
2023年 | 14篇 |
2022年 | 21篇 |
2021年 | 35篇 |
2020年 | 23篇 |
2019年 | 15篇 |
2018年 | 23篇 |
2017年 | 21篇 |
2016年 | 18篇 |
2015年 | 17篇 |
2014年 | 18篇 |
2013年 | 56篇 |
2012年 | 43篇 |
2011年 | 48篇 |
2010年 | 35篇 |
2009年 | 28篇 |
2008年 | 35篇 |
2007年 | 31篇 |
2006年 | 26篇 |
2005年 | 21篇 |
2004年 | 20篇 |
2003年 | 14篇 |
2002年 | 17篇 |
2001年 | 7篇 |
2000年 | 3篇 |
1999年 | 8篇 |
1998年 | 19篇 |
1997年 | 10篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 9篇 |
1992年 | 3篇 |
1990年 | 2篇 |
1989年 | 4篇 |
1986年 | 4篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1978年 | 1篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1975年 | 3篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1968年 | 1篇 |
1967年 | 1篇 |
1966年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有694条查询结果,搜索用时 0 毫秒
1.
Jan Ramon Daan Fierens Fabián Güiza Geert Meyfroidt 《Advanced Engineering Informatics》2007,21(3):243-256
In this paper we describe the application of data mining methods for predicting the evolution of patients in an intensive care unit. We discuss the importance of such methods for health care and other application domains of engineering. We argue that this problem is an important but challenging one for the current state of the art data mining methods and explain what improvements on current methods would be useful. We present a promising study on a preliminary data set that demonstrates some of the possibilities in this area. 相似文献
2.
Ramon R. Costa Liu Hsu 《International Journal of Adaptive Control and Signal Processing》1992,6(1):19-33
A variable structure model reference adaptive controller (VS-MRAC) using only input and output measurements was recently proposed and shown to be globally asymptotically stable with superior transient behaviour and disturbance rejection properties. In this paper a singular perturbation approach is used in order to establish the robustness of the controller in the presence of unmodelled dynamics (parasitics) and disturbances. We develop a new Lyapunov-based technique to analyse the overall system and show that for sufficiently small parasitics the system remains stable and the output error is small in some sense. 相似文献
3.
In this paper we develop and compare several heuristic methods for solving the general two-dimensional cutting stock problem.
We follow the Gilmore-Gomory column generation scheme in which at each iteration a new cutting pattern is obtained as the
solution of a subproblem on one stock sheet. For solving this subproblem, in addition to classical dynamic programming, we
have developed three heuristic procedures of increasing complexity, based on GRASP and Tabu Search techniques, producing solutions
differing in quality and in time requirements. In order to obtain integer solutions from the fractional solutions of the Gilmore-Gomory
process, we compare three rounding procedures, rounding up, truncated branch and bound and the solution of a residual problem.
We have coded and tested all the combinations of algorithms and rounding procedures. The computational results obtained on
a set of randomly generated test problems show their relative efficiency and allow the potential user to choose from among
them, according to the available computing time.
Rceived: January 9, 2001 / Accepted: December 10, 2001 相似文献
4.
Ramon Codina 《Computer Methods in Applied Mechanics and Engineering》1993,110(3-4):237-262
The objective of this paper is to analyse an iterative procedure for the finite element solution of the Stokes and Navier-Stokes stationary problems. For the latter case, the usual condition on the viscosity and the data that ensures uniqueness is assumed. The method is based on the iterative imposition of the incompressibility condition via penalization. Theoretical and numerical results show that this constraint can be approximated iteratively within the same iterative loop used to deal with the nonlinear term of the equations. Two particular iterative schemes are analysed, namely those based on the Picard and Newton-Raphson algorithms. 相似文献
5.
Because of the rapid changes in saturation which take place in the immediate vicinity of a displacement front, it is not possible to estimate relative permeabilities over the entire saturation range of interest when using the external-drive method. It is demonstrated in this study that this limitation can be removed, if data from an unstabilized and/ or unstable displacement are used. Furthermore, it is shown that use of such data is permissible, provided: (a) saturation profiles and pressure gradients in both phases can be measured directly; (b) the external-drive theory is modified to account for the existence of capillary pressure gradients; and (c) the analysis is carried out from a Lagrangian rather than a Eulerian point of view.A comparison of relative permeabilities obtained by using the Lagrangian method with those obtained using the conventional (without capillary pressure term) and the modified (with the capillary pressure term) Eulerian methods was undertaken to demonstrate the effect of the neglect of the capillary pressure term on relative permeabilities. Also investigated in this study was the impact of instability on the relative permeability and capillary pressure curves for unstable displacements and the effect of instability on the saturation profiles, fractional flow curves and the residual oil saturation. In addition, the effect of instability on the residual oil saturation was studied. 相似文献
6.
Abraham Martín-Campillo Jon Crowcroft Eiko Yoneki Ramon Martí 《Journal of Network and Computer Applications》2013,36(2):870-880
Forwarding data in scenarios where devices have sporadic connectivity is a challenge. An example scenario is a disaster area, where forwarding information generated in the incident location, like victims' medical data, to a coordination point is critical for quick, accurate and coordinated intervention. New applications are being developed based on mobile devices and wireless opportunistic networks as a solution to destroyed or overused communication networks. But the performance of opportunistic routing methods applied to emergency scenarios is unknown today. In this paper, we compare and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them. 相似文献
7.
8.
9.
A polynomial time computable metric between point sets 总被引:4,自引:0,他引:4
Measuring the similarity or distance between sets of points in a metric space is an important problem in machine learning
and has also applications in other disciplines e.g. in computational geometry, philosophy of science, methods for updating
or changing theories, . Recently Eiter and Mannila have proposed a new measure which is computable in polynomial time. However, it is not a distance
function in the mathematical sense because it does not satisfy the trian gle inequality. We introduce a new measure which
is a metric while being computable in polynomial time. We also present a variant which computes a normalised metric and a
variant which can associate different weights with the points in the set.
Received: 18 October 1999 / 8 January 2001 相似文献
10.