首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   656篇
  免费   38篇
电工技术   13篇
化学工业   165篇
金属工艺   5篇
机械仪表   3篇
建筑科学   18篇
矿业工程   2篇
能源动力   21篇
轻工业   83篇
水利工程   10篇
石油天然气   7篇
无线电   92篇
一般工业技术   92篇
冶金工业   42篇
自动化技术   141篇
  2024年   2篇
  2023年   14篇
  2022年   21篇
  2021年   35篇
  2020年   23篇
  2019年   15篇
  2018年   23篇
  2017年   21篇
  2016年   18篇
  2015年   17篇
  2014年   18篇
  2013年   56篇
  2012年   43篇
  2011年   48篇
  2010年   35篇
  2009年   28篇
  2008年   35篇
  2007年   31篇
  2006年   26篇
  2005年   21篇
  2004年   20篇
  2003年   14篇
  2002年   17篇
  2001年   7篇
  2000年   3篇
  1999年   8篇
  1998年   19篇
  1997年   10篇
  1996年   6篇
  1995年   2篇
  1994年   3篇
  1993年   9篇
  1992年   3篇
  1990年   2篇
  1989年   4篇
  1986年   4篇
  1984年   2篇
  1983年   2篇
  1981年   4篇
  1980年   3篇
  1978年   1篇
  1977年   3篇
  1976年   4篇
  1975年   3篇
  1972年   1篇
  1971年   2篇
  1968年   1篇
  1967年   1篇
  1966年   1篇
  1964年   1篇
排序方式: 共有694条查询结果,搜索用时 0 毫秒
1.
In this paper we describe the application of data mining methods for predicting the evolution of patients in an intensive care unit. We discuss the importance of such methods for health care and other application domains of engineering. We argue that this problem is an important but challenging one for the current state of the art data mining methods and explain what improvements on current methods would be useful. We present a promising study on a preliminary data set that demonstrates some of the possibilities in this area.  相似文献   
2.
A variable structure model reference adaptive controller (VS-MRAC) using only input and output measurements was recently proposed and shown to be globally asymptotically stable with superior transient behaviour and disturbance rejection properties. In this paper a singular perturbation approach is used in order to establish the robustness of the controller in the presence of unmodelled dynamics (parasitics) and disturbances. We develop a new Lyapunov-based technique to analyse the overall system and show that for sufficiently small parasitics the system remains stable and the output error is small in some sense.  相似文献   
3.
In this paper we develop and compare several heuristic methods for solving the general two-dimensional cutting stock problem. We follow the Gilmore-Gomory column generation scheme in which at each iteration a new cutting pattern is obtained as the solution of a subproblem on one stock sheet. For solving this subproblem, in addition to classical dynamic programming, we have developed three heuristic procedures of increasing complexity, based on GRASP and Tabu Search techniques, producing solutions differing in quality and in time requirements. In order to obtain integer solutions from the fractional solutions of the Gilmore-Gomory process, we compare three rounding procedures, rounding up, truncated branch and bound and the solution of a residual problem. We have coded and tested all the combinations of algorithms and rounding procedures. The computational results obtained on a set of randomly generated test problems show their relative efficiency and allow the potential user to choose from among them, according to the available computing time. Rceived: January 9, 2001 / Accepted: December 10, 2001  相似文献   
4.
The objective of this paper is to analyse an iterative procedure for the finite element solution of the Stokes and Navier-Stokes stationary problems. For the latter case, the usual condition on the viscosity and the data that ensures uniqueness is assumed. The method is based on the iterative imposition of the incompressibility condition via penalization. Theoretical and numerical results show that this constraint can be approximated iteratively within the same iterative loop used to deal with the nonlinear term of the equations. Two particular iterative schemes are analysed, namely those based on the Picard and Newton-Raphson algorithms.  相似文献   
5.
Because of the rapid changes in saturation which take place in the immediate vicinity of a displacement front, it is not possible to estimate relative permeabilities over the entire saturation range of interest when using the external-drive method. It is demonstrated in this study that this limitation can be removed, if data from an unstabilized and/ or unstable displacement are used. Furthermore, it is shown that use of such data is permissible, provided: (a) saturation profiles and pressure gradients in both phases can be measured directly; (b) the external-drive theory is modified to account for the existence of capillary pressure gradients; and (c) the analysis is carried out from a Lagrangian rather than a Eulerian point of view.A comparison of relative permeabilities obtained by using the Lagrangian method with those obtained using the conventional (without capillary pressure term) and the modified (with the capillary pressure term) Eulerian methods was undertaken to demonstrate the effect of the neglect of the capillary pressure term on relative permeabilities. Also investigated in this study was the impact of instability on the relative permeability and capillary pressure curves for unstable displacements and the effect of instability on the saturation profiles, fractional flow curves and the residual oil saturation. In addition, the effect of instability on the residual oil saturation was studied.  相似文献   
6.
Forwarding data in scenarios where devices have sporadic connectivity is a challenge. An example scenario is a disaster area, where forwarding information generated in the incident location, like victims' medical data, to a coordination point is critical for quick, accurate and coordinated intervention. New applications are being developed based on mobile devices and wireless opportunistic networks as a solution to destroyed or overused communication networks. But the performance of opportunistic routing methods applied to emergency scenarios is unknown today. In this paper, we compare and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them.  相似文献   
7.
8.
9.
A polynomial time computable metric between point sets   总被引:4,自引:0,他引:4  
Measuring the similarity or distance between sets of points in a metric space is an important problem in machine learning and has also applications in other disciplines e.g. in computational geometry, philosophy of science, methods for updating or changing theories, . Recently Eiter and Mannila have proposed a new measure which is computable in polynomial time. However, it is not a distance function in the mathematical sense because it does not satisfy the trian gle inequality. We introduce a new measure which is a metric while being computable in polynomial time. We also present a variant which computes a normalised metric and a variant which can associate different weights with the points in the set. Received: 18 October 1999 / 8 January 2001  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号