首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2527篇
  免费   112篇
  国内免费   83篇
电工技术   268篇
综合类   56篇
化学工业   379篇
金属工艺   51篇
机械仪表   130篇
建筑科学   126篇
矿业工程   21篇
能源动力   269篇
轻工业   172篇
水利工程   10篇
石油天然气   33篇
武器工业   1篇
无线电   191篇
一般工业技术   182篇
冶金工业   12篇
原子能技术   14篇
自动化技术   807篇
  2024年   7篇
  2023年   27篇
  2022年   42篇
  2021年   53篇
  2020年   54篇
  2019年   60篇
  2018年   56篇
  2017年   69篇
  2016年   72篇
  2015年   83篇
  2014年   134篇
  2013年   161篇
  2012年   133篇
  2011年   235篇
  2010年   133篇
  2009年   194篇
  2008年   176篇
  2007年   144篇
  2006年   135篇
  2005年   123篇
  2004年   80篇
  2003年   102篇
  2002年   65篇
  2001年   51篇
  2000年   44篇
  1999年   43篇
  1998年   45篇
  1997年   30篇
  1996年   20篇
  1995年   23篇
  1994年   17篇
  1993年   21篇
  1992年   16篇
  1991年   11篇
  1990年   11篇
  1989年   16篇
  1988年   11篇
  1987年   7篇
  1986年   7篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1973年   1篇
排序方式: 共有2722条查询结果,搜索用时 15 毫秒
31.
We performed an empirical investigation of factors affecting an individual's decision to adopt anti-spyware software. Our results suggested that an individual's attitude, subjective norm, perceived behavioral control, and denial of responsibility significantly affected anti-spyware adoption intention. Also, relative advantage and compatibility showed a significant effect on attitude, visibility, and image on subjective norm, and trialability, self-efficacy, and computing capacity on perceived behavioral control. Interestingly, moral obligation, ease of use, and perceived cost were not as significant as was originally expected.  相似文献   
32.
Analysis of Two-Dimensional Non-Rigid Shapes   总被引:1,自引:0,他引:1  
Analysis of deformable two-dimensional shapes is an important problem, encountered in numerous pattern recognition, computer vision and computer graphics applications. In this paper, we address three major problems in the analysis of non-rigid shapes: similarity, partial similarity, and correspondence. We present an axiomatic construction of similarity criteria for deformation-invariant shape comparison, based on intrinsic geometric properties of the shapes, and show that such criteria are related to the Gromov-Hausdorff distance. Next, we extend the problem of similarity computation to shapes which have similar parts but are dissimilar when considered as a whole, and present a construction of set-valued distances, based on the notion of Pareto optimality. Finally, we show that the correspondence between non-rigid shapes can be obtained as a byproduct of the non-rigid similarity problem. As a numerical framework, we use the generalized multidimensional scaling (GMDS) method, which is the numerical core of the three problems addressed in this paper.  相似文献   
33.
Boundary control of nonlinear parabolic PDEs is an open problem with applications that include fluids, thermal, chemically-reacting, and plasma systems. In this paper we present stabilizing control designs for a broad class of nonlinear parabolic PDEs in 1-D. Our approach is a direct infinite dimensional extension of the finite-dimensional feedback linearization/backstepping approaches and employs spatial Volterra series nonlinear operators both in the transformation to a stable linear PDE and in the feedback law. The control law design consists of solving a recursive sequence of linear hyperbolic PDEs for the gain kernels of the spatial Volterra nonlinear control operator. These PDEs evolve on domains Tn of increasing dimensions n+1 and with a domain shape in the form of a “hyper-pyramid”, 0≤ξnξn−1?≤ξ1x≤1. We illustrate our design method with several examples. One of the examples is analytical, while in the remaining two examples the controller is numerically approximated. For all the examples we include simulations, showing blow up in open loop, and stabilization for large initial conditions in closed loop. In a companion paper we give a theoretical study of the properties of the transformation, showing global convergence of the transformation and of the control law nonlinear Volterra operators, and explicitly constructing the inverse of the feedback linearizing Volterra transformation; this, in turn, allows us to prove L2 and H1 local exponential stability (with an estimate of the region of attraction where possible) and explicitly construct the exponentially decaying closed loop solutions.  相似文献   
34.
Seong-Jin Park 《Automatica》2008,44(3):875-881
This paper addresses a supervisory control problem for uncertain timed discrete event systems (DESs) under partial observation. An uncertain timed DES to be controlled is represented by a set of possible timed models based on the framework of Brandin and Wonham [(1994). Supervisory control of timed discrete event systems. IEEE Transactions on Automatic Control, 39(2), 329-342]. To avoid the state space explosion problem caused by tick events in the timed models, a notion of eligible time bounds is proposed for a single timed model obtained from the set of all possible timed models. Based on this notion, we present the necessary and sufficient conditions for the existence of a robust supervisor achieving a given language specification for the single timed model. Moreover, we show that the robust supervisor can also achieve the specification for any timed model in the set.  相似文献   
35.
The paper presents sufficient conditions for modular (supervisory) control synthesis to equal global control synthesis. In modular control synthesis a supervisory control is synthesized for each module separately and the supervisory control consists of the parallel composition of the modular supervisory controls. The general case of the specification that is indecomposable and not necessarily contained in the plant language, which is often the case in practice, is considered. The usual assumption that all shared events are controllable is relaxed by introducing two new structural conditions relying on the global mutual controllability condition. The novel concept used as a sufficient structural condition is strong global mutual controllability. The main result uses a weaker condition called global mutual controllability together with local consistency of the specification. An example illustrates the approach.  相似文献   
36.
周永权  赵斌 《计算机科学》2008,35(7):122-125
泛函网络是近年提出的一种对神经网络的有效推广.与神经网络不同,它处理的是一般的泛函模型,它在各个神经元之间的连接没有权值,并且神经元函数不固定的,往往是一给定的基函数的组合,泛函网络学习的目的就是求出神经元函数的精确表达式或近似表达式. 迄今关于泛函网络神经元基函数的存在性和选取方法缺乏理论依据.文中基于Banach空间中偏序理论,分析了泛函网络神经元基函数的存在性,给出了泛函网络神经元基函数选取方法,对于完善泛函网络的基础理论具有参考价值.  相似文献   
37.
讨论用PDEs构建Hill密码的方法。以一阶线性非齐次双曲方程混合问题的形式给出加、解密问题的模型,由差分格式算法设计可用于加、解密的矩阵方程。改进的Hill密码系统中,矩阵变化多样、密钥空间大且便于传输和管理。用MatLab编制软件实现加、解过程并对部分结果进行分析。  相似文献   
38.
The partial oxidation of isobutene to methacrolein and methacrylic acid was studied on oxidic catalysts containing mainly a mixture of bismuth tungstate and iron-cobalt-potassium molybdate. Catalyst shaping was done by extrusion. The kinetic measurements were performed by monitoring the gas-phase composition along the length of a fixed bed of catalyst. The reactor was treated as an isothermal plug-flow system. The network of parallel and consecutive reactions taking place in this system can be described by a simplified scheme. It is possible to predict the gas-phase composition prevailing in the reactor using five different kinetic parameters. In the temperature range 380<<420°C grain selectivities as high as 85% combined with yields of methacrolein and methacrylic acid about 72% at 92% conversion were obtained.  相似文献   
39.
The algebraic nonlinearity of an n-bit boolean function is defined as the degree of the polynomial f(X) Z 2[x 1, x 2,..., x n] that represents f. We prove that the average degree of an ANF polynomial for an n-bit function is n+o(1). Further, for a balanced n-bit function, any subfunction obtained by holding less than n-[log n]- 1 bits constant is also expected to be nonaffine. A function is partially linear if f(X) has some indeterminates that only occur in terms bounded by degree 1. Boolean functions which can be mapped to partially linear functions via a linear transformation are said to have a linear structure, and are a potentially weak class of functions for cryptography. We prove that the number of n-bit functions that have a linear structure is asymptotic .The author is presently employed by the Distributed System Technology Center, Brisbane, Australia.Project sponsored in part by NSERC operating Grant OGP0121648, and the National Security Agency under Grant Number MDA904-91-H-0012. The United States Government is authorized to reproduce and distribute reprints notwithstanding any copyright notation hereon.  相似文献   
40.
The technological, economic, and environmental benefits of photovoltaic (PV) systems have led to their widespread adoption in recent years as a source of electricity generation. However, precisely identifying a PV system''s maximum power point (MPP) under normal and shaded weather conditions is crucial to conserving the maximum generated power. One of the biggest concerns with a PV system is the existence of partial shading, which produces multiple peaks in the P–V characteristic curve. In these circumstances, classical maximum power point tracking (MPPT) approaches are prone to getting stuck on local peaks and failing to follow the global maximum power point (GMPP). To overcome such obstacles, a new Lyapunov-based Robust Model Reference Adaptive Controller (LRMRAC) is designed and implemented to reach GMPP rapidly and ripple-free. The proposed controller also achieves MPP accurately under slow, abrupt and rapid changes in radiation, temperature and load profile. Simulation and OPAL-RT real-time simulators in various scenarios are performed to verify the superiority of the proposed approach over the other state-of-the-art methods, i.e., ANFIS, INC, VSPO, and P&O. MPP and GMPP are accomplished in less than 3.8 ms and 10 ms, respectively. Based on the results presented, the LRMRAC controller appears to be a promising technique for MPPT in a PV system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号