首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   404篇
  免费   36篇
  国内免费   53篇
电工技术   9篇
综合类   27篇
化学工业   7篇
金属工艺   3篇
机械仪表   20篇
建筑科学   4篇
矿业工程   5篇
能源动力   3篇
轻工业   7篇
石油天然气   3篇
无线电   63篇
一般工业技术   12篇
原子能技术   1篇
自动化技术   329篇
  2024年   6篇
  2023年   7篇
  2022年   9篇
  2021年   7篇
  2020年   4篇
  2019年   8篇
  2018年   13篇
  2017年   9篇
  2016年   13篇
  2015年   21篇
  2014年   21篇
  2013年   29篇
  2012年   32篇
  2011年   25篇
  2010年   30篇
  2009年   26篇
  2008年   33篇
  2007年   32篇
  2006年   26篇
  2005年   17篇
  2004年   16篇
  2003年   18篇
  2002年   5篇
  2001年   11篇
  2000年   12篇
  1999年   7篇
  1998年   1篇
  1997年   8篇
  1996年   15篇
  1995年   6篇
  1994年   9篇
  1993年   1篇
  1992年   3篇
  1991年   2篇
  1990年   3篇
  1989年   4篇
  1985年   1篇
  1983年   1篇
  1982年   2篇
排序方式: 共有493条查询结果,搜索用时 15 毫秒
151.
基于UML活动图化简方法的工作流模型校核研究   总被引:2,自引:0,他引:2       下载免费PDF全文
针对开放、响应型系统建模UML活动图表现优良的特性,UML活动图在工作流建模领域也引起了人们的极大关注。然而相关的研究仅仅起步,特别是针对相应的模型校核技术更是研究甚少。该文提出了基于UML活动图化简方法的工作流模型校核技术,在UML活动图到活动超图映射基础之上,对活动超图建立化简规则,通过化简实现工作流模型校核。实践证明此方法有效。  相似文献   
152.
刘洪辉 《计算机工程》2006,32(16):63-65
最大频繁事件序列挖掘是数据挖掘中重要的研究课题之一。该文提出了一种新的挖掘用户行为模式的算法。该算法采用位图索引表的数据格式,使用一种有效的基于前缀树的频繁事件序列扩展方法,结合有效的剪枝技术,明显地加速了最大频繁事件序列的生成。  相似文献   
153.
本文应用有向超图理论提出了线性系统不定参数矩阵Y的一般k阶余因式Y(ii)的两个k超连接表达式,并根据它导出了Y(ii)的一个分解定理。应用该定理容易对任意线性大系统进行多层撕裂和分析。这是一种新的多层拓扑分析方法,它可以扩大一台计算机所能拓扑分析的系统规模。  相似文献   
154.
Network extraction from sandstone and carbonate pore space images   总被引:2,自引:1,他引:1  
A methodology for extracting networks from pore space images is presented. It computes the location and sizes of pores and throats to create a topologically equivalent representation of the void space of three-dimensional (3D) rock images, using the concept of maximal balls [Silin, D.B., Jin, G. and Patzek, T.W., 2003. Robust Determination of the Pore Space Morphology in Sedimentary rocks. SPE 84296, Annual Technical Conference and Exhibition, Denver, Colorado, USA, October.]. The model is successfully tested on sandstone and carbonate samples. The network extracted from a representation of Fontainebleau sandstone yielded a coordination number distribution that agrees well with that computed using a different extraction algorithm that is based on knowing the location of grain centers [Øren, P. and Bakke, S., 2003. Reconstruction of Berea sandstone and pore-scale modelling of wettability effects. Journal of Petroleum Science and Engineering 39 177–199.]. The model was further tested on a carbonate sample from subsurface Oman for which it is not possible to identify grains easily. For all the samples investigated in this study, the predicted absolute permeabilities, using the newly extracted networks, agree well with the laboratory measured values.  相似文献   
155.
The resequencing problem is encountered in many practical information systems such as distributed database and communication networks. In these systems customers, such as messages in a computer network, have to be delivered to users in their original order. Therefore, those customers which become out of order due to the randomness of the system are forced to wait in a resequencing buffer so that their delivered order can be guaranteed. The previous work on the resequencing problem mainly concentrated on the delay aspect. From both theoretical and practical viewpoints, however, the queue length characteristics of the resequencing buffer are also significant. We consider the queue length distribution of the resequencing buffer fed by a homogeneous M/M/2 queue. The exact analysis is carried out for the probability mass functions of the queue length in equilibrium and the maximal occupancy which corresponds to the queue length just before the departure instants of customers from the resequencing buffer.  相似文献   
156.
Finite-dimensional estimation Lie algebras play a crucial role in the study of finite-dimensional filters for partially observed stochastic process. When the dynamics noise is Gaussian we can characterize the so-called estimation Lie algebras with maximal rank in terms of the observation functions (necessarily affine) and the drift (necessarily a sum of a skew-symmetric linear term and a gradient vector field, with a functional relationship), under the assumption that the estimation algebra has one and only one operator of order greater or equal to two in any of its basis.  相似文献   
157.
Johan Jeuring 《Algorithmica》1994,11(2):146-184
A theory for the derivation of on-line algorithms is presented. The algorithms are derived in the Bird-Meertens calculus for program transformations. This calculus provides a concise functional notation for algorithms, and a few powerful theorems for proving equalities of functions. The theory for the derivation of on-line algorithms is illustrated with the derivation of an algorithm for finding palindromes.An on-line linear-time random access machine (RAM) algorithm for finding the longest palindromic substring in a string is derived. For the purpose of finding the longest palindromic substring, all maximal palindromic substrings are computed. The list of maximal palindromes obtained in the computation of the longest palindrome can be used for other purposes such as finding the largest palindromic rectangle in a matrix and finding the shortest partition of a string into palindromes.This research was supported by the Dutch organization for scientific research NWO, under NFI project STOP, project number NF 62/63-518.  相似文献   
158.
Acyclic databases possess several desirable properties for their design and use.A distributed algorithm is proposed for determining a minimal cover of an alpha-,beta-,gamma-,or Berge-acyclic database scheme over a set of attributes in a distributed environment.  相似文献   
159.
本文提出了MVD超图的概念,给出了正向MVD超图、逆向MVD超图的定义。深入讨论了逆向MVD超图、逆向准路(结点)、可人发准路结点、不可分准路结点及最小不可分准路结点等。在此基础上,给出了求解最小不可分结点的闭包算法。  相似文献   
160.
This paper considers uncertain constrained systems, and develops two algorithms for computing a probabilistic output admissible (POA) set which is a set of initial states probabilistically assured to satisfy the constraint. The first algorithm is inspired by an existing randomized sequential technique. The second algorithm alleviates the computational effort based on heuristics. The present algorithms terminate in a finite number of iterations and provide a POA set. Additionally, we can obtain information on the size of the resulting set a posteriori. A numerical simulation demonstrates the applicability of the POA set to a control system design scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号