全文获取类型
收费全文 | 305篇 |
免费 | 8篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 35篇 |
金属工艺 | 4篇 |
机械仪表 | 8篇 |
建筑科学 | 26篇 |
能源动力 | 13篇 |
轻工业 | 34篇 |
水利工程 | 1篇 |
无线电 | 32篇 |
一般工业技术 | 25篇 |
冶金工业 | 12篇 |
自动化技术 | 122篇 |
出版年
2023年 | 3篇 |
2022年 | 3篇 |
2021年 | 1篇 |
2020年 | 2篇 |
2019年 | 4篇 |
2018年 | 10篇 |
2017年 | 6篇 |
2016年 | 8篇 |
2015年 | 8篇 |
2014年 | 8篇 |
2013年 | 21篇 |
2012年 | 12篇 |
2011年 | 27篇 |
2010年 | 8篇 |
2009年 | 20篇 |
2008年 | 14篇 |
2007年 | 22篇 |
2006年 | 16篇 |
2005年 | 12篇 |
2004年 | 10篇 |
2003年 | 7篇 |
2002年 | 12篇 |
2001年 | 9篇 |
2000年 | 12篇 |
1999年 | 4篇 |
1998年 | 5篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 6篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1976年 | 1篇 |
1960年 | 2篇 |
1926年 | 2篇 |
1924年 | 3篇 |
排序方式: 共有313条查询结果,搜索用时 15 毫秒
1.
Reveliotis S.A. Lawley M.A. Ferreira P.M. 《Automatic Control, IEEE Transactions on》1997,42(10):1344-1357
The development of efficient deadlock avoidance policies (DAPs) for sequential resource allocation systems (RASs) is a problem of increasing interest in the scientific community, largely because of its relevance to the design of large-scale flexibly automated manufacturing systems. Much of the work on this problem existing in the literature is focused on the so-called single-unit RAS model, which is the simplest model in the considered class of RASs. Furthermore, due to a well-established result stating that, even for single-unit RASs, the computation of the maximally permissive DAP is intractable (NP-hard), many researchers (including our group) have focused on obtaining good suboptimal policies which are computationally tractable (scalable) and provably correct. In the first part of the paper, it is shown, however, that for a large subset (in fact, a majority) of single-unit RASs, the optimal DAP can be obtained in real-time with a computational cost which is a polynomial function of the system size (i.e., the number of resource types and the distinct route stages of the processes running through the system). The implications of this result for the entire class of single-unit RASs are also explored. With a result on the design of optimal DAPs for single-unit RASs, the second part of the paper concentrates on the development of scalable and provably correct DAPs for the more general case of conjunctive RASs 相似文献
2.
The main result of the paper is the use of orthogonal Hermite polynomials as the basis functions of feedforward neural networks. The proposed neural networks have some interesting properties: (i) the basis functions are invariant under the Fourier transform, subject only to a change of scale, (ii) the basis functions are the eigenstates of the quantum harmonic oscillator, and stem from the solution of Schrödinger's diffusion equation. The proposed feed-forward neural networks demonstrate the particle-wave nature of information and can be used in nonparametric estimation. Possible applications of the proposed neural networks include function approximation, image processing and system modelling. 相似文献
3.
4.
Algebraic properties of cryptosystem PGM 总被引:2,自引:0,他引:2
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ
G
is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results
is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest
security conditions that can be offered by a private-key encryption system.
S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center
for Communication and Information Science of the University of Nebraska. 相似文献
5.
J. Bajaj S. J. C. Irvine H. O. Sankur Spyros A. Svoronos 《Journal of Electronic Materials》1993,22(8):899-906
An effective way to in situ monitor the metalorganic chemical vapor deposition (MOCVD) of HgCdTe/CdTe/ZnTe on GaAs or GaAs/Si
substrates is presented. Specular He-Ne laser reflectance was used to in situ monitor the growth rates, layer thickness, and
morphology for each layer in the grown multilayer structure. In situ monitoring has enabled precise measurements of ZnTe nucleation
and CdTe buffer layer thicknesses. Monitoring the constancy of reflectance during the thicker CdTe buffer growth where absorption
in the CdTe reduces reflectance to just the surface component has led to optimum buffer growth ensuring good quality of subsequently
grown HgCdTe. During the interdiffused multilayer process (IMP) HgCdTe growth, because multiple interfaces are present within
the absorption length, a periodic reflectance signal is maintained throughout this growth cycle. A theoretical model was developed
to extract IMP layer thicknesses from in situ recorded experimental data. For structures that required the growth of a larger
band gap HgCdTe cap layer on top of a smaller band gap active layer, in situ monitored reflectance data allowed determination
of alloy composition in the cap layer as well. Continuous monitoring of IMP parameters established the stability of growth
conditions, translating into depth uniformity of the grown material, and allowed diagnosis of growth rate instabilities in
terms of changes in the HgTe and CdTe parts of the IMP cycle. A unique advantage of in situ laser monitoring is the opportunity
to perform “interactive” crystal growth, a development that is a key to real time MOCVD HgCdTe feedback growth control. 相似文献
6.
Clausen CH Dimaki M Panagos SP Kasotakis E Mitraki A Svendsen WE Castillo-León J 《Scanning》2011,33(4):201-207
In this report electrostatic force microscopy (EFM) is used to study different peptide self-assembled structures such as tubes and particles. It is shown that not only geometrical information can be obtained using EFM, but also information about the composition of different structures. In particular we use EFM to investigate the structures of diphenylalanine peptide tubes, particles, and CSGAITIG peptide particles placed on pre-fabricated SiO(2) surfaces with a backgate. We show that the cavity in the peptide tubes could be due to the presence of water residues. Additionally we show that self-assembled amyloid peptides form spherical solid structures containing the same self-assembled peptide in its interior. In both cases transmission electron microscopy is used to verify these structures. Further, the limitations of the EFM technique are discussed, especially when the observed structures become small compared with the radius of the AFM tip used. Finally, an agreement between the detected signal and the structure of the hollow peptide tubes is demonstrated. 相似文献
7.
Linear Feedback Shift Registers (LFSRs) constitute a very efficient mechanism for generating pseudoexhaustive or pseudo-random test sets for the built-in self-testing of digital circuits. However, a well-known problem with the use of LFSRs is the occurrence of linear dependencies in the generated patterns. In this paper, we show for the first time that the amount of linear dependencies can be controlled by selecting appropriate characteristic polynomials and reordering the LFSR cells. We identify two classes of such polynomials which, by appropriate LFSR cell ordering, guarantee that a large ratio of linear dependencies cannot occur. Experimental results show significant enhancements on the fault coverage for pseudo-random testing and support the theoretical relation between minimization of linear dependencies and effective fault coverage.This work was partially supported by NSF grant MIP-9409905, a 1993–94 ACM/IEEE Design Automation Scholarship and a grant from Nissan Corporation. A preliminary version of this work appeared in A Class of Good Characteristic Polynomials for LFSR Test Pattern Generators, in Proc. of IEEE International Conference on Computer Design, Oct. 1994, pp. 292–295, where it received the ICCD'94 Best Paper Award. 相似文献
8.
Borodin, Nielsen and Rackoff [13] introduced the class of priority algorithms as a framework for modeling deterministic greedy-like algorithms. In this paper we address the effect of randomization in greedy-like algorithms. More specifically, we consider approximation ratios within the context of randomized priority algorithms. As case studies, we prove inapproximation results for two well-studied optimization problems, namely facility location and makespan scheduling. 相似文献
9.
In this paper a switching fuzzy logic controller for mobile robots with a bounded curvature constraint is presented. The controller tracks piece-wise linear paths, which are an approximation of the feasible smooth reference path. The controller is constructed through the use of a map, which transforms the problem to a simpler one; namely the tracking of straight lines. This allows the use of an existing fuzzy tracker deployed in a previous work, and its simplification leading to a 70% rule reduction. Simulation results and a comparison analysis with existing trackers are also presented along with some stability considerations on the impulsive error dynamics which emerge. 相似文献
10.
Miomir Vukobratovic Milena Milojevic Spyros Tzafestas Milos Jovanovic Veljko Potkonjak 《Journal of Intelligent and Robotic Systems》2011,63(2):211-231
The sophisticated method for mathematical modeling of humanoid robots formulated in Part 1 of this paper is applied here to
the dynamic task of keeping a posture under disturbance, which is equally important to humans and humanoid robots. The idea
of this work is to develop and realize a simulator tool for dynamic analysis of human-or-humanoid behavior under disturbances.
To show the potentials and verify this tool, we comparatively analyze the robustness of some postures to external disturbance.
At this stage of research we do not conduct real experiments with humans/humanoids but try to verify our simulation tool by
relying on available experience. Therefore, the postures for comparison are taken from everyday life and from sports: upright
standing, squat posture, and three karate postures. As the external disturbance we choose an impulse and a permanent force,
both with variable direction and magnitude. 相似文献