首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   601篇
  免费   41篇
  国内免费   6篇
电工技术   16篇
综合类   16篇
化学工业   17篇
金属工艺   15篇
机械仪表   214篇
建筑科学   20篇
矿业工程   6篇
能源动力   61篇
轻工业   16篇
水利工程   14篇
无线电   10篇
一般工业技术   85篇
冶金工业   2篇
原子能技术   1篇
自动化技术   155篇
  2024年   4篇
  2023年   7篇
  2022年   6篇
  2021年   8篇
  2020年   15篇
  2019年   4篇
  2018年   23篇
  2017年   22篇
  2016年   33篇
  2015年   17篇
  2014年   54篇
  2013年   36篇
  2012年   29篇
  2011年   47篇
  2010年   29篇
  2009年   42篇
  2008年   57篇
  2007年   65篇
  2006年   52篇
  2005年   25篇
  2004年   16篇
  2003年   16篇
  2002年   8篇
  2001年   4篇
  2000年   12篇
  1999年   2篇
  1998年   1篇
  1997年   3篇
  1996年   4篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1988年   1篇
排序方式: 共有648条查询结果,搜索用时 15 毫秒
1.
Ejector can utilize high pressure energy from liquid mechanism,it can be used in heat pump system coupled with economized vapor injection(EVI)scroll compressor.When running under low temperature conditions,the performance of the EVI system with ejector can be improved further.In this paper,the design method of the heat pump system with ejector is presented,and the process for designing the heat pump with ejector(EVIe)was summarized.One prototype heat pump was designed under the condition of the evaporation ...  相似文献   
2.
To reconstruct a black box multivariate sparse polynomial from its floating point evaluations, the existing algorithms need to know upper bounds for both the number of terms in the polynomial and the partial degree in each of the variables. Here we present a new technique, based on Rutishauser’s qdqd-algorithm, in which we overcome both drawbacks.  相似文献   
3.
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one of the major threats of today. In this paper, we present a bilevel formulation of the r-interdiction median problem with fortification (RIMF). RIMF identifies the most cost-effective way of allocating protective resources among the facilities of an existing but vulnerable system so that the impact of the most disruptive attack to r unprotected facilities is minimized. The model is based upon the classical p-median location model and assumes that the efficiency of the system is measured in terms of accessibility or service provision costs. In the bilevel formulation, the top level problem involves the decisions about which facilities to fortify in order to minimize the worst-case efficiency reduction due to the loss of unprotected facilities. Worst-case scenario losses are modeled in the lower-level interdiction problem. We solve the bilevel problem through an implicit enumeration (IE) algorithm, which relies on the efficient solution of the lower-level interdiction problem. Extensive computational results are reported, including comparisons with earlier results obtained by a single-level approach to the problem.  相似文献   
4.
A very important class of inverse problems are those modelled by integral equations of the first kind. These equations are usually ill-conditioned, such that any discretization technique will produce an ill-conditioned system, in classical or least-squares formulation. For such kind of symmetric problems, we propose in this paper a stable iterative solver based on an approximate orthogonalization algorithm introduced by Z. Kovarik. We prove convergence of our algorithm for general symmetric least-squares problems and present some numerical experiments ilustrating its good behaviour on problems concerned with the determination of charge distribution generating a given electric field and gravity surveying, both modelled by first kind integral equations.  相似文献   
5.
PowerPoint是教师制做课件最常用的软件之一,该软件的控件工具箱功能十分强大。该文列举出控件工具箱在制做课件时的三个典型应用,分别是嵌入FLASH动画,导入视频文件,插入滚动文本。  相似文献   
6.
This paper presents an algebraic approach to polynomial spectral factorization, an important mathematical tool in signal processing and control. The approach exploits an intriguing relationship between the theory of Gröbner bases and polynomial spectral factorization which can be observed through the sum of roots, and allows us to perform polynomial spectral factorization in the presence of real parameters. It is discussed that parametric polynomial spectral factorization enables us to express quantities such as the optimal cost in terms of parameters and the sum of roots. Furthermore an optimization method over parameters is suggested that makes use of the results from parametric polynomial spectral factorization and also employs two quantifier elimination techniques. This proposed approach is demonstrated in a numerical example of a particular control problem.  相似文献   
7.
8.
9.
In this paper, the control problem for a class of linear parameter varying (LPV) plant subject to actuator saturation is investigated. For the saturated LPV plant depending on the scheduling parameters in linear fractional transformation (LFT) fashion, a gain-scheduled output feedback controller in the LFT form is designed to guarantee the stability of the closed-loop LPV system and provide optimised disturbance/error attenuation performance. By using the congruent transformation, the synthesis condition is formulated as a convex optimisation problem in terms of a finite number of LMIs for which efficient optimisation techniques are available. The nonlinear inverted pendulum problem is employed to demonstrate the effectiveness of the proposed approach. Moreover, the comparison between our LPV saturated approach with an existing linear saturated method reveals the advantage of the LPV controller when handling nonlinear plants.  相似文献   
10.
Very recently, in order to unify the notions of fuzzy metric space and metric-like space, Shukla and Abbas introduced the concept of fuzzy metric-like space and proved some fixed-point results in this setting. In this article, we modify the notion of Cauchy sequence and completeness to generalize their results. Thus, we extend their theorems to a more general framework, which is also appropriate to generalize some recent, well-known results in this line of research. Furthermore, several examples are presented to illustrate the significance of our results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号