首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3249篇
  免费   267篇
  国内免费   3篇
工业技术   3519篇
  2024年   4篇
  2023年   35篇
  2022年   34篇
  2021年   265篇
  2020年   112篇
  2019年   103篇
  2018年   128篇
  2017年   127篇
  2016年   160篇
  2015年   142篇
  2014年   149篇
  2013年   235篇
  2012年   220篇
  2011年   273篇
  2010年   195篇
  2009年   195篇
  2008年   168篇
  2007年   144篇
  2006年   140篇
  2005年   101篇
  2004年   89篇
  2003年   70篇
  2002年   53篇
  2001年   38篇
  2000年   29篇
  1999年   37篇
  1998年   37篇
  1997年   32篇
  1996年   26篇
  1995年   13篇
  1994年   25篇
  1993年   11篇
  1992年   10篇
  1991年   5篇
  1989年   8篇
  1988年   2篇
  1987年   2篇
  1986年   6篇
  1985年   12篇
  1984年   8篇
  1983年   17篇
  1982年   8篇
  1981年   9篇
  1980年   12篇
  1979年   7篇
  1978年   3篇
  1977年   9篇
  1976年   3篇
  1975年   2篇
  1973年   2篇
排序方式: 共有3519条查询结果,搜索用时 31 毫秒
81.
In this paper we deal with some finite-time control problems for discrete-time, time-varying linear systems. First we provide necessary and sufficient conditions for finite-time stability; these conditions require either the computation of the state transition matrix of the system or the solution of a certain difference Lyapunov inequality. Then we address the design problem. The proposed conditions allow us to find output feedback controllers which stabilize the closed loop system in the finite-time sense; all these conditions can be expressed in terms of LMIs and therefore are numerically tractable, as shown in the example included in the paper.  相似文献   
82.
Nodes of wireless sensor networks (WSNs) are typically powered by batteries with a limited capacity. Thus, energy is a primary constraint in the design and deployment of WSNs. Since radio communication is in general the main cause of power consumption, the different techniques proposed in the literature to improve energy efficiency have mainly focused on limiting transmission/reception of data, for instance, by adopting data compression and/or aggregation. The limited resources available in a sensor node demand, however, the development of specifically designed algorithms. To this aim, we propose an approach to perform lossy compression on single node based on a differential pulse code modulation scheme with quantization of the differences between consecutive samples. Since different combinations of the quantization process parameters determine different trade-offs between compression performance and information loss, we exploit a multi-objective evolutionary algorithm to generate a set of combinations of these parameters corresponding to different optimal trade-offs. The user can therefore choose the combination with the most suitable trade-off for the specific application. We tested our lossy compression approach on three datasets collected by real WSNs. We show that our approach can achieve significant compression ratios despite negligible reconstruction errors. Further, we discuss how our approach outperforms LTC, a lossy compression algorithm purposely designed to be embedded in sensor nodes, in terms of compression rate and complexity.  相似文献   
83.
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. Thanks to its simplicity the concept of k-anonymity, introduced by Samarati and Sweeney [1], established itself as one fundamental principle for privacy preserving data publishing. According to the k-anonymity principle, each release of data must be such that each individual is indistinguishable from at least k−1 other individuals.  相似文献   
84.
85.
The JPEG algorithm is one of the most used tools for compressing images. The main factor affecting the performance of the JPEG compression is the quantization process, which exploits the values contained in two tables, called quantization tables. The compression ratio and the quality of the decoded images are determined by these values. Thus, the correct choice of the quantization tables is crucial to the performance of the JPEG algorithm. In this paper, a two-objective evolutionary algorithm is applied to generate a family of optimal quantization tables which produce different trade-offs between image compression and quality. Compression is measured in terms of difference in percentage between the sizes of the original and compressed images, whereas quality is computed as mean squared error between the reconstructed and the original images. We discuss the application of the proposed approach to well-known benchmark images and show how the quantization tables determined by our method improve the performance of the JPEG algorithm with respect to the default tables suggested in Annex K of the JPEG standard.  相似文献   
86.
Some applications require autonomous robots to search an initially unknown environment for static targets, without any a priori information about environment structure and target locations. Targets can be human victims in search and rescue or materials in foraging. In these scenarios, the environment is incrementally discovered by the robots exploiting exploration strategies to move around in an autonomous and effective way. Most of the strategies proposed in literature are based on the idea of evaluating a number of candidate locations on the frontier between the known and the unknown portions of the environment according to ad hoc utility functions that combine different criteria. In this paper, we show some of the advantages of using a more theoretically-grounded approach, based on Multi-Criteria Decision Making (MCDM), to define exploration strategies for robots employed in search and rescue applications. We implemented some MCDM-based exploration strategies within an existing robot controller and we evaluated their performance in a simulated environment.  相似文献   
87.
88.
Given a graph G where a label is associated with each edge, we address the problem of looking for a maximum matching of G using the minimum number of different labels, namely the labeled maximum matching problem. It is a relatively new problem whose application is related to the timetabling problem. We prove it is NP-complete and present four different mathematical formulations. Moreover, we propose an exact algorithm based on a branch-and-bound approach to solve it. We evaluate the performance of our algorithm on a wide set of instances and compare our computational times with the ones required by CPLEX to solve the proposed mathematical formulations. Test results show the effectiveness of our procedure, that hugely outperforms the solver.  相似文献   
89.
Currently, the design of aesthetic products is a process that requires a set of activities where digital models and physical mockups play a key role. Typically, these are modified (and built) several times before reaching the desired design, increasing the development time and, consequently, the final product cost. In this paper, we present an innovative design environment for computer-aided design (CAD) surface analysis. Our system relies on a direct visuo-haptic display system, which enables users to visualize models using a stereoscopic view, and allows the evaluation of sectional curves using touch. Profile curves are rendered using an haptic device that deforms a plastic strip, thanks to a set of actuators, to reproduce the curvature of the shape co-located with the virtual model. By touching the strip, users are able to evaluate shape characteristics, such as curvature or discontinuities (rendered using sound), and to assess the surface quality. We believe that future computer-aided systems (CAS)/CAD systems based on our approach will contribute in improving the design process at industrial level. Moreover, these will allow companies to reduce the product development time by reducing the number of physical mockups necessary for the product design evaluation and by increasing the quality of the final product, allowing a wider exploration and comparative evaluation of alternatives in the given time.  相似文献   
90.
Several items are produced and stored into n buffers in order to supply an external demand without interruptions. We consider the classical problem of determining control laws and smallest buffer levels guaranteeing that an unknown bounded demand is always satisfied. A simple model with n decoupled integrators and n additive bounded disturbances is employed. The coupling arises from bounds on the total production capacity and on the total demand. Invariant set theory for linear and switched linear systems is exploited to compute robust positive invariant sets and controlled robust invariant sets for two commonly adopted scheduling policies. This paper provides the explicit expression of the invariant sets for any arbitrary n.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号