全文获取类型
收费全文 | 5836篇 |
免费 | 659篇 |
国内免费 | 279篇 |
专业分类
电工技术 | 390篇 |
综合类 | 361篇 |
化学工业 | 906篇 |
金属工艺 | 429篇 |
机械仪表 | 409篇 |
建筑科学 | 532篇 |
矿业工程 | 207篇 |
能源动力 | 135篇 |
轻工业 | 326篇 |
水利工程 | 113篇 |
石油天然气 | 374篇 |
武器工业 | 46篇 |
无线电 | 679篇 |
一般工业技术 | 748篇 |
冶金工业 | 318篇 |
原子能技术 | 41篇 |
自动化技术 | 760篇 |
出版年
2024年 | 45篇 |
2023年 | 131篇 |
2022年 | 256篇 |
2021年 | 316篇 |
2020年 | 274篇 |
2019年 | 187篇 |
2018年 | 215篇 |
2017年 | 219篇 |
2016年 | 192篇 |
2015年 | 246篇 |
2014年 | 360篇 |
2013年 | 349篇 |
2012年 | 409篇 |
2011年 | 386篇 |
2010年 | 345篇 |
2009年 | 320篇 |
2008年 | 302篇 |
2007年 | 251篇 |
2006年 | 322篇 |
2005年 | 283篇 |
2004年 | 172篇 |
2003年 | 167篇 |
2002年 | 144篇 |
2001年 | 131篇 |
2000年 | 136篇 |
1999年 | 108篇 |
1998年 | 96篇 |
1997年 | 63篇 |
1996年 | 60篇 |
1995年 | 77篇 |
1994年 | 42篇 |
1993年 | 32篇 |
1992年 | 29篇 |
1991年 | 25篇 |
1990年 | 12篇 |
1989年 | 15篇 |
1988年 | 21篇 |
1987年 | 18篇 |
1986年 | 5篇 |
1985年 | 4篇 |
1984年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有6774条查询结果,搜索用时 15 毫秒
61.
This article focuses on designing sensor attacks to deteriorate the state estimation in cyber-physical systems. The scenario that the malicious attack signals can be injected into different but limited number of sensor communication channels is considered. The state estimation error variations and innovation variations are adopted to measure attack performance and attack stealthiness, respectively. A switching attack strategy is proposed, under which the estimation error variations are driven to the predesigned target value and the norm of innovation variations remains at a small level. The switching attack design problem is formulated as a discrete switched optimal control problem which can be solved by dynamic programming, while the computational burden is heavy. To overcome this difficulty, by using pruning technique to remove the redundant matrices generated in dynamic programming, the quadratic optimization problem becomes numerically tractable. In this way, the suboptimal attack signal sequence and switching sequence can be acquired. Finally, a simulation example is provided to illustrate the effectiveness of the proposed attack strategy. 相似文献
62.
IoT设备与各行业的深度融合方兴日盛,使得IoT程序快速开发的需求不断增长。开发者习惯于集成第三方库或常用代码。不幸的是,若这些代码中隐藏着潜在的漏洞,那他们也会被扩散到不同的程序中,为其大规模扩散创造了条件。这也是造成近年来IoT设备群体性安全事件频发的重要原因之一。为了降低危害,发现具备相似漏洞的程序并进行相关的处置是一个有效的方法。同源性分析作为挖掘程序间关联关系的重要手段之一,可高效地实现程序漏洞的智能溯源取证。结合机器学习和深度学习技术,它表现出解决大规模程序安全性检测的巨大潜力。然而,IoT设备的软硬件特点仍使得该技术的使用面临挑战。当前已有诸多方案在IoT设备程序的同源性智能检测方面取得了进展。因此,本文将系统性回顾近年来相关技术研究的成果,将他们分为相似性分析和创作者归属技术。首先,我们介绍了两种方式的数据来源。接着,检测过程中涉及的特征选择、特征表示以及相对应的检测方法也被依次介绍。进一步的,本文不仅比较和总结了方案的特点和局限性,还对他们在不同类型IoT设备程序的适配性进行了对比分析。最后,文章针对IoT程序分析提出了一些研究建议。作者希望本综述可为研究者阐明这些工作的核心技术点,并为他们在IoT设备上的进一步应用提供启发。 相似文献
63.
64.
Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《计算机、材料和连续体(英文)》2023,75(2):2957-2979
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 相似文献
65.
武器发射时产生的脉冲噪声对人员和仪器会造成很大的危害,因此噪声测试在武器勤务性能考核巾具有重要意义,针对脉冲噪声信号特性,开发了一套基于VXI总线的噪声测试系统;详细介绍了系统硬件结构设计、基于LabWindows/CVI虚拟仪器开发平台的软件设计和系统功能;设计的系统具有存储容量大、采样率高和软件功能强等特点,能够用于各种武器单发或连发射击时的噪声测试,也可以用于武器非行驶状态下的稳态噪声测试;通过在试验中的应用,表明本系统操作简便,工作可靠. 相似文献
66.
Quality is an important factor in information systems development (ISD), and ISD team performance closely relates to quality. To better understand ISD teams, we empirically tested a model on ISD team performance by combining socio-technical theory and coordination theory. Using existing empirical studies and data collected from three well-known ISD companies in China, our research results identified influential characteristics of ISD team performance, and revealed similarities and differences between China’s ISD team performance and those in other countries. By the results, we find that knowledge sharing and major do not affect team performance. The compensation satisfaction to job performance is not significant in China, either. Our research provides suggestions for building and supporting ISD teams that could lead to performance improvements. 相似文献
67.
The quality of plane layout design of the disc cutters for the full-face rock tunnel boring machine (TBM) directly affects the balance of force distribution on the cutter head during the excavating. Various layout patterns have been adopted in practice during the layout design of the disc cutters. Considering the engineering technical requirements and the corresponding structure design requirements of the cutter head, this study formulates a nonlinear multi-objective mathematical model with multiple constraints for the disc cutters plane layout design, and analyses the characteristics of a multi-spiral layout pattern, a dynamic star layout pattern and a stochastic layout pattern. And then a genetic algorithm is employed to solve a disc cutters’ multi-spiral layout problem, and a cooperative co-evolutionary genetic algorithm (CCGA) is utilized to solve a disc cutters’ star or stochastic layout problems. The emphasis was put on the study of superiority of three different layout patterns. Finally, an instance of the disc cutters’ plane layout design was solved by the proposed methods using three different kinds of layout patterns. Experimental results showed the effectiveness of the method of combining the mathematical model with the algorithms, and the pros and cons of the three layout patterns. 相似文献
68.
69.
对于教育测评所积累的大量数据,通过数据挖掘技术能产生出对学生、教师、教育管理者有用的知识。为此,从教育测评的目的、数据准备、数据积累方法,到数据的知识挖掘等几个方面,系统地研究了教育测评的知识发现的过程,并分别就三种需求的知识发现方法进行探讨,以改变教育测评仅能提供定性的结论而不能发现知识的状况,丰富教育测评的内涵。 相似文献
70.