全文获取类型
收费全文 | 4358篇 |
免费 | 355篇 |
国内免费 | 122篇 |
专业分类
电工技术 | 53篇 |
综合类 | 139篇 |
化学工业 | 263篇 |
金属工艺 | 93篇 |
机械仪表 | 87篇 |
建筑科学 | 58篇 |
矿业工程 | 18篇 |
能源动力 | 342篇 |
轻工业 | 90篇 |
水利工程 | 27篇 |
石油天然气 | 23篇 |
武器工业 | 5篇 |
无线电 | 360篇 |
一般工业技术 | 621篇 |
冶金工业 | 36篇 |
原子能技术 | 31篇 |
自动化技术 | 2589篇 |
出版年
2024年 | 20篇 |
2023年 | 80篇 |
2022年 | 110篇 |
2021年 | 118篇 |
2020年 | 167篇 |
2019年 | 115篇 |
2018年 | 181篇 |
2017年 | 333篇 |
2016年 | 339篇 |
2015年 | 322篇 |
2014年 | 431篇 |
2013年 | 303篇 |
2012年 | 308篇 |
2011年 | 315篇 |
2010年 | 235篇 |
2009年 | 241篇 |
2008年 | 124篇 |
2007年 | 176篇 |
2006年 | 132篇 |
2005年 | 113篇 |
2004年 | 54篇 |
2003年 | 71篇 |
2002年 | 78篇 |
2001年 | 85篇 |
2000年 | 44篇 |
1999年 | 68篇 |
1998年 | 36篇 |
1997年 | 25篇 |
1996年 | 29篇 |
1995年 | 28篇 |
1994年 | 27篇 |
1993年 | 19篇 |
1992年 | 13篇 |
1991年 | 11篇 |
1990年 | 19篇 |
1989年 | 10篇 |
1988年 | 39篇 |
1987年 | 6篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有4835条查询结果,搜索用时 187 毫秒
31.
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 总被引:1,自引:0,他引:1
《Journal of Network and Computer Applications》2012,35(2):763-769
Generally, if a user wants to use numerous different network services, he/she must register himself/herself to every service providing server. It is extremely hard for users to remember these different identities and passwords. In order to resolve this problem, various multi-server authentication protocols have been proposed. Recently, Sood et al. analyzed Hsiang and Shih's multi-server authentication protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication, the session key agreement and can resist several kinds of attacks. However, through careful analysis, we find that Sood et al.'s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack. Besides, since there is no way for the control server CS to know the real identity of the user, the authentication and session key agreement phase of Sood et al.'s protocol is incorrect. We propose an efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses. The proposed protocol is extremely suitable for use in distributed multi-server architecture since it provides user's anonymity, mutual authentication, efficient, and security. 相似文献
32.
Phase synchronization is a mechanism that plays a crucial role in information processing in the brain, and coherence is one of the factors used to evaluate the pairwise degree of phase synchronization. Coherence is also an important measure for examining brain functions because it implies communication and cooperation among neurons. In this work, we study the coherence patterns of spontaneous activity in a neural field model at criticality where a second-order phase transition occurs with special properties that differentiate it from other regions. The results are summarized as follows. First, in high-frequency bands, the system outside the critical region is unable to communicate efficiently via phase synchronization. Second, the dynamical coherence patterns at the criticality show switching between high and low coherence states. Finally, we found that in a very brief period, there is high broadband coherence between some pairs of spatial points. This phenomenon can be observed only in the critical region. 相似文献
33.
This paper deals with the problem of reliable control for discrete time systems with actuator failures. The actuator is assumed to fail occasionally and can recover over a time interval. During the time of suffering failures, the considered closed‐loop system is assumed unstable. Using an average dwell time method and under the condition that the activation time ratio between the system without actuator failures and the system with actuator failures is not less than a specified constant, an observer‐based feedback controller is developed in terms of linear matrix inequalities such that the resulting closed‐loop system is exponentially stable. An example is included to demonstrate the effectiveness of the proposed approach. 相似文献
34.
《Automatica》2014,50(12):3197-3203
In this paper we propose an approach to the implementation of controllers with decentralized strategies triggering controller updates. We consider set-ups with a central node in charge of the computation of the control commands, and a set of not co-located sensors providing measurements to the controller node. The solution we propose does not require measurements from the sensors to be synchronized in time. The sensors in our proposal provide measurements in an aperiodic way triggered by local conditions. Furthermore, in the proposed implementation (most of) the communication between nodes requires only the exchange of one bit of information (per controller update), which could aid in reducing transmission delays and as a secondary effect result in fewer transmissions being triggered. 相似文献
35.
This paper investigates a stochastic optimal control problem with delay and of mean-field type, where the controlled state process is governed by a mean-field jump–diffusion stochastic delay differential equation. Two sufficient maximum principles and one necessary maximum principle are established for the underlying system. As an application, a bicriteria mean–variance portfolio selection problem with delay is studied to demonstrate the effectiveness and potential of the proposed techniques. Under certain conditions, explicit expressions are provided for the efficient portfolio and the efficient frontier, which are as elegant as those in the classical mean–variance problem without delays. 相似文献
36.
《Expert systems with applications》2014,41(5):2574-2581
We describe in this paper a new methodology for blood alcohol content (BAC) estimation of a subject. Rather than using external devices to determine the BAC value of a subject, we perform a behaviour analysis of this subject using intelligent systems. We monitor the user’s actions in an ordinary task and label those data to various measured BAC values. The obtained data-set is then used to train learning systems to detect alcoholic consumption and perform BAC estimation. We obtain good results on a mono-user base, and lower results with multiple users. We improve the results by combining multiple classifiers and regression algorithms. 相似文献
37.
对交替行对角化(ARD)算法收敛性进行分析.基于收敛性分析,给出了一些关于如何选取初始矩阵的策略,提出了算法终止的新准则.通过3个数值例子来说明所提出的分析策略的有效性. 相似文献
38.
Estimation and forecasting with logarithmic autoregressive conditional duration models: A comparative study with an application 总被引:1,自引:0,他引:1
《Expert systems with applications》2014,41(7):3323-3332
This paper presents a semi-parametric method of parameter estimation for the class of logarithmic ACD (Log-ACD) models using the theory of estimating functions (EF). A number of theoretical results related to the corresponding EF estimators are derived. A simulation study is conducted to compare the performance of the proposed EF estimates with corresponding ML (maximum likelihood) and QML (quasi maximum likelihood) estimates. It is argued that the EF estimates are relatively easier to evaluate and have sampling properties comparable with those of ML and QML methods. Furthermore, the suggested EF estimates can be obtained without any knowledge of the distribution of errors is known. We apply all these suggested methodology for a real financial duration dataset. Our results show that Log-ACD (1, 1) fits the data well giving relatively smaller variation in forecast errors than in Linear ACD (1, 1) regardless of the method of estimation. In addition, the Diebold–Mariano (DM) and superior predictive ability (SPA) tests have been applied to confirm the performance of the suggested methodology. It is shown that the new method is slightly better than traditional methods in practice in terms of computation; however, there is no significant difference in forecasting ability for all models and methods. 相似文献
39.
《Expert systems with applications》2014,41(7):3343-3350
40.
The paper is to introduce a new systematic method that can produce lower bounds for eigenvalues. The main idea is to use nonconforming finite element methods. The conclusion is that if local approximation properties of nonconforming finite element spaces are better than total errors (sums of global approximation errors and consistency errors) of nonconforming finite element methods, corresponding methods will produce lower bounds for eigenvalues. More precisely, under three conditions on continuity and approximation properties of nonconforming finite element spaces we analyze abstract error estimates of approximate eigenvalues and eigenfunctions. Subsequently, we propose one more condition and prove that it is sufficient to guarantee nonconforming finite element methods to produce lower bounds for eigenvalues of symmetric elliptic operators. We show that this condition hold for most low-order nonconforming finite elements in literature. In addition, this condition provides a guidance to modify known nonconforming elements in literature and to propose new nonconforming elements. In fact, we enrich locally the Crouzeix-Raviart element such that the new element satisfies the condition; we also propose a new nonconforming element for second order elliptic operators and prove that it will yield lower bounds for eigenvalues. Finally, we prove the saturation condition for most nonconforming elements. 相似文献