全文获取类型
收费全文 | 38441篇 |
免费 | 5070篇 |
国内免费 | 3015篇 |
专业分类
电工技术 | 4054篇 |
综合类 | 4146篇 |
化学工业 | 3763篇 |
金属工艺 | 1039篇 |
机械仪表 | 2050篇 |
建筑科学 | 2515篇 |
矿业工程 | 897篇 |
能源动力 | 1090篇 |
轻工业 | 1908篇 |
水利工程 | 838篇 |
石油天然气 | 1623篇 |
武器工业 | 630篇 |
无线电 | 5267篇 |
一般工业技术 | 3652篇 |
冶金工业 | 1497篇 |
原子能技术 | 578篇 |
自动化技术 | 10979篇 |
出版年
2024年 | 125篇 |
2023年 | 483篇 |
2022年 | 932篇 |
2021年 | 1093篇 |
2020年 | 1376篇 |
2019年 | 1304篇 |
2018年 | 1126篇 |
2017年 | 1514篇 |
2016年 | 1685篇 |
2015年 | 1772篇 |
2014年 | 2384篇 |
2013年 | 2775篇 |
2012年 | 2769篇 |
2011年 | 2899篇 |
2010年 | 2142篇 |
2009年 | 2271篇 |
2008年 | 2173篇 |
2007年 | 2574篇 |
2006年 | 2409篇 |
2005年 | 1981篇 |
2004年 | 1630篇 |
2003年 | 1531篇 |
2002年 | 1328篇 |
2001年 | 1151篇 |
2000年 | 985篇 |
1999年 | 737篇 |
1998年 | 593篇 |
1997年 | 520篇 |
1996年 | 394篇 |
1995年 | 329篇 |
1994年 | 271篇 |
1993年 | 224篇 |
1992年 | 153篇 |
1991年 | 151篇 |
1990年 | 107篇 |
1989年 | 91篇 |
1988年 | 63篇 |
1987年 | 67篇 |
1986年 | 47篇 |
1985年 | 54篇 |
1984年 | 40篇 |
1983年 | 29篇 |
1982年 | 32篇 |
1981年 | 28篇 |
1980年 | 24篇 |
1979年 | 22篇 |
1978年 | 12篇 |
1977年 | 11篇 |
1964年 | 12篇 |
1956年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
941.
孙景民 《计算机与数字工程》2013,41(7)
针对IEBLP模型中客体安全等级在整个寿命周期中固定不变的不足,提出了一种添加了时间限制元素的TBLP模型,主要在主客体安全标签中加入了时间限制元素,并对其安全公理进行了相对应的改进.最后,利用XACML实现了TBLP模型对XML文档的强制访问控制. 相似文献
942.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity. 相似文献
943.
Cui‐Zhen Yao 《Asian journal of control》2013,15(5):1531-1537
This article considers stabilization of a one‐dimensional Schrödinger equation with variable coefficient and boundary observation which suffers from an arbitrary given time delay. We design an observer and predictor to stabilize the system. The state is estimated in the time span where the observation is available, and also predicted in the time interval where the observation is not available. It is shown that the estimated state feedback stabilizes the system exponentially. A numerical simulation is presented to illustrate the effect of the stabilizing controller. 相似文献
944.
Yisheng Zhong 《Asian journal of control》2013,15(4):1228-1237
Consensus analysis and design problems of high‐dimensional discrete‐time swarm systems in directed networks with time delays and uncertainties are dealt with by using output information. Two subspaces are introduced, namely a consensus subspace and a complement consensus subspace. By projecting the state of a swarm system onto the two subspaces, a necessary and sufficient condition for consensus is presented, and based on different influences of time delays and uncertainties, an explicit expression of the consensus function is given which is very important in applications of swarm systems. A method to determine gain matrices of consensus protocols is proposed. Numerical simulations are presented to demonstrate theoretical results. 相似文献
945.
It is well known that many industrial manipulators use an embedded linear proportional‐integral (PI) joint velocity controller to guarantee motion control through proper velocity commands. However, although this control scheme has been very successful in practice, not much attention has been paid to designing new PI velocity control structures. The problem of analyzing a saturated PI velocity joint velocity controller is addressed in this paper. By using the theory of singularly perturbed systems, the closed‐loop system is studied. The robot dynamics assumed in this paper take into account bounded time–varying disturbances which may include the friction at the joints. An experimental study in a planar two degrees‐of‐freedom direct‐drive robot is also presented, confirming the advantage of the new saturated PI joint velocity controller. 相似文献
946.
This paper mainly studies the notions of detectability and observability for discrete‐time stochastic Markov jump systems with state‐dependent noise. Two concepts, called “W‐detectability” and “W‐observability,” for such systems are introduced, and are shown to coincide with the other concepts on detectability and observability reported recently in literature. Moreover, some criteria and interesting properties for both W‐detectability and W‐observability are obtained. 相似文献
947.
A. J. Rojas 《Asian journal of control》2013,15(1):132-141
In the present paper we obtain an explicit closed‐form solution for the discrete‐time algebraic Riccati equation (DTARE) with vanishing state weight, whenever the unstable eigenvalues are distinct. We discuss links to current algorithmic solutions and observe that the AREs in such a class solve on one hand the infimal signal‐to‐noise ratio (SNR) problem, whilst on the other hand, in their dual form they solve a Kalman filter problem. We then extend the main result to an example case of the optimal linear quadratic regulator gain. We relax some of the assumptions behind the main result and conclude with possible future directions for the present work. 相似文献
948.
In this paper, the consensus problem is investigated via bounded controls for the multi‐agent systems with or without communication. Based on the nested saturation method, the saturated control laws are designed to solve the consensus problem. Under the designed saturated control laws, the transient performance of the closed‐loop system can be improved by tuning the saturation level. First of all, asymptotical consensus algorithms with bounded control inputs are proposed for the multi‐agent systems with or without communication delays. Under these consensus algorithms, the states’ consensus can be achieved asymptotically. Then, based on a kind of novel nonlinear saturation functions, bounded finite‐time consensus algorithms are further developed. It is shown that the states’ consensus can be achieved in finite time. Finally, two examples are given to verify the efficiency of the proposed methods. 相似文献
949.
Fuwen Yang 《Asian journal of control》2013,15(5):1468-1476
The problem of quantized H∞ control for networked control systems (NCSs) subject to time‐varying delay and multiple packet dropouts is investigated in this paper. Both the control input and the measurement output signals are quantized before being transmitted and the quantized errors are described as sector bound uncertainties. The measurement channel and the control channel packet dropouts are considered simultaneously, and the stochastic variables satisfying Bernoulli random binary distribution are utilized to model the random multiple packet dropouts. Sufficient conditions for the existence of an observer‐based controller are established to ensure the exponential mean‐square stablility of the closed‐loop system and achieve the optimal H∞ disturbance attenuation level. By using a globally convergent algorithm involving convex optimization, the nonconvex feasibility can be solved successfully. Finally, a numerical example is given to illustrate the effectiveness and applicability of the proposed method. 相似文献
950.
根据实际工作需要,为克服采用传统手段利用上下游洪峰水位相关图法来进行洪水预报所带来的不精确性和任意性,笔者利用数学函数方程和回归分析计算软件,使用excel的图形功能,先绘制样本数据散点图,然后在图上添加趋势线,确定了回归方程类型。根据回归方程类型进行了方程系数率定分析,最终推求出预报黑龙江乌云站洪峰水位和洪峰传播时间的数学回归方程,经实例拟合验证,方程计算结果通过检验,基本满足实际应用要求。 相似文献