全文获取类型
收费全文 | 15936篇 |
免费 | 1835篇 |
国内免费 | 1521篇 |
专业分类
电工技术 | 1510篇 |
技术理论 | 5篇 |
综合类 | 1829篇 |
化学工业 | 486篇 |
金属工艺 | 288篇 |
机械仪表 | 907篇 |
建筑科学 | 555篇 |
矿业工程 | 385篇 |
能源动力 | 256篇 |
轻工业 | 241篇 |
水利工程 | 222篇 |
石油天然气 | 375篇 |
武器工业 | 178篇 |
无线电 | 2044篇 |
一般工业技术 | 820篇 |
冶金工业 | 296篇 |
原子能技术 | 100篇 |
自动化技术 | 8795篇 |
出版年
2024年 | 26篇 |
2023年 | 103篇 |
2022年 | 174篇 |
2021年 | 222篇 |
2020年 | 306篇 |
2019年 | 315篇 |
2018年 | 291篇 |
2017年 | 352篇 |
2016年 | 414篇 |
2015年 | 558篇 |
2014年 | 822篇 |
2013年 | 934篇 |
2012年 | 1007篇 |
2011年 | 1192篇 |
2010年 | 924篇 |
2009年 | 1069篇 |
2008年 | 1197篇 |
2007年 | 1386篇 |
2006年 | 1278篇 |
2005年 | 1107篇 |
2004年 | 904篇 |
2003年 | 761篇 |
2002年 | 641篇 |
2001年 | 551篇 |
2000年 | 464篇 |
1999年 | 381篇 |
1998年 | 306篇 |
1997年 | 289篇 |
1996年 | 259篇 |
1995年 | 210篇 |
1994年 | 196篇 |
1993年 | 143篇 |
1992年 | 116篇 |
1991年 | 94篇 |
1990年 | 60篇 |
1989年 | 48篇 |
1988年 | 39篇 |
1987年 | 27篇 |
1986年 | 26篇 |
1985年 | 23篇 |
1984年 | 11篇 |
1983年 | 17篇 |
1982年 | 14篇 |
1981年 | 4篇 |
1980年 | 7篇 |
1979年 | 4篇 |
1978年 | 6篇 |
1973年 | 3篇 |
1957年 | 3篇 |
1956年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
An adaptive fuzzy decentralized backstepping output-feedback control approach is proposed for a class of nonlinear large-scale systems with completely unknown functions,the interconnections mismatched in control inputs,and without the measurements of the states.Fuzzy logic systems are employed to approximate the unknown nonlinear functions,and an adaptive high-gain observer is developed to estimate the unmeasured states.Using the designed high-gain observer,and combining the fuzzy adaptive control theory with backstepping approach,an adaptive fuzzy decentralized backstepping output-feedback control scheme is developed.It is proved that the proposed control approach can guarantee that all the signals of the closed-loop system are semi-globally uniformly ultimately bounded(SUUB),and that the observer errors and the tracking errors converge to a small neighborhood of the origin by appropriate choice of the design parameters.Finally,a simulation example is provided to show the eectiveness of the proposed approach. 相似文献
112.
113.
A new combination rule based on Dezert-Smarandache theory (DSmT) is proposed to deal with the conflict evidence resulting from the non-exhaustivity of the discernment frame. A two-dimensional measure factor in Dempster-Shafer theory (DST) is extended to DSmT to judge the conflict degree between evidence. The original DSmT combination rule or new DSmT combination rule can be selected for fusion according to this degree. Finally, some examples in simultaneous fault diagnosis of motor rotor are given to illustrate the effectiveness of the proposed combination rule. 相似文献
114.
115.
116.
How to compose existing web services automatically and to guarantee the correctness of the design (e.g. temporal constraints specified by temporal logic LTL, CTL or CTL*) is an important and challenging problem in web services. Most existing approaches use the process in conventional software development of design, verification, analysis and correction to guarantee the correctness of composite services, which makes the composition process both complex and time-consuming. In this paper, we focus on the synthesis problem of composite service; that is, for a given set of services and correctness constraint specified by CTL or CTL* formula, a composite service is automatically constructed which guarantees that the correctness is ensured. We prove that the synthesis problem for CTL and CTL* are complete for EXPTIME and 2EXPTIME, respectively. Moreover, for the case of synthesis failure, we discuss the problem of how to disable outputs of environment (i.e. users or services) reasonably to make synthesis successful, which are also proved complete for EXPTIME and 2EXPTIME for CTL and CTL*, respectively. 相似文献
117.
《中国科学:信息科学(英文版)》2012,(1):149-164
It is significant to automatically detect and resolve the incompliance in security policy.Most existing works in this field focus on compliance verification,and few of them provide approaches to automatically correct the incompliant security policies.This paper proposes a novel approach to automatically transform a given security policy into a compliant one.Given security policy Π and delegation policy M declared by logic programs,the approach automatically rewrites Π into a new one ΠM which is compliant with M and is readable by the humans.We prove that the algorithm is sound and complete under noninterference assumption.Formally,we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on ΠM.The approach is automatic,so it doesn’t require a administrator with excess abilities.In this sense,our proposal can help us to save much manpower resource in security management and improves the security assurance abilities. 相似文献
118.
119.
以当前的高职高专院校教育教学为平台,研究分析最小支持度关联规则挖掘技术与教学质量评价相结合的问题,针对教学质量评价结果中的盲目性、不易把握等问题,提出利用最小支持度来分析质量评价体系,获取以影响因素为条件,以评价分析为结论的关联规则来解决目前教学质量评价中的不合理性,使教学质量评价公平、公正、合理、高效,并给教学管理人员提供决策分析资料。 相似文献
120.
Snort作为开源的入侵检测系统,利用定义的静态规则集合实现对网络的入侵事件的检测。本文分析入侵检测系统的基本原理和模型,阐述Snort入侵检测系统部署到网络时,其静态规则集的配置方法,根据统计流量阈值和告警频率阈值动态产生动态规则集的方法,改进并提高了部署Snort应有的灵活性。 相似文献