首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7322篇
  免费   535篇
  国内免费   10篇
电工技术   105篇
综合类   9篇
化学工业   2115篇
金属工艺   78篇
机械仪表   169篇
建筑科学   258篇
矿业工程   10篇
能源动力   325篇
轻工业   1323篇
水利工程   38篇
石油天然气   42篇
无线电   517篇
一般工业技术   1126篇
冶金工业   180篇
原子能技术   61篇
自动化技术   1511篇
  2024年   8篇
  2023年   77篇
  2022年   316篇
  2021年   330篇
  2020年   215篇
  2019年   225篇
  2018年   260篇
  2017年   289篇
  2016年   329篇
  2015年   227篇
  2014年   381篇
  2013年   605篇
  2012年   494篇
  2011年   595篇
  2010年   465篇
  2009年   464篇
  2008年   436篇
  2007年   365篇
  2006年   284篇
  2005年   217篇
  2004年   190篇
  2003年   165篇
  2002年   182篇
  2001年   97篇
  2000年   74篇
  1999年   77篇
  1998年   71篇
  1997年   41篇
  1996年   40篇
  1995年   45篇
  1994年   31篇
  1993年   29篇
  1992年   25篇
  1991年   13篇
  1990年   16篇
  1989年   19篇
  1988年   13篇
  1987年   10篇
  1986年   14篇
  1985年   18篇
  1984年   18篇
  1983年   7篇
  1982年   18篇
  1981年   10篇
  1980年   11篇
  1979年   9篇
  1978年   10篇
  1977年   10篇
  1975年   6篇
  1973年   5篇
排序方式: 共有7867条查询结果,搜索用时 15 毫秒
151.
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process.  相似文献   
152.
Higman??s lemma is an important result in infinitary combinatorics, which has been formalized in several theorem provers. In this paper we present a formalization and proof of Higman??s Lemma in the ACL2 theorem prover. Our formalization is based on a proof by Murthy and Russell, where the key termination argument is justified by the multiset relation induced by a well-founded relation. To our knowledge, this is the first mechanization of this proof.  相似文献   
153.
Abstract: Many real‐world visual tracking applications have a high dimensionality, i.e. the system state is defined by a large number of variables. This kind of problem can be modelled as a dynamic optimization problem, which involves dynamic variables whose values change in time. Most applied research on optimization methods have focused on static optimization problems but these static methods often lack explicit adaptive methodologies. Heuristics are specific methods for solving problems in the absence of an algorithm for formal proof. Metaheuristics are approximate optimization methods which have been applied to more general problems with significant success. However, particle filters are Monte Carlo algorithms which solve the sequential estimation problem by approximating the theoretical distributions in the state space by simulated random measures called particles. However, particle filters lack efficient search strategies. In this paper, we propose a general framework to hybridize heuristics/metaheuristics with particle filters properly. The aim of this framework is to devise effective hybrid visual tracking algorithms naturally, guided by the use of abstraction techniques. Resulting algorithms exploit the benefits of both complementary approaches. As a particular example, a memetic algorithm particle filter is derived from the proposed hybridization framework. Finally, we show the performance of the memetic algorithm particle filter when it is applied to a multiple object tracking problem.  相似文献   
154.
This work presents a multi‐agent system for knowledge‐based high‐level event composition, which interprets activities, behaviour and situations semantically in a scenario with multi‐sensory monitoring. A perception agent (plurisensory agent and visual agent)‐based structure is presented. The agents process the sensor information and identify (agent decision system) significant changes in the monitored signals, which they send as simple events to the composition agent that searches for and identifies pre‐defined patterns as higher‐level semantic composed events. The structure has a methodology and a set of tools that facilitate its development and application to different fields without having to start from scratch. This creates an environment to develop knowledge‐based systems generally for event composition. The application task of our work is surveillance, and event composition/inference examples are shown which characterize an alarming situation in the scene and resolve identification and tracking problems of people in the scenario being monitored.  相似文献   
155.
The main contribution of this paper is a theorem to guarantee uniform global asymptotic stability (UGAS) and uniform local exponential stability (ULES) for a class of nonlinear non‐autonomous systems which includes passive systems. These properties (and a uniform local Lipschitz condition) guarantee robustness of stability while weaker properties, like uniform global stability plus global convergence, do not. Our main result is then used in the tracking control problem of mechanical systems and ships. We use an adaptive backstepping design and prove UGAS of the closed‐loop tracking error system, in particular, we obtain that both the tracking and parameter estimation errors converge uniformly globally to zero. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
156.
Arithmetic coding is one of the most outstanding techniques for lossless data compression. It attains its good performance with the help of a probability model which indicates at each step the probability of occurrence of each possible input symbol given the current context. The better this model, the greater the compression ratio achieved. This work analyses the use of discrete-time recurrent neural networks and their capability for predicting the next symbol in a sequence in order to implement that model. The focus of this study is on online prediction, a task much harder than the classical offline grammatical inference with neural networks. The results obtained show that recurrent neural networks have no problem when the sequences come from the output of a finite-state machine, easily giving high compression ratios. When compressing real texts, however, the dynamics of the sequences seem to be too complex to be learned online correctly by the net.  相似文献   
157.
Virtual Private Networks (VPNs) are normally used for secured communications over the Internet. The VPNs have evolved significantly over the years, leading to a range of open-source and proprietary solutions. In Converged, all-IP networks terminal mobility introduces, however, new challenges that have so far been addressed only partially and via proprietary solutions. In this article we assess the level of maturity, the viability and performance achieved in mobile VPNs, based merely on open-source software. Our prototype MVPN is obtained by integrating IPv6, Mobile IPv6 and IPsec, i.e., the protocols that 3GPP envisions for all-IP, mobile and fixed networks. We perform a series of tests on a multi-access wireless network (WLAN, GPRS and UMTS), aimed at identifying the issues arising when mobility management (vertical and horizontal handover) is combined with different levels of network security. Tests led to the discovery of various results such as the flushing of routing tables in MIPv6 during handover. Our performance analysis is complemented with lessons learnt and recommendations.
Antonio LiottaEmail:
  相似文献   
158.
The present paper is a sequel to Paoli F, Ledda A, Giuntini R, Freytes H (On some properties of QMV algebras and QMV algebras, submitted). We provide two representation results for quasi-MV algebras in terms of MV algebras enriched with additional structure; we investigate the lattices of subvarieties and subquasivarieties of quasi-MV algebras; we show that quasi-MV algebras, as well as cartesian and flat quasi-MV algebras, have the amalgamation property.  相似文献   
159.
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures are promising for dealing with challenges arising in computerized medicine but the manipulation of medical data on such infrastructures faces both the problem of interconnecting medical information systems to Grid middlewares and of preserving patients’ privacy in a wide and distributed multi-user system. These constraints are often limiting the use of Grids for manipulating sensitive medical data. This paper describes our design of a medical data management system taking advantage of the advanced gLite data management services, developed in the context of the EGEE project, to fulfill the stringent needs of the medical community. It ensures medical data protection through strict data access control, anonymization and encryption. The multi-level access control provides the flexibility needed for implementing complex medical use-cases. Data anonymization prevents the exposure of most sensitive data to unauthorized users, and data encryption guarantees data protection even when it is stored at remote sites. Moreover, the developed prototype provides a Grid storage resource manager (SRM) interface to standard medical DICOM servers thereby enabling transparent access to medical data without interfering with medical practice.  相似文献   
160.
An important area of Human Reliability Assessment in interactive systems is the ability to understand the causes of human error and to model their occurrence. This paper investigates a new approach to analysis of task failures based on patterns of operator behaviour, in contrast with more traditional event-based approaches. It considers, as a case study, a formal model of an Air Traffic Control system operator’s task which incorporates a simple model of the high-level cognitive processes involved. The cognitive model is formalised in the CSP process algebra. Various patterns of behaviour that could lead to task failure are described using temporal logic. Then a model-checking technique is used to verify whether the set of selected behavioural patterns is sound and complete with respect to the definition of task failure. The decomposition is shown to be incomplete and a new behavioural pattern is identified, which appears to have been overlooked in the informal analysis of the problem. This illustrates how formal analysis of operator models can yield fresh insights into how failures may arise in interactive systems.
Antonio Cerone (Corresponding author)Email:
Simon ConnellyEmail:
Peter LindsayEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号