全文获取类型
收费全文 | 1471篇 |
免费 | 52篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 25篇 |
综合类 | 1篇 |
化学工业 | 411篇 |
金属工艺 | 16篇 |
机械仪表 | 26篇 |
建筑科学 | 34篇 |
矿业工程 | 7篇 |
能源动力 | 23篇 |
轻工业 | 69篇 |
水利工程 | 11篇 |
石油天然气 | 1篇 |
武器工业 | 1篇 |
无线电 | 116篇 |
一般工业技术 | 281篇 |
冶金工业 | 241篇 |
原子能技术 | 11篇 |
自动化技术 | 253篇 |
出版年
2023年 | 11篇 |
2022年 | 38篇 |
2021年 | 29篇 |
2020年 | 17篇 |
2019年 | 18篇 |
2018年 | 23篇 |
2017年 | 25篇 |
2016年 | 27篇 |
2015年 | 19篇 |
2014年 | 34篇 |
2013年 | 100篇 |
2012年 | 62篇 |
2011年 | 72篇 |
2010年 | 47篇 |
2009年 | 53篇 |
2008年 | 34篇 |
2007年 | 33篇 |
2006年 | 57篇 |
2005年 | 54篇 |
2004年 | 55篇 |
2003年 | 53篇 |
2002年 | 38篇 |
2001年 | 20篇 |
2000年 | 25篇 |
1999年 | 17篇 |
1998年 | 22篇 |
1997年 | 21篇 |
1996年 | 25篇 |
1995年 | 17篇 |
1994年 | 21篇 |
1993年 | 17篇 |
1992年 | 24篇 |
1991年 | 13篇 |
1990年 | 14篇 |
1989年 | 19篇 |
1988年 | 20篇 |
1987年 | 12篇 |
1986年 | 17篇 |
1985年 | 15篇 |
1982年 | 19篇 |
1981年 | 13篇 |
1980年 | 14篇 |
1979年 | 16篇 |
1978年 | 23篇 |
1977年 | 16篇 |
1976年 | 25篇 |
1975年 | 16篇 |
1974年 | 21篇 |
1973年 | 14篇 |
1970年 | 10篇 |
排序方式: 共有1527条查询结果,搜索用时 906 毫秒
51.
Knowledge-base V&V primarily addresses the question: “Does my knowledge-base contain the right answer and can I arrive at it?” One of the main goals of our work is to properly encapsulate the knowledge representation and allow the expert to work with manageable-sized chunks of the knowledge-base. This work develops a new methodology for the verification and validation of Bayesian knowledge-bases that assists in constructing and testing such knowledge-bases. Assistance takes the form of ensuring that the knowledge is syntactically correct, correcting “imperfect” knowledge, and also identifying when the current knowledge-base is insufficient as well as suggesting ways to resolve this insufficiency. The basis of our approach is the use of probabilistic network models of knowledge. This provides a framework for formally defining and working on the problems of uncertainty in the knowledge-base.
In this paper, we examine the project which is concerned with assisting a human expert to build knowledge-based systems under uncertainty. We focus on how verification and validation are currently achieved in . 相似文献
52.
Stochastic neural networks 总被引:2,自引:0,他引:2
Eugene Wong 《Algorithmica》1991,6(1):466-478
The first purpose of this paper is to present a class of algorithms for finding the global minimum of a continuous-variable function defined on a hypercube. These algorithms, based on both diffusion processes and simulated annealing, are implementable as analog integrated circuits. Such circuits can be viewed as generalizations of neural networks of the Hopfield type, and are called diffusion machines.Our second objective is to show that learning in these networks can be achieved by a set of three interconnected diffusion machines: one that learns, one to model the desired behavior, and one to compute the weight changes.This research was supported in part by U.S. Army Research Office Grant DAAL03-89-K-0128. 相似文献
53.
Eugene Santos Deqing Li Eunice E. Santos John Korah 《Expert systems with applications》2012,39(17):12905-12917
Time is ubiquitous. Accounting for time and its interaction with change is crucial to modeling the dynamic world, especially in domains whose study of data is sensitive to time such as in medical diagnosis, financial investment, and natural language processing, to name a few. We present a framework that incorporates both uncertainty and time in its reasoning scheme. It is based on an existing knowledge representation called Bayesian Knowledge Bases. It provides a graphical representation of knowledge, time and uncertainty, and enables probabilistic and temporal inferencing. The reasoning scheme is probabilistically sound and the fusion of temporal fragments is well defined. We will discuss some properties of this framework and introduce algorithms to ensure groundedness during the construction of the model. The framework has been applied to both artificial and real world scenarios. 相似文献
54.
An analytical expression has been obtained for the transient temperature distribution produced when the retina is irradiated by a high-intensity light source. The following factors are included in the analysis: (1) structurally the fundus consists of layers of material which have different physical properties, (2) absorption of energy from the light beam follows the Beer-Lambert law, (3) energy is absorbed in the sclera as well as in the pigment epithelium and choroid, (4) heat is removed from the fundus by blood circulating through the capillaries of the choroid, and (5) intensity of the light source may vary with time. Computed values indicate that absorption of energy in the sclera and removal of heat by convection are both important for longer irradiation times, which agrees with recent experimental observations. The asymptotic response to a train of pulses is presented also. 相似文献
55.
Eugene Kaplounovski 《电子设计技术》2006,13(12):118-118
本设计实例介绍了对某种旧设计的增强措施(参考资料1)。图1中的电路使用常开型单刀单掷按钮开关S1,它代替了原始设计要求的单刀双掷开关。您可以使用膜片开关来大大简化该器件的工业设计并增强它的人机控制特性。另外,该电路消除了流过未动作开关的电流,由此略微减少了工作模式中的泄漏电流。 相似文献
56.
In this paper we follow previous “pseudo-stochastic” approaches that solve stochastic control problems by using deterministic optimal control methods. In a similar manner to the certainty equivalence principle, the suggested model maximizes a given profit function of the expected system outcome. However, unlike the certainty equivalence principle, we model the expected influences of all future events (including those that are expected beyond the planning horizon), as encapsulated by their density functions and not only by their mean values. The model is applied to the optimal scheduling of multiple part-types on a single machine that is subject to random failures and repairs. The objective of the scheduler is to maximize the profit function of the produced multiple-part mix. A numerical study is performed to evaluate the suggested pseudo-stochastic solutions under various conditions. These solutions are compared to a profit upper bound of the stochastic optimal control solutions. 相似文献
57.
Several classes of regular expressions for timed languages accepted by timed automata have been suggested in the literature. In this article we introduce balanced timed regular expressions with colored parentheses which are equivalent to timed automata, and, differently from existing definitions, do not refer to clock values, and do not use additional operations such as intersection and renaming. 相似文献
58.
During the 1989 Loma Prieta earthquake the Pajaro River levees near Watsonville, Calif., spread laterally at multiple locations. Four of these locations are discussed in this paper. At one location, an industrial facility was also damaged and a dispute arose as to whether lateral spreading of the adjacent levee was the cause. Stability analyses were made of the industrial site for conditions before, during, and after the earthquake. To confirm the findings, analyses were also made of three other nearby locations where the actual deformation was documented and the subsurface conditions are well defined. The calculated levee deformations at the four locations are quite consistent with the observed movements (up to 60 cm). This experience provides increased confidence in the methods of analysis described, for the characterized subsurface conditions, and the range of ground motions experienced. Additional analyses made using the more recently developed multilinear regression lateral-spreading model (e.g., Youd et al. in 1999) yielded inconsistent results. 相似文献
59.
E.Eugene Schultz 《Network Security》2004,2004(1):6-9
Introduction
After initially releasing Windows 2000 (W2K) in February 2000, Microsoft touted it as a secure operating system, one that was far improved over its predecessor, Windows NT(WNT). Yet even before Microsoft released W2K the software giant announced that it would release Service Pack 1 (SP1) for this operating system. The information security community immediately wondered whether the claims about the much improved security in W2K were true; many events and findings since then have reinforced this doubt. After a reign of three years as Microsoft's flagship operating system, last year Microsoft rolled out its newest server operating system, Windows Server 2003 (WS2003), signaling the end of an era for the W2K operating system. Windows XP (WXP) had already supplanted W2K Professional as the newest workstation operating system several years before. This is not to say that nobody uses W2K any more—to the contrary. But as W2K continues to increasingly take a proverbial back seat to newer Microsoft operating systems, now is a good time to take a retroactive look at W2K from a security viewpoint. Was it a success from a security perspective? What were its major failings and why? This paper addresses these issues. 相似文献60.