全文获取类型
收费全文 | 2557篇 |
免费 | 92篇 |
国内免费 | 77篇 |
专业分类
电工技术 | 114篇 |
综合类 | 94篇 |
化学工业 | 202篇 |
金属工艺 | 92篇 |
机械仪表 | 188篇 |
建筑科学 | 328篇 |
矿业工程 | 168篇 |
能源动力 | 29篇 |
轻工业 | 187篇 |
水利工程 | 30篇 |
石油天然气 | 34篇 |
武器工业 | 11篇 |
无线电 | 286篇 |
一般工业技术 | 231篇 |
冶金工业 | 103篇 |
原子能技术 | 62篇 |
自动化技术 | 567篇 |
出版年
2024年 | 2篇 |
2023年 | 35篇 |
2022年 | 71篇 |
2021年 | 67篇 |
2020年 | 50篇 |
2019年 | 56篇 |
2018年 | 48篇 |
2017年 | 69篇 |
2016年 | 47篇 |
2015年 | 81篇 |
2014年 | 153篇 |
2013年 | 140篇 |
2012年 | 123篇 |
2011年 | 187篇 |
2010年 | 115篇 |
2009年 | 152篇 |
2008年 | 144篇 |
2007年 | 160篇 |
2006年 | 154篇 |
2005年 | 152篇 |
2004年 | 107篇 |
2003年 | 104篇 |
2002年 | 88篇 |
2001年 | 69篇 |
2000年 | 60篇 |
1999年 | 83篇 |
1998年 | 44篇 |
1997年 | 44篇 |
1996年 | 41篇 |
1995年 | 24篇 |
1994年 | 19篇 |
1993年 | 11篇 |
1992年 | 5篇 |
1991年 | 2篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有2726条查询结果,搜索用时 22 毫秒
61.
Soft computing continuously gains interest in many fields of academic and industrial domain; among the most notable characteristics for using soft computing methodological tools is the ability to handle with vague and imprecise data in decision making processes. Similar conditions are often encountered in requirements engineering. In this paper, we introduce the PriS approach, a security and privacy requirements engineering framework which aims at incorporating privacy requirements early in the system development process. Specifically, PriS provides a set of concepts for modelling privacy requirements in the organisation domain and a systematic way-of-working for translating these requirements into system models. The conceptual model of PriS uses a goal hierarchy structure. Every privacy requirement is either applied or not on every goal. To this end every privacy requirement is a variable that can take two values [0,1] on every goal meaning that the requirements constraints the goal (value 1) or not (value 0). Following this way of working PriS ends up suggesting a number of implementation techniques based on the privacy requirements constraining the respective goals. Taking into account that the mapping of privacy variables to a crisp set consisting of two values [0,1] is constraining, we extend also the PriS framework so as to be able to address the degree of participation of every privacy requirement towards achieving the generic goal of privacy. Therefore, we propose a fuzzification of privacy variables that maps the expression of the degree of participation of each privacy variable to the [0,1] interval. We also present a mathematical framework that allows the concurrent management of combined independent preferences towards the necessity of a privacy measure; among the advantages of the presented extended framework is the scalability of the approach in such a way that the results are not limited by the number of independent opinions or by the number of factors considered while reasoning for a specific selection of privacy measures. 相似文献
62.
63.
Soft groups and normalistic soft groups 总被引:1,自引:0,他引:1
Soft set theory, proposed by Molodtsov, has been regarded as an effective mathematical tool to deal with uncertainties. In this paper, first we correct some of the problematic cases in a previous paper by Akta? and Çag˜man [H. Akta?, N. Çag˜man, Soft sets and soft groups, Inf. Sci. 177 (2007) 2726-2735]. Moreover, we introduce the concepts of normalistic soft group and normalistic soft group homomorphism, study their several related properties, and investigate some structures that are preserved under normalistic soft group homomorphisms. 相似文献
64.
Soft set theory, introduced by Molodtsov, has been considered as an effective mathematical tool for modeling uncertainties. In this paper, we initiate the study of algebraic hyperstructures of soft sets. The concepts of soft polygroups, normal soft polygroups, soft subpolygroups and normal soft subpolygroups are introduced, and some related properties are investigated. Furthermore, we propose the homomorphism and isomorphism of soft polygroups, and establish three isomorphism theorems for soft polygroups. 相似文献
65.
Answering an open question published in Operations Research (54, 73–91, 2006) in the area of network design and logistic optimization, we present the first constant-factor approximation algorithms for
the problem combining facility location and cable installation in which capacity constraints are imposed on both facilities
and cables.
We study the problem of designing a minimum cost network to serve client demands by opening facilities for service provision
and installing cables for service shipment. Both facilities and cables have capacity constraints and incur buy-at-bulk costs.
This Max SNP-hard problem arises in diverse applications and is shown in this paper to admit a combinatorial 19.84-approximation
algorithm of cubic running time. This is achieved by an integration of primal-dual schema, Lagrangian relaxation, demand clustering
and bi-factor approximation. Our techniques extend to several variants of this problem, which include those with unsplitable
demands or requiring network connectivity, and provide constant-factor approximate algorithms in strongly polynomial time.
X. Chen is Visiting Fellow, University of Warwick. 相似文献
66.
Robust predictive control handles constrained systems that are subject to stochastic uncertainty but propagating the effects of uncertainty over a prediction horizon can be computationally expensive and conservative. This paper overcomes these issues through an augmented autonomous prediction formulation, and provides a method of handling probabilistic constraints and ensuring closed loop stability through the use of an extension of the concept of invariance, namely invariance with probability p. 相似文献
67.
《Journal of Computer and System Sciences》2016,82(5):712-738
Designing test cases is one of the most crucial activities in software testing process. Manual test case design might result in inadequate testing outputs due to lack of expertise and/or skill requirements. This article delivers automatic test data generation framework by effectively utilizing soft computing technique with Apache Hadoop MapReduce as the parallelization framework. We have evaluated and analyzed statistically our proposed framework using real world open source libraries. The experimental results conducted on Hadoop cluster with ten nodes are effective and our framework significantly outperforms other existing cloud-based testing models. 相似文献
68.
Handling objects with robotic soft fingers without considering the odds of slippage are not realistic. Grasping and manipulation algorithms have to be tested under such conditions for evaluating their robustness. In this paper, a dynamic analysis of rigid object manipulation with slippage control is studied using a two-link finger with soft hemispherical tip. Dependency on contact forces applied by a soft finger while grasping a rigid object is examined experimentally. A power-law model combined with a linear viscous damper is used to model the elastic behavior and damping effect of the soft tip, respectively. In order to obtain precise dynamic equations governing the system, two second-order differential equations with variable coefficients have been designed to describe the different possible states of the contact forces accordingly. A controller is designed based on the rigid fingertip model using the concept of feedback linearization for each phase of the system dynamics. Numerical simulations are used to evaluate the performance of the controller. The results reveal that the designed controller shows acceptable performance for both soft and rigid finger manipulation in reducing and canceling slippage. Furthermore, simulations indicate that the applied force in the soft finger manipulation is considerably less than the rigid “one.”. 相似文献
69.
Soft sets and soft rough sets 总被引:4,自引:0,他引:4
In this study, we establish an interesting connection between two mathematical approaches to vagueness: rough sets and soft sets. Soft set theory is utilized, for the first time, to generalize Pawlak’s rough set model. Based on the novel granulation structures called soft approximation spaces, soft rough approximations and soft rough sets are introduced. Basic properties of soft rough approximations are presented and supported by some illustrative examples. We also define new types of soft sets such as full soft sets, intersection complete soft sets and partition soft sets. The notion of soft rough equal relations is proposed and related properties are examined. We also show that Pawlak’s rough set model can be viewed as a special case of the soft rough sets, and these two notions will coincide provided that the underlying soft set in the soft approximation space is a partition soft set. Moreover, an example containing a comparative analysis between rough sets and soft rough sets is given. 相似文献
70.
Yufeng Wang Akihiro Nakao Athanasios V. VasilakosJianhua Ma 《Computer Communications》2011,34(3):241-249
This paper thoroughly investigates the evolutionary dynamics of soft security mechanism, namely, reciprocity-based incentive mechanism, in P2P systems based on Evolutionary Game Theory (EGT). By soft security mechanism, it means social control mechanisms to overcome peers’ selfish (rational) behaviors, and encourage cooperation in P2P systems. Specifically, there exist three strategies in P2P systems: always cooperative (ALLC), always defect (ALLD) and reciprocator (R). Instead of existing work which take it for granted that, like ALLC users, R users did not bear any information-seeking cost, we assume small reciprocation cost, and study generalized mutation-selection dynamics. Our contributions are threefold: firstly, we prove and illustrate that, in a well-mixed P2P structure, ALLD is the only strict Nash equilibrium; secondly, we infer the specific condition under which evolution dynamics exhibits rock-scissors-paper oscillation in a structured P2P population. That is, the population cycles from ALLD to R to ALLC and back to ALLD; finally, we theoretically illustrate that the intensity of selection plays an important role in the evolutionary dynamics of P2P incentive mechanism. That is, when the intensity of selection is relatively weak and reciprocation cost limits to zero, the time average can be mostly concentrated on reciprocator. In brief, considering the existence of reciprocation cost and the small mutation in P2P incentive mechanisms, unlike existing work, it is impossible to simply achieve the “absolute cooperative” in P2P incentive mechanisms. On the other hand, stochastic evolution in P2P incentive mechanism with finite population and network structure still favor reciprocation. 相似文献