首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   539篇
  免费   33篇
  国内免费   19篇
电工技术   29篇
综合类   12篇
化学工业   5篇
金属工艺   11篇
机械仪表   72篇
建筑科学   23篇
矿业工程   3篇
能源动力   3篇
轻工业   1篇
石油天然气   2篇
武器工业   13篇
无线电   83篇
一般工业技术   42篇
冶金工业   5篇
原子能技术   3篇
自动化技术   284篇
  2024年   1篇
  2023年   4篇
  2022年   3篇
  2021年   5篇
  2020年   11篇
  2019年   6篇
  2018年   6篇
  2017年   6篇
  2016年   11篇
  2015年   17篇
  2014年   24篇
  2013年   23篇
  2012年   38篇
  2011年   57篇
  2010年   30篇
  2009年   40篇
  2008年   48篇
  2007年   45篇
  2006年   35篇
  2005年   31篇
  2004年   18篇
  2003年   31篇
  2002年   17篇
  2001年   17篇
  2000年   17篇
  1999年   14篇
  1998年   7篇
  1997年   5篇
  1996年   7篇
  1995年   4篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1981年   1篇
排序方式: 共有591条查询结果,搜索用时 0 毫秒
581.
为实现信息系统安全防御的目的,针对动态异构冗余(DHR)架构设计拟态通用运行环境(MCOE)框架。以拟态化改造后功能等价的异构冗余信息系统应用程序,以及异构化的信息系统运行环境设施为对象,为N异构执行体构建面向服务请求的资源调度、分发、执行、表决、安全威胁清洗恢复以及管理的自动化运行支撑环境,提供拟态产品的分发、表决统一集成接口规范。在该框架中,服务请求主键驱动的N个异构执行体和MCOE分发、内部表决、外部表决、协同执行、管理5个服务器交互运行。仿真结果表明,该设计可有效抵御软硬件后门和漏洞引发的网络攻击。  相似文献   
582.
Eliciting requirements for a proposed system inevitably involves the problem of handling undesirable information about customer's needs, including inconsistency, vagueness, redundancy, or incompleteness. We term the requirements statements involved in the undesirable information non-canonical software requirements. In this paper, we propose an approach to handling non-canonical software requirements based on Annotated Predicate Calculus (APC). Informally, by defining a special belief lattice appropriate for representing the stakeholder's belief in requirements statements, we construct a new form of APC to formalize requirements specifications. We then show how the APC can be employed to characterize non-canonical requirements. Finally, we show how the approach can be used to handle non-canonical requirements through a case study. Kedian Mu received B.Sc. degree in applied mathematics from Beijing Institute of Technology, Beijing, China, in 1997, M.Sc. degree in probability and mathematical statistics from Beijing Institute of Technology, Beijing, China, in 2000, and Ph.D. in applied mathematics from Peking University, Beijing, China, in 2003. From 2003 to 2005, he was a postdoctoral researcher at Institute of Computing Technology, Chinese Academy of Sciences, China. He is currently an assistant professor at School of Mathematical Sciences, Peking University, Beijing, China. His research interests include uncertain reasoning in artificial intelligence, knowledge engineering and science, and requirements engineering. Zhi Jin was awarded B.Sc. in computer science from Zhejiang University, Hangzhou, China, in 1984, and studied for her M.Sc. in computer science (expert system) and her Ph.D. in computer science (artificial intelligence) at National Defence University of Technology, Changsha, China. She was awarded Ph.D. in 1992. She is a senior member of China Computer Federation. She is currently a professor at Academy of Mathematics and System Sciences, Chinese Academy of Science. Her research interests include knowledge-based systems, artificial intelligence, requirements engineering, ontology engineering, etc. Her current research focuses on ontology-based requirements elicitation and analysis. She has got about 60 papers published, including co-authoring one book. Ruqian Lu is a professor of computer science of the Institute of Mathematics, Chinese Academy of Sciences. His research interests include artificial intelligence, knowledge engineering and knowledge based software engineering. He designed the “Tian Ma” software systems that have been widely applied in more than 20 fields, including the national defense and the economy. He has won two first class awards from Chinese Academy of Sciences and a National second class prize from the Ministry of Science and Technology. He has also won the sixth Hua Lookeng Prize for Mathematics. Yan Peng received B.Sc. degree in software from Jilin University, Changchun, China, in 1992. From June 2002 to December 2005, he studied for his M.E. in software engineering at College of Software Engineering, Graduate School of Chinese Academy of Sciences, Beijing, China. He was awarded M.E degree in 2006. He is currently responsible for CRM (customer relationship management) and BI (business intelligence) project in the BONG. His research interests include customer relationship management, business intelligence, data ming, software engineering and requirements engineering.  相似文献   
583.
We give a result about the invariance of canonical analysis of Euclidean subspaces, so improving a known property. Furthermore, we apply this result to determine conditions for invariance of covariate discriminant analysis when the original variables are linearly transformed. That permits us to introduce a test for this invariance for which we only suppose that the variable admits fourth order moments. A test for redundancy of subcomponents’ variables is obtained as a particular case.   相似文献   
584.
为满足工业中报警系统对可靠性、抗干扰性方面的严格要求,通过分析工业中各种总线类型的应用背景,以及对目前常见报警类型进行分类,提出了一种基于CAN总线的报警网络结构.在CAN总线底层协议的基础上,设计了一种更加适用于工业报警系统的较高层CAN总线协议,分析了总线数据传输的实时性和报警信息的传输处理,搭建了该通信网络的实际硬件系统.实验论证了该设计方法的有效性.  相似文献   
585.
In this paper, a new Fault Detection (FD) scheme based on combination of switching observer and Bond Graph (BG) method for linear continuous time switched systems with Average Dwell Time (ADT) approach is proposed. The proposed scheme is a BG-based two-stage FD system in which the compact state space representation and Global Analytical Redundancy Relations (GARRs) are derived based on the BG model. In the first stage, a switched observer is designed considering disturbance attenuation level, fault sensitivity and rapid fault detection criteria by solving a weighted Linear Matrix Inequality (LMI) optimization problem. Next, a new form of GARRs which is based on output estimation error of the observer and is called Error-based Global Analytical Redundancy Relations (EGARRs) is developed to combine the observer and BG method. The output estimation errors from the observer, which are adequately sensitive to faults and simultaneously the effects of disturbances are attenuated therein, are given to the EGARRs to generate the residuals of the FD system. The proposed method may be used for fault detection of switched linear systems with ADT based on the BG model of the system. Finally, two case studies including a two-tank system and a buck converter-driven DC motor are considered to show the efficiency and real-time implementation of the proposed method.  相似文献   
586.
软件抗干扰在单片机控制系统中的应用研究   总被引:2,自引:0,他引:2  
王伟 《机械管理开发》2010,25(3):203-204
分析软件干扰的来源及影响,提出几种有效可行的软件抗干扰方法,如“数字滤波”、“数据重复输出”、“软件冗余”、“软件拦截”、“看门狗”等技术,来提高单片机应用系统的可靠性。  相似文献   
587.
近年来,随着偶然荷载(地震、撞击、爆炸)的增加,造成了大量的人员和财产的损失。其中由于这种非常规荷载引起的结构连续性倒塌所造成的损失占很大的比例。本文介绍了抗连续性倒塌的研究现状,并对目前几种连续性倒塌的分析方法及控制设计做了全面的总结。  相似文献   
588.
The ability of a structure to survive an extreme event without collapse reduces in time due to deterioration processes. Therefore, in the lifetime management of structures and infrastructures, the resistance to sudden local damage has to be considered together with the effect of progressive deterioration. The aim of this paper is to present a framework for computation of time-dependent performance indicators of civil structures and infrastructures, with emphasis on bridges, including reliability, vulnerability, robustness and redundancy. A brief theoretical background and selected structural performance indicators regarding vulnerability, redundancy and robustness are presented. The approach is based on probabilistic performance assessment supported by finite element analysis and applied to an existing bridge. Time-variation of vulnerability, redundancy and robustness associated with various damage scenarios under uncertainty and the effects of several loading conditions on performance are investigated.  相似文献   
589.
In spite of its importance in some agricultural landscape, abandoned farmland remains relatively little studied. Yet it is central to several land management issues: ecological (biodiversity), economic (agricultural or forest productivity) and landscape issues. In order to better address these issues, this study proposes to define how abandoned farmland is perceived in an intensive agricultural landscape. Using photographs, the perceptions of abandoned farmland (herbaceous and shrub dominated) and 5 other land uses (hay fields, corn fields, pastures, woodlots and plantations) were measured from a sample of 33 abandoned farmland owners in order to compare and rank the perceptions of abandoned farmland to that of other types of land use. Perceptions of landscape changes and the importance of abandoned farmland within properties were studied. The statistical analyses used allowed us to establish relationships between the different perceptions and the socio-economic characteristics and value indicators of the land owners. The analyses establish that abandoned farmland produces the most negative perceptions, followed by corn fields. Conversely, woodlots are the land use that is the most appreciated. The attitude towards the environment was one of the variables most often significant in explaining the perceptions encountered. Analysis of landscape evolution reveals an intensification of agricultural practices that may lead to the conversion of abandoned farmlands into cultivated land. Finally, abandoned farmland is perceived, at the scale of the individual property, as the land use having the least value (as opposed to corn fields) and being the least appreciated (as opposed to forests).  相似文献   
590.
陈金銮 《建筑电气》2011,30(12):18-22
基于各级电子信息系统机房UPS系统配置规定,阐述“N”系统、“N+X”系统、“2N或M(N+1)”系统配置要求、运行方式及设备利用率.通过计算并分析几种不同配置的UPS系统及其单总线、双总线UPS供电系统可用性指标,探讨UPS系统配置设计原则及应注意的问题,并给出一个UPS系统配置的设计实例。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号