全文获取类型
收费全文 | 539篇 |
免费 | 33篇 |
国内免费 | 19篇 |
专业分类
电工技术 | 29篇 |
综合类 | 12篇 |
化学工业 | 5篇 |
金属工艺 | 11篇 |
机械仪表 | 72篇 |
建筑科学 | 23篇 |
矿业工程 | 3篇 |
能源动力 | 3篇 |
轻工业 | 1篇 |
石油天然气 | 2篇 |
武器工业 | 13篇 |
无线电 | 83篇 |
一般工业技术 | 42篇 |
冶金工业 | 5篇 |
原子能技术 | 3篇 |
自动化技术 | 284篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 3篇 |
2021年 | 5篇 |
2020年 | 11篇 |
2019年 | 6篇 |
2018年 | 6篇 |
2017年 | 6篇 |
2016年 | 11篇 |
2015年 | 17篇 |
2014年 | 24篇 |
2013年 | 23篇 |
2012年 | 38篇 |
2011年 | 57篇 |
2010年 | 30篇 |
2009年 | 40篇 |
2008年 | 48篇 |
2007年 | 45篇 |
2006年 | 35篇 |
2005年 | 31篇 |
2004年 | 18篇 |
2003年 | 31篇 |
2002年 | 17篇 |
2001年 | 17篇 |
2000年 | 17篇 |
1999年 | 14篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有591条查询结果,搜索用时 0 毫秒
581.
为实现信息系统安全防御的目的,针对动态异构冗余(DHR)架构设计拟态通用运行环境(MCOE)框架。以拟态化改造后功能等价的异构冗余信息系统应用程序,以及异构化的信息系统运行环境设施为对象,为N异构执行体构建面向服务请求的资源调度、分发、执行、表决、安全威胁清洗恢复以及管理的自动化运行支撑环境,提供拟态产品的分发、表决统一集成接口规范。在该框架中,服务请求主键驱动的N个异构执行体和MCOE分发、内部表决、外部表决、协同执行、管理5个服务器交互运行。仿真结果表明,该设计可有效抵御软硬件后门和漏洞引发的网络攻击。 相似文献
582.
Eliciting requirements for a proposed system inevitably involves the problem of handling undesirable information about customer's needs, including inconsistency, vagueness, redundancy, or incompleteness. We term the requirements statements involved in the undesirable information non-canonical software requirements. In this paper, we propose an approach to handling non-canonical software requirements based on Annotated Predicate Calculus (APC). Informally, by defining a special belief lattice appropriate for representing the stakeholder's belief in requirements statements, we construct a new form of APC to formalize requirements specifications. We then show how the APC can be employed to characterize non-canonical requirements. Finally, we show how the approach can be used to handle non-canonical requirements through a case study.
Kedian Mu received B.Sc. degree in applied mathematics from Beijing Institute of Technology, Beijing, China, in 1997, M.Sc. degree in probability and mathematical statistics from Beijing Institute of Technology, Beijing, China, in 2000, and Ph.D. in applied mathematics from Peking University, Beijing, China, in 2003. From 2003 to 2005, he was a postdoctoral researcher at Institute of Computing Technology, Chinese Academy of Sciences, China. He is currently an assistant professor at School of Mathematical Sciences, Peking University, Beijing, China. His research interests include uncertain reasoning in artificial intelligence, knowledge engineering and science, and requirements engineering.
Zhi Jin was awarded B.Sc. in computer science from Zhejiang University, Hangzhou, China, in 1984, and studied for her M.Sc. in computer science (expert system) and her Ph.D. in computer science (artificial intelligence) at National Defence University of Technology, Changsha, China. She was awarded Ph.D. in 1992. She is a senior member of China Computer Federation. She is currently a professor at Academy of Mathematics and System Sciences, Chinese Academy of Science. Her research interests include knowledge-based systems, artificial intelligence, requirements engineering, ontology engineering, etc. Her current research focuses on ontology-based requirements elicitation and analysis. She has got about 60 papers published, including co-authoring one book.
Ruqian Lu is a professor of computer science of the Institute of Mathematics, Chinese Academy of Sciences. His research interests include artificial intelligence, knowledge engineering and knowledge based software engineering. He designed the “Tian Ma” software systems that have been widely applied in more than 20 fields, including the national defense and the economy. He has won two first class awards from Chinese Academy of Sciences and a National second class prize from the Ministry of Science and Technology. He has also won the sixth Hua Lookeng Prize for Mathematics.
Yan Peng received B.Sc. degree in software from Jilin University, Changchun, China, in 1992. From June 2002 to December 2005, he studied for his M.E. in software engineering at College of Software Engineering, Graduate School of Chinese Academy of Sciences, Beijing, China. He was awarded M.E degree in 2006. He is currently responsible for CRM (customer relationship management) and BI (business intelligence) project in the BONG. His research interests include customer relationship management, business intelligence, data ming, software engineering and requirements engineering. 相似文献
583.
We give a result about the invariance of canonical analysis of Euclidean subspaces, so improving a known property. Furthermore,
we apply this result to determine conditions for invariance of covariate discriminant analysis when the original variables
are linearly transformed. That permits us to introduce a test for this invariance for which we only suppose that the variable
admits fourth order moments. A test for redundancy of subcomponents’ variables is obtained as a particular case.
相似文献
584.
为满足工业中报警系统对可靠性、抗干扰性方面的严格要求,通过分析工业中各种总线类型的应用背景,以及对目前常见报警类型进行分类,提出了一种基于CAN总线的报警网络结构.在CAN总线底层协议的基础上,设计了一种更加适用于工业报警系统的较高层CAN总线协议,分析了总线数据传输的实时性和报警信息的传输处理,搭建了该通信网络的实际硬件系统.实验论证了该设计方法的有效性. 相似文献
585.
In this paper, a new Fault Detection (FD) scheme based on combination of switching observer and Bond Graph (BG) method for linear continuous time switched systems with Average Dwell Time (ADT) approach is proposed. The proposed scheme is a BG-based two-stage FD system in which the compact state space representation and Global Analytical Redundancy Relations (GARRs) are derived based on the BG model. In the first stage, a switched observer is designed considering disturbance attenuation level, fault sensitivity and rapid fault detection criteria by solving a weighted Linear Matrix Inequality (LMI) optimization problem. Next, a new form of GARRs which is based on output estimation error of the observer and is called Error-based Global Analytical Redundancy Relations (EGARRs) is developed to combine the observer and BG method. The output estimation errors from the observer, which are adequately sensitive to faults and simultaneously the effects of disturbances are attenuated therein, are given to the EGARRs to generate the residuals of the FD system. The proposed method may be used for fault detection of switched linear systems with ADT based on the BG model of the system. Finally, two case studies including a two-tank system and a buck converter-driven DC motor are considered to show the efficiency and real-time implementation of the proposed method. 相似文献
586.
软件抗干扰在单片机控制系统中的应用研究 总被引:2,自引:0,他引:2
分析软件干扰的来源及影响,提出几种有效可行的软件抗干扰方法,如“数字滤波”、“数据重复输出”、“软件冗余”、“软件拦截”、“看门狗”等技术,来提高单片机应用系统的可靠性。 相似文献
587.
近年来,随着偶然荷载(地震、撞击、爆炸)的增加,造成了大量的人员和财产的损失。其中由于这种非常规荷载引起的结构连续性倒塌所造成的损失占很大的比例。本文介绍了抗连续性倒塌的研究现状,并对目前几种连续性倒塌的分析方法及控制设计做了全面的总结。 相似文献
588.
Duygu Saydam Dan M. Frangopol 《Engineering Structures》2011,33(9):2458-2471
The ability of a structure to survive an extreme event without collapse reduces in time due to deterioration processes. Therefore, in the lifetime management of structures and infrastructures, the resistance to sudden local damage has to be considered together with the effect of progressive deterioration. The aim of this paper is to present a framework for computation of time-dependent performance indicators of civil structures and infrastructures, with emphasis on bridges, including reliability, vulnerability, robustness and redundancy. A brief theoretical background and selected structural performance indicators regarding vulnerability, redundancy and robustness are presented. The approach is based on probabilistic performance assessment supported by finite element analysis and applied to an existing bridge. Time-variation of vulnerability, redundancy and robustness associated with various damage scenarios under uncertainty and the effects of several loading conditions on performance are investigated. 相似文献
589.
Abandoned farmlands as components of rural landscapes: An analysis of perceptions and representations 总被引:2,自引:0,他引:2
In spite of its importance in some agricultural landscape, abandoned farmland remains relatively little studied. Yet it is central to several land management issues: ecological (biodiversity), economic (agricultural or forest productivity) and landscape issues. In order to better address these issues, this study proposes to define how abandoned farmland is perceived in an intensive agricultural landscape. Using photographs, the perceptions of abandoned farmland (herbaceous and shrub dominated) and 5 other land uses (hay fields, corn fields, pastures, woodlots and plantations) were measured from a sample of 33 abandoned farmland owners in order to compare and rank the perceptions of abandoned farmland to that of other types of land use. Perceptions of landscape changes and the importance of abandoned farmland within properties were studied. The statistical analyses used allowed us to establish relationships between the different perceptions and the socio-economic characteristics and value indicators of the land owners. The analyses establish that abandoned farmland produces the most negative perceptions, followed by corn fields. Conversely, woodlots are the land use that is the most appreciated. The attitude towards the environment was one of the variables most often significant in explaining the perceptions encountered. Analysis of landscape evolution reveals an intensification of agricultural practices that may lead to the conversion of abandoned farmlands into cultivated land. Finally, abandoned farmland is perceived, at the scale of the individual property, as the land use having the least value (as opposed to corn fields) and being the least appreciated (as opposed to forests). 相似文献
590.
基于各级电子信息系统机房UPS系统配置规定,阐述“N”系统、“N+X”系统、“2N或M(N+1)”系统配置要求、运行方式及设备利用率.通过计算并分析几种不同配置的UPS系统及其单总线、双总线UPS供电系统可用性指标,探讨UPS系统配置设计原则及应注意的问题,并给出一个UPS系统配置的设计实例。 相似文献