全文获取类型
收费全文 | 10365篇 |
免费 | 959篇 |
国内免费 | 791篇 |
专业分类
电工技术 | 1237篇 |
技术理论 | 3篇 |
综合类 | 1029篇 |
化学工业 | 242篇 |
金属工艺 | 196篇 |
机械仪表 | 747篇 |
建筑科学 | 254篇 |
矿业工程 | 158篇 |
能源动力 | 195篇 |
轻工业 | 109篇 |
水利工程 | 75篇 |
石油天然气 | 132篇 |
武器工业 | 96篇 |
无线电 | 1547篇 |
一般工业技术 | 494篇 |
冶金工业 | 140篇 |
原子能技术 | 76篇 |
自动化技术 | 5385篇 |
出版年
2024年 | 32篇 |
2023年 | 79篇 |
2022年 | 103篇 |
2021年 | 146篇 |
2020年 | 186篇 |
2019年 | 191篇 |
2018年 | 164篇 |
2017年 | 213篇 |
2016年 | 261篇 |
2015年 | 329篇 |
2014年 | 555篇 |
2013年 | 598篇 |
2012年 | 615篇 |
2011年 | 748篇 |
2010年 | 543篇 |
2009年 | 627篇 |
2008年 | 677篇 |
2007年 | 786篇 |
2006年 | 731篇 |
2005年 | 659篇 |
2004年 | 561篇 |
2003年 | 480篇 |
2002年 | 399篇 |
2001年 | 378篇 |
2000年 | 321篇 |
1999年 | 283篇 |
1998年 | 228篇 |
1997年 | 230篇 |
1996年 | 192篇 |
1995年 | 162篇 |
1994年 | 153篇 |
1993年 | 108篇 |
1992年 | 89篇 |
1991年 | 71篇 |
1990年 | 40篇 |
1989年 | 36篇 |
1988年 | 26篇 |
1987年 | 22篇 |
1986年 | 23篇 |
1985年 | 17篇 |
1984年 | 9篇 |
1983年 | 15篇 |
1982年 | 8篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 3篇 |
1973年 | 2篇 |
1957年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
When an operator first detects unusual and/or infrequent or irregular signals in a system, the operator does not need to take any action, but must increase his/her level of attention and be alert for any more serious signals that may confirm a problem with the system. This is referred to as extended vigilance. The purpose of this study was to construct a fuzzy vigilance-measuring model for countering the loss of extended vigilance. The model extends two-valued logic (“Yes” or “No”) to multi-valued logic through fuzzy sets. Then a fuzzy logic alarm was developed by the model for combating the extended vigilance decrement. The first experiment compared the effect of the fuzzy measuring model with signal detection theory (SDT) and discussed the relationship between preliminary and extended vigilance for a simulated feed-water monitoring system. The results indicated that the sensitivity of the fuzzy vigilance-measuring model is better than index d′ and β, and that the preliminary vigilance significantly influences the extended vigilance. The second experiment verified the effect of the fuzzy logic alarm. The results indicated that the effect of the fuzzy logic alarm for combating the extended vigilance decrement is significant. When the preliminary vigilance is poor, an appropriate alarm will improve the extended vigilance. However, if the preliminary vigilance is very poor, the improvement of the extended vigilance will be limited.Relevance to industry: The extended vigilance is a new and important issue in human performance problems in industry, particularly in such areas as air-traffic control, industrial inspection and power plant monitor. The measuring model of vigilance could be applied to develop an alarm for promoting supervisory performance of human and human–machine detectors. 相似文献
993.
Sagar Chaki Edmund Clarke Joël Ouaknine Natasha Sharygina Nishant Sinha 《Formal Aspects of Computing》2005,17(4):461-483
We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary
to other state/event approaches, our work also integrates two powerful verification techniques, counterexample-guided abstraction
refinement and compositional reasoning. Our specification language is a state/event extension of linear temporal logic, and
allows us to express many properties of software in a concise and intuitive manner. We show how standard automata-theoretic
LTL model checking algorithms can be ported to our framework at no extra cost, enabling us to directly benefit from the large
body of research on efficient LTL verification.
We also present an algorithm to detect deadlocks in concurrent message-passing programs. Deadlock- freedom is not only an
important and desirable property in its own right, but is also a prerequisite for the soundness of our model checking algorithm.
Even though deadlock is inherently non-compositional and is not preserved by classical abstractions, our iterative algorithm
employs both (non-standard) abstractions and compositional reasoning to alleviate the state-space explosion problem. The resulting
framework differs in key respects from other instances of the counterexample-guided abstraction refinement paradigm found
in the literature.
We have implemented this work in the magic verification tool for concurrent C programs and performed tests on a broad set
of benchmarks. Our experiments show that this new approach not only eases the writing of specifications, but also yields important
gains both in space and in time during verification. In certain cases, we even encountered specifications that could not be
verified using traditional pure event-based or state-based approaches, but became tractable within our state/event framework.
We also recorded substantial reductions in time and memory consumption when performing deadlock-freedom checks with our new
abstractions. Finally, we report two bugs (including a deadlock) in the source code of Micro-C/OS versions 2.0 and 2.7, which
we discovered during our experiments.
This research was sponsored by the National Science Foundation (NSF) under grants no. CCR-9803774 and CCR-0121547, the Office
of Naval Research (ONR) and the Naval Research Laboratory (NRL) under contract no. N00014-01-1-0796, the Army Research Office
(ARO) under contract no. DAAD19-01-1-0485, and was conducted as part of the Predictable Assembly from Certifiable Components
(PACC) project at the Software Engineering Institute (SEI).
This article combines and builds upon the papers (CCO+04) and (CCOS04).
Received December 2004
Revised July 2005
Accepted July 2005 by Eerke A. Boiten, John Derrick, Graeme Smith and Ian Hayes 相似文献
994.
Towards a re-programmable DNA computer 总被引:2,自引:0,他引:2
Microreactors lend themselves to a relatively simple implementation of DNA computing. Not only is the design of the DNA library critical for the success of the system but also the architecture of the microfluidic structure. Microreactors can be configured as Boolean operators. This paper will show that biomolecular computing can be performed with elementary building blocks, analogous to electronic logic gates. These logical operations will be performed using negative selection. Furthermore, an alternative bead barrier is introduced which can render the computer re-programmable and shows an principle architecture for selection and analysis. 相似文献
995.
Byung-Jae?ChoiEmail author Seong-Woo?Kwak Hua?Wang 《Journal of Intelligent and Robotic Systems》2005,42(2):169-178
The stability analysis for the fuzzy logic controller (FLC) has widely been reported. Furthermore some researches have been introduced to simplify the design process of FLCs. One of them is to decrease the number of parameters representing the antecedent part of the fuzzy control rule. So we briefly explain a simple-structured fuzzy logic controller (SFLC) which uses only a single variable at the antecedent part of a fuzzy control rule. We analyze that it is absolutely stable based on the sector bounded condition. We expand a nonlinear controlled plant into a Taylor series about a nominal operating point. The fuzzy control system is transformed into a Lure system with nonlinearities. We also show the feasibility of the proposed stability analysis through a numerical example of a mass-damper-spring system. 相似文献
996.
997.
998.
循环术语集是描述逻辑长期以来的研究难点,它的最基本的问题即语义及推理问题没有得到合理的解决。分析了描述逻辑循环术语集的研究现状和存在的问题,基于图的互模拟的方法,给出了描述逻辑FL0循环术语集的可满足性条件。结果证明循环术语集的可满足性的推理是多项式复杂的。 相似文献
999.
从命题逻辑的需求描述到状态转移图的形式规格 总被引:1,自引:0,他引:1
屈玉贵 《小型微型计算机系统》2000,21(9):917-919
信息处理系统的规模和复杂化,需要有效设计高可靠性系统的形式化的规模描述方法,本文针对以上功能,提出了基于命题逻辑的信息处理系统的新的需求描述方法,描述了通过使用逻辑PetriNet(LPN),把命题逻辑的需求描述变换成状态转移图的过程,并且给出了由LPN自动生成状态的转换图的算法。 相似文献
1000.
用VIS验证微处理器PIC 总被引:2,自引:0,他引:2
近年来,二叉判定图BDD和符号模型检验在形式验证数字电路设计中取得了突破性进展,文中介绍了符号模型检验的基本原理和方法,重点介绍了如何用VIS系统验证微处理器PIC设计的正确性。利用VIS证明了PIC设计部分电路的等价性。发现了一个设计错误并证明了PIC中一些重要模块的特性。 相似文献