首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10365篇
  免费   959篇
  国内免费   791篇
电工技术   1237篇
技术理论   3篇
综合类   1029篇
化学工业   242篇
金属工艺   196篇
机械仪表   747篇
建筑科学   254篇
矿业工程   158篇
能源动力   195篇
轻工业   109篇
水利工程   75篇
石油天然气   132篇
武器工业   96篇
无线电   1547篇
一般工业技术   494篇
冶金工业   140篇
原子能技术   76篇
自动化技术   5385篇
  2024年   32篇
  2023年   79篇
  2022年   103篇
  2021年   146篇
  2020年   186篇
  2019年   191篇
  2018年   164篇
  2017年   213篇
  2016年   261篇
  2015年   329篇
  2014年   555篇
  2013年   598篇
  2012年   615篇
  2011年   748篇
  2010年   543篇
  2009年   627篇
  2008年   677篇
  2007年   786篇
  2006年   731篇
  2005年   659篇
  2004年   561篇
  2003年   480篇
  2002年   399篇
  2001年   378篇
  2000年   321篇
  1999年   283篇
  1998年   228篇
  1997年   230篇
  1996年   192篇
  1995年   162篇
  1994年   153篇
  1993年   108篇
  1992年   89篇
  1991年   71篇
  1990年   40篇
  1989年   36篇
  1988年   26篇
  1987年   22篇
  1986年   23篇
  1985年   17篇
  1984年   9篇
  1983年   15篇
  1982年   8篇
  1981年   3篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1973年   2篇
  1957年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
When an operator first detects unusual and/or infrequent or irregular signals in a system, the operator does not need to take any action, but must increase his/her level of attention and be alert for any more serious signals that may confirm a problem with the system. This is referred to as extended vigilance. The purpose of this study was to construct a fuzzy vigilance-measuring model for countering the loss of extended vigilance. The model extends two-valued logic (“Yes” or “No”) to multi-valued logic through fuzzy sets. Then a fuzzy logic alarm was developed by the model for combating the extended vigilance decrement. The first experiment compared the effect of the fuzzy measuring model with signal detection theory (SDT) and discussed the relationship between preliminary and extended vigilance for a simulated feed-water monitoring system. The results indicated that the sensitivity of the fuzzy vigilance-measuring model is better than index d′ and β, and that the preliminary vigilance significantly influences the extended vigilance. The second experiment verified the effect of the fuzzy logic alarm. The results indicated that the effect of the fuzzy logic alarm for combating the extended vigilance decrement is significant. When the preliminary vigilance is poor, an appropriate alarm will improve the extended vigilance. However, if the preliminary vigilance is very poor, the improvement of the extended vigilance will be limited.Relevance to industry: The extended vigilance is a new and important issue in human performance problems in industry, particularly in such areas as air-traffic control, industrial inspection and power plant monitor. The measuring model of vigilance could be applied to develop an alarm for promoting supervisory performance of human and human–machine detectors.  相似文献   
993.
We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary to other state/event approaches, our work also integrates two powerful verification techniques, counterexample-guided abstraction refinement and compositional reasoning. Our specification language is a state/event extension of linear temporal logic, and allows us to express many properties of software in a concise and intuitive manner. We show how standard automata-theoretic LTL model checking algorithms can be ported to our framework at no extra cost, enabling us to directly benefit from the large body of research on efficient LTL verification. We also present an algorithm to detect deadlocks in concurrent message-passing programs. Deadlock- freedom is not only an important and desirable property in its own right, but is also a prerequisite for the soundness of our model checking algorithm. Even though deadlock is inherently non-compositional and is not preserved by classical abstractions, our iterative algorithm employs both (non-standard) abstractions and compositional reasoning to alleviate the state-space explosion problem. The resulting framework differs in key respects from other instances of the counterexample-guided abstraction refinement paradigm found in the literature. We have implemented this work in the magic verification tool for concurrent C programs and performed tests on a broad set of benchmarks. Our experiments show that this new approach not only eases the writing of specifications, but also yields important gains both in space and in time during verification. In certain cases, we even encountered specifications that could not be verified using traditional pure event-based or state-based approaches, but became tractable within our state/event framework. We also recorded substantial reductions in time and memory consumption when performing deadlock-freedom checks with our new abstractions. Finally, we report two bugs (including a deadlock) in the source code of Micro-C/OS versions 2.0 and 2.7, which we discovered during our experiments. This research was sponsored by the National Science Foundation (NSF) under grants no. CCR-9803774 and CCR-0121547, the Office of Naval Research (ONR) and the Naval Research Laboratory (NRL) under contract no. N00014-01-1-0796, the Army Research Office (ARO) under contract no. DAAD19-01-1-0485, and was conducted as part of the Predictable Assembly from Certifiable Components (PACC) project at the Software Engineering Institute (SEI). This article combines and builds upon the papers (CCO+04) and (CCOS04). Received December 2004 Revised July 2005 Accepted July 2005 by Eerke A. Boiten, John Derrick, Graeme Smith and Ian Hayes  相似文献   
994.
Towards a re-programmable DNA computer   总被引:2,自引:0,他引:2  
Microreactors lend themselves to a relatively simple implementation of DNA computing. Not only is the design of the DNA library critical for the success of the system but also the architecture of the microfluidic structure. Microreactors can be configured as Boolean operators. This paper will show that biomolecular computing can be performed with elementary building blocks, analogous to electronic logic gates. These logical operations will be performed using negative selection. Furthermore, an alternative bead barrier is introduced which can render the computer re-programmable and shows an principle architecture for selection and analysis.  相似文献   
995.
The stability analysis for the fuzzy logic controller (FLC) has widely been reported. Furthermore some researches have been introduced to simplify the design process of FLCs. One of them is to decrease the number of parameters representing the antecedent part of the fuzzy control rule. So we briefly explain a simple-structured fuzzy logic controller (SFLC) which uses only a single variable at the antecedent part of a fuzzy control rule. We analyze that it is absolutely stable based on the sector bounded condition. We expand a nonlinear controlled plant into a Taylor series about a nominal operating point. The fuzzy control system is transformed into a Lure system with nonlinearities. We also show the feasibility of the proposed stability analysis through a numerical example of a mass-damper-spring system.  相似文献   
996.
介绍组态软件RSView32的特点、功能及其在烘箱自动监控系统中的简单应用.  相似文献   
997.
基于不确定性知识处理特点,在认知机理下,通过基于属性定量与定性之间的转化关系而建立的定性映射, 给出了属性粒的概念及其逻辑计算公式,并在此基础上构建了初步的粒逻辑系统,最后通过Petri网对其逻辑推理进 行形式化描述。结果表明其是有效的,使得有关认知识别与判断推理等思维操作能得到较好的表达。  相似文献   
998.
循环术语集是描述逻辑长期以来的研究难点,它的最基本的问题即语义及推理问题没有得到合理的解决。分析了描述逻辑循环术语集的研究现状和存在的问题,基于图的互模拟的方法,给出了描述逻辑FL0循环术语集的可满足性条件。结果证明循环术语集的可满足性的推理是多项式复杂的。  相似文献   
999.
从命题逻辑的需求描述到状态转移图的形式规格   总被引:1,自引:0,他引:1  
信息处理系统的规模和复杂化,需要有效设计高可靠性系统的形式化的规模描述方法,本文针对以上功能,提出了基于命题逻辑的信息处理系统的新的需求描述方法,描述了通过使用逻辑PetriNet(LPN),把命题逻辑的需求描述变换成状态转移图的过程,并且给出了由LPN自动生成状态的转换图的算法。  相似文献   
1000.
用VIS验证微处理器PIC   总被引:2,自引:0,他引:2  
近年来,二叉判定图BDD和符号模型检验在形式验证数字电路设计中取得了突破性进展,文中介绍了符号模型检验的基本原理和方法,重点介绍了如何用VIS系统验证微处理器PIC设计的正确性。利用VIS证明了PIC设计部分电路的等价性。发现了一个设计错误并证明了PIC中一些重要模块的特性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号