全文获取类型
收费全文 | 72946篇 |
免费 | 7547篇 |
国内免费 | 4629篇 |
专业分类
电工技术 | 3361篇 |
技术理论 | 8篇 |
综合类 | 9042篇 |
化学工业 | 9845篇 |
金属工艺 | 5274篇 |
机械仪表 | 4070篇 |
建筑科学 | 12311篇 |
矿业工程 | 3108篇 |
能源动力 | 1792篇 |
轻工业 | 2545篇 |
水利工程 | 2428篇 |
石油天然气 | 2107篇 |
武器工业 | 875篇 |
无线电 | 4009篇 |
一般工业技术 | 9216篇 |
冶金工业 | 4942篇 |
原子能技术 | 464篇 |
自动化技术 | 9725篇 |
出版年
2024年 | 308篇 |
2023年 | 1115篇 |
2022年 | 1758篇 |
2021年 | 2245篇 |
2020年 | 2346篇 |
2019年 | 2093篇 |
2018年 | 2195篇 |
2017年 | 2713篇 |
2016年 | 2808篇 |
2015年 | 2864篇 |
2014年 | 4267篇 |
2013年 | 5031篇 |
2012年 | 4929篇 |
2011年 | 5316篇 |
2010年 | 4079篇 |
2009年 | 4222篇 |
2008年 | 4136篇 |
2007年 | 4639篇 |
2006年 | 4301篇 |
2005年 | 3733篇 |
2004年 | 3086篇 |
2003年 | 2590篇 |
2002年 | 2265篇 |
2001年 | 1876篇 |
2000年 | 1618篇 |
1999年 | 1432篇 |
1998年 | 1129篇 |
1997年 | 952篇 |
1996年 | 812篇 |
1995年 | 736篇 |
1994年 | 599篇 |
1993年 | 512篇 |
1992年 | 431篇 |
1991年 | 300篇 |
1990年 | 268篇 |
1989年 | 273篇 |
1988年 | 180篇 |
1987年 | 114篇 |
1986年 | 106篇 |
1985年 | 85篇 |
1984年 | 82篇 |
1983年 | 59篇 |
1982年 | 69篇 |
1981年 | 47篇 |
1980年 | 47篇 |
1979年 | 45篇 |
1978年 | 30篇 |
1977年 | 26篇 |
1964年 | 30篇 |
1955年 | 35篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
An important problem in agent verification is a lack of proper understanding of the relation between agent programs on the
one hand and agent logics on the other. Understanding this relation would help to establish that an agent programming language
is both conceptually well-founded and well-behaved, as well as yield a way to reason about agent programs by means of agent
logics. As a step toward bridging this gap, we study several issues that need to be resolved in order to establish a precise
mathematical relation between a modal agent logic and an agent programming language specified by means of an operational semantics. In this paper, we present an agent programming theory that provides both an agent programming language as well as a corresponding agent verification logic to verify agent programs.
The theory is developed in stages to show, first, how a modal semantics can be grounded in a state-based semantics, and, second, how denotational semantics can be used to define the mathematical relation connecting the logic and agent programming language. Additionally, it is
shown how to integrate declarative goals and add precompiled plans to the programming theory. In particular, we discuss the
use of the concept of higher-order goals in our theory. Other issues such as a complete axiomatization and the complexity
of decision procedures for the verification logic are not the focus of this paper and remain for future investigation.
Part of this research was carried out while the first author was affiliated with the Nijmegen Institute for Cognition and
Information, Radboud University Nijmegen. 相似文献
992.
N. Zaerpour M. Rabbani A. H. Gharehgozli R. Tavakkoli-Moghaddam 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(11):1035-1054
Manufacturing systems produce their products by making use of three main strategies: make-to-order, make-to-stock and hybrid
(combination of MTO and MTS strategies) systems. Hence, several products must be considered and partitioned in terms of many
different conflicting criteria, leading to a large set of subjective or ambiguous data. Thus, an effective evaluation approach
is essential to improve decision quality. In this paper a comprehensive decision, making structure is proposed to choose the
proper strategy for producing the products. It consists of a novel hybrid methodology, which combines analytical hierarchy
process (AHP) and technique for order performance by similarity to ideal solution (TOPSIS) for partitioning of products. In
this study, the rating of each alternative regarding different criteria (throughout the TOPSIS technique) is described by
means of linguistic variables. Furthermore, fuzzy AHP methodology is applied to determine the weights of evaluation criteria.
At the end, the effectiveness of the proposed model is demonstrated through a case study. 相似文献
993.
Collaborative technologies offer a range of new ways of supporting learning by enabling learners to share and exchange both
ideas and their own digital products. This paper considers how best to exploit these opportunities from the perspective of
learners’ needs. New technologies invariably excite a creative explosion of new ideas for ways of doing teaching and learning,
although the technologies themselves are rarely designed with teaching and learning in mind. To get the best from them for
education we need to start with the requirements of education, in terms of both learners’ and teachers’ needs. The argument
put forward in this paper is to use what we know about what it takes to learn, and build this into a pedagogical framework
with which to challenge digital technologies to deliver a genuinely enhanced learning experience. 相似文献
994.
Jiangtao Li Ninghui Li XiaoFeng Wang Ting Yu 《International Journal of Information Security》2009,8(2):89-101
Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server
often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive
digital signature verifications. In this paper, we study low-bandwidth Denial-of-Service (DoS) attacks that exploit the existence
of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level
protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting
the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume
a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management
servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management
systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show
that it is effective in the presence of intelligent attackers.
A preliminary version of this paper was presented at the Second IEEE International Conference on Security and Privacy in Communication
Networks, Baltimore, MD, USA, August 2006. 相似文献
995.
D-S证据理论在移动机器人信息融合中的应用 总被引:3,自引:0,他引:3
移动机器人的自动能力中实时避障和导航是一个很关键的技术,研究中主要的问题是:机器人在运动时需要充分的环境信息,而且处理这些信息的速度要快,同时也要满足实时性的要求。详细介绍了将D-S证据理论应用于移动机器人对未知环境的探索、感知过程,并通过仿真结果对D-S证据融合方法的性能进行研究与改进,确定了D-S证据融合方案的具体实现步骤,并完成了一个简化的仿真算例,得出了相关结论。 相似文献
996.
In this paper, we present an analysis and synthesis approach for guaranteeing that the phase of a single-input, single-output closed-loop transfer function is contained in the interval [−α,α] for a given α>0 at all frequencies. Specifically, we first derive a sufficient condition involving a frequency domain inequality for guaranteeing a given phase constraint. Next, we use the Kalman–Yakubovich–Popov theorem to derive an equivalent time domain condition. In the case where , we show that frequency and time domain sufficient conditions specialize to the positivity theorem. Furthermore, using linear matrix inequalities, we develop a controller synthesis approach for guaranteeing a phase constraint on the closed-loop transfer function. Finally, we extend this synthesis approach to address mixed gain and phase constraints on the closed-loop transfer function. 相似文献
997.
998.
提出了一种新的粗糙集双重学习方法,该方法能用遗传算法实现外层学习,用规则提取方法进行内层学习.其基本思想是:首先引入遗传算法,将属性编码,并针对不同的属性组合进行规则提取;然后用测试样本对规则集进行检验,并基于所得到的识别率建立适应度函数;最后在合适的遗传算子下获取最佳的属性组合及相应的知识规则.与其他方法相比,本文所提粗糙集双重学习方法集属性约简和规则提取于一体,整个过程具有很强的自适应能力.最后,用算例对本文方法进行了验证. 相似文献
999.
1000.
3-gated:WLAN中基于负载自适应的动态调度机制 总被引:1,自引:0,他引:1
本文针对实时业务在网络负载增加情况下的特点,改进了文[3]的结果,提出了一种新的无线网络MAC层动态调度机制:3-gated调度算法.该机制实现简单,并且可以在不改变现有协议构架甚至不增加开销的基础上较好解决实时业务在网络负载加大环境下用户时延QoS不能得到满足的问题.运用嵌入式马尔可夫链理论和多维概率母函数的方法对该算法进行建模,得到了改进后网络队列缓存的平均排队队长和信息分组平均时延理论解析式.通过仿真验证了理论分析的有效性,表明3-gated算法性能十分接近对称业务最优算法--完全服务调度算法,并避免了后者公平性差的弊端. 相似文献