全文获取类型
收费全文 | 33882篇 |
免费 | 4337篇 |
国内免费 | 3492篇 |
专业分类
电工技术 | 4523篇 |
技术理论 | 4篇 |
综合类 | 5689篇 |
化学工业 | 732篇 |
金属工艺 | 618篇 |
机械仪表 | 2980篇 |
建筑科学 | 1417篇 |
矿业工程 | 1102篇 |
能源动力 | 814篇 |
轻工业 | 743篇 |
水利工程 | 988篇 |
石油天然气 | 632篇 |
武器工业 | 598篇 |
无线电 | 3220篇 |
一般工业技术 | 1759篇 |
冶金工业 | 483篇 |
原子能技术 | 118篇 |
自动化技术 | 15291篇 |
出版年
2024年 | 112篇 |
2023年 | 322篇 |
2022年 | 567篇 |
2021年 | 654篇 |
2020年 | 847篇 |
2019年 | 822篇 |
2018年 | 774篇 |
2017年 | 919篇 |
2016年 | 1124篇 |
2015年 | 1296篇 |
2014年 | 1959篇 |
2013年 | 2101篇 |
2012年 | 2434篇 |
2011年 | 2810篇 |
2010年 | 2077篇 |
2009年 | 2297篇 |
2008年 | 2435篇 |
2007年 | 2909篇 |
2006年 | 2621篇 |
2005年 | 2227篇 |
2004年 | 1757篇 |
2003年 | 1534篇 |
2002年 | 1249篇 |
2001年 | 1092篇 |
2000年 | 961篇 |
1999年 | 768篇 |
1998年 | 635篇 |
1997年 | 487篇 |
1996年 | 400篇 |
1995年 | 342篇 |
1994年 | 294篇 |
1993年 | 199篇 |
1992年 | 165篇 |
1991年 | 126篇 |
1990年 | 79篇 |
1989年 | 96篇 |
1988年 | 54篇 |
1987年 | 35篇 |
1986年 | 25篇 |
1985年 | 21篇 |
1984年 | 14篇 |
1983年 | 24篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 5篇 |
1978年 | 3篇 |
1977年 | 6篇 |
1973年 | 3篇 |
1957年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
171.
An adaptive fuzzy decentralized backstepping output-feedback control approach is proposed for a class of nonlinear large-scale systems with completely unknown functions,the interconnections mismatched in control inputs,and without the measurements of the states.Fuzzy logic systems are employed to approximate the unknown nonlinear functions,and an adaptive high-gain observer is developed to estimate the unmeasured states.Using the designed high-gain observer,and combining the fuzzy adaptive control theory with backstepping approach,an adaptive fuzzy decentralized backstepping output-feedback control scheme is developed.It is proved that the proposed control approach can guarantee that all the signals of the closed-loop system are semi-globally uniformly ultimately bounded(SUUB),and that the observer errors and the tracking errors converge to a small neighborhood of the origin by appropriate choice of the design parameters.Finally,a simulation example is provided to show the eectiveness of the proposed approach. 相似文献
172.
173.
174.
How to compose existing web services automatically and to guarantee the correctness of the design (e.g. temporal constraints specified by temporal logic LTL, CTL or CTL*) is an important and challenging problem in web services. Most existing approaches use the process in conventional software development of design, verification, analysis and correction to guarantee the correctness of composite services, which makes the composition process both complex and time-consuming. In this paper, we focus on the synthesis problem of composite service; that is, for a given set of services and correctness constraint specified by CTL or CTL* formula, a composite service is automatically constructed which guarantees that the correctness is ensured. We prove that the synthesis problem for CTL and CTL* are complete for EXPTIME and 2EXPTIME, respectively. Moreover, for the case of synthesis failure, we discuss the problem of how to disable outputs of environment (i.e. users or services) reasonably to make synthesis successful, which are also proved complete for EXPTIME and 2EXPTIME for CTL and CTL*, respectively. 相似文献
175.
《中国科学:信息科学(英文版)》2012,(1):149-164
It is significant to automatically detect and resolve the incompliance in security policy.Most existing works in this field focus on compliance verification,and few of them provide approaches to automatically correct the incompliant security policies.This paper proposes a novel approach to automatically transform a given security policy into a compliant one.Given security policy Π and delegation policy M declared by logic programs,the approach automatically rewrites Π into a new one ΠM which is compliant with M and is readable by the humans.We prove that the algorithm is sound and complete under noninterference assumption.Formally,we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on ΠM.The approach is automatic,so it doesn’t require a administrator with excess abilities.In this sense,our proposal can help us to save much manpower resource in security management and improves the security assurance abilities. 相似文献
176.
177.
Kaman协议是移动Ad Hoc网络安全认证机制,然而,协议设计者未对该协议的安全性作严格的形式化分析。协议复合逻辑PCL是验证协议安全属性的形式化方法,PCL逻辑能够简化协议安全分析过程。本文在协议复合逻辑PCL中描述Kaman协议并分析Kaman协议的安全属性,证明Kaman协议能够实现其安全目标。 相似文献
178.
179.
180.
在综述目前广泛研究的智能终端模式的基础上,提出了一种新的基于智能终端和面向服务体系结构的移动MIS基础平台。该平台基于智能客户端技术和元数据业务模型,可以实现移动公办与后台管理信息系统的结合。详细阐述了移动MIS基础平台的设计、实现及其优点。 相似文献