全文获取类型
收费全文 | 34239篇 |
免费 | 4327篇 |
国内免费 | 3531篇 |
专业分类
电工技术 | 4531篇 |
技术理论 | 4篇 |
综合类 | 5705篇 |
化学工业 | 734篇 |
金属工艺 | 620篇 |
机械仪表 | 2984篇 |
建筑科学 | 1417篇 |
矿业工程 | 1121篇 |
能源动力 | 823篇 |
轻工业 | 790篇 |
水利工程 | 990篇 |
石油天然气 | 633篇 |
武器工业 | 599篇 |
无线电 | 3262篇 |
一般工业技术 | 1780篇 |
冶金工业 | 581篇 |
原子能技术 | 118篇 |
自动化技术 | 15405篇 |
出版年
2024年 | 138篇 |
2023年 | 342篇 |
2022年 | 578篇 |
2021年 | 665篇 |
2020年 | 876篇 |
2019年 | 850篇 |
2018年 | 801篇 |
2017年 | 948篇 |
2016年 | 1150篇 |
2015年 | 1311篇 |
2014年 | 1977篇 |
2013年 | 2124篇 |
2012年 | 2448篇 |
2011年 | 2816篇 |
2010年 | 2086篇 |
2009年 | 2305篇 |
2008年 | 2446篇 |
2007年 | 2920篇 |
2006年 | 2628篇 |
2005年 | 2229篇 |
2004年 | 1760篇 |
2003年 | 1542篇 |
2002年 | 1252篇 |
2001年 | 1095篇 |
2000年 | 963篇 |
1999年 | 770篇 |
1998年 | 641篇 |
1997年 | 495篇 |
1996年 | 404篇 |
1995年 | 346篇 |
1994年 | 300篇 |
1993年 | 201篇 |
1992年 | 165篇 |
1991年 | 127篇 |
1990年 | 80篇 |
1989年 | 96篇 |
1988年 | 55篇 |
1987年 | 35篇 |
1986年 | 25篇 |
1985年 | 22篇 |
1984年 | 14篇 |
1983年 | 24篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 5篇 |
1978年 | 3篇 |
1977年 | 6篇 |
1973年 | 3篇 |
1957年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
82.
On the Decidability of Continuous Time Specification Formalisms 总被引:3,自引:0,他引:3
83.
84.
85.
Bumhwi KimAuthor Vitae 《Neurocomputing》2011,74(4):646-655
A new incrementally growing neural network model, called the growing fuzzy topology ART (GFTART) model, is proposed based on integrating the conventional fuzzy ART model with the incremental topology-preserving mechanism of the growing cell structure (GCS) model. This is in addition, to a new training algorithm, called the push-pull learning algorithm. The proposed GFTART model has two purposes: First, to reduce the proliferation of incrementally generated nodes in the F2 layer by the conventional fuzzy ART model based on replacing each F2 node with a GCS. Second, to enhance the class-dependent clustering representation ability of the GCS model by including the categorization property of the conventional fuzzy ART model. In addition, the proposed push-pull training algorithm enhances the cluster discriminating property and partially improves the forgetting problem of the training algorithm in the GCS model. 相似文献
86.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA. 相似文献
87.
This paper presents a systematic approach for decreasing conservativeness in stability analysis and control design for Takagi-Sugeno (TS) systems. This approach is based on the idea of multiple Lyapunov functions together with simple techniques for introducing slack matrices. Unlike some previous approaches based on multiple Lyapunov functions, both the stability and the stabilization conditions are written as linear matrix inequality (LMI) problems. The proposed approach reduces the number of inequalities and guarantees extra degrees of freedom to the LMI problems. Numeric examples illustrate the effectiveness of this method. 相似文献
88.
This work presents a general mechanism for executing specifications that comply with given invariants, which may be expressed in different formalisms and logics. We exploit Maude’s reflective capabilities and its properties as a general semantic framework to provide a generic strategy that allows us to execute Maude specifications taking into account user-defined invariants. The strategy is parameterized by the invariants and by the logic in which such invariants are expressed. We experiment with different logics, providing examples for propositional logic, (finite future time) linear temporal logic and metric temporal logic. 相似文献
89.
受到Agent偏好模型的启发,提出了一个新的描述人们行为的偏好系统称为AF系统,它将Michael Freund的理性偏好推理与Adams提出的经典的归纳逻辑和概率逻辑相结合,即借助经典的逻辑系统,把人们的逻辑推理和以人们的偏好取向为基础的常识性推理以及以主观愿望为基础的意向推理结合在一起成为一个有机系统,并且在这个系统下提出Agent的理性偏好的建立方法以及推理步骤.最后给出一个实例,说明它能根据人们的部分愿望,全面估计人们的偏好走向,而且一旦人们的基本态度有所转向,偏好结构也可做相应调整,无需做根本改动,因此它具有鲁棒性和实用价值. 相似文献
90.
基于模糊支持向量机的步态识别 总被引:2,自引:0,他引:2
提出基于模糊支持向量机(FSVM)的步态识别方法,以人体步态的宽度向量作为特征,探讨直接取值法和模糊C均值2种模糊隶属度确定方法对FSVM步态分类效果的影响。实验结果表明,模糊C均值法的识别率均略好于SVM,直接取值法的识别率甚至低于SVM,因此,选取正确的模糊隶属度确定方法是FSVM能否成功应用于步态识别的关键。 相似文献