全文获取类型
收费全文 | 5163篇 |
免费 | 495篇 |
国内免费 | 451篇 |
专业分类
电工技术 | 172篇 |
综合类 | 391篇 |
化学工业 | 85篇 |
金属工艺 | 75篇 |
机械仪表 | 442篇 |
建筑科学 | 138篇 |
矿业工程 | 46篇 |
能源动力 | 25篇 |
轻工业 | 63篇 |
水利工程 | 43篇 |
石油天然气 | 13篇 |
武器工业 | 61篇 |
无线电 | 292篇 |
一般工业技术 | 206篇 |
冶金工业 | 245篇 |
原子能技术 | 7篇 |
自动化技术 | 3805篇 |
出版年
2024年 | 19篇 |
2023年 | 56篇 |
2022年 | 97篇 |
2021年 | 113篇 |
2020年 | 99篇 |
2019年 | 86篇 |
2018年 | 76篇 |
2017年 | 84篇 |
2016年 | 124篇 |
2015年 | 162篇 |
2014年 | 229篇 |
2013年 | 237篇 |
2012年 | 242篇 |
2011年 | 295篇 |
2010年 | 250篇 |
2009年 | 325篇 |
2008年 | 372篇 |
2007年 | 352篇 |
2006年 | 404篇 |
2005年 | 350篇 |
2004年 | 283篇 |
2003年 | 287篇 |
2002年 | 230篇 |
2001年 | 189篇 |
2000年 | 187篇 |
1999年 | 138篇 |
1998年 | 140篇 |
1997年 | 104篇 |
1996年 | 106篇 |
1995年 | 85篇 |
1994年 | 87篇 |
1993年 | 69篇 |
1992年 | 56篇 |
1991年 | 52篇 |
1990年 | 29篇 |
1989年 | 31篇 |
1988年 | 20篇 |
1987年 | 12篇 |
1986年 | 9篇 |
1985年 | 5篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1979年 | 2篇 |
1975年 | 2篇 |
1964年 | 1篇 |
1962年 | 2篇 |
1961年 | 2篇 |
1959年 | 1篇 |
1957年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有6109条查询结果,搜索用时 0 毫秒
71.
陈家发 《计算机研究与发展》1994,(4)
本文提出的判别树是一种既系统又直观地描述判别思路的模型,寄生树是一种用来判定判别树中结点的子特征的判别树。在专家系统的研究中,应用本模型有三个优点:①可有条理地描述、整理复杂的分类判别知识;②易于转换出相应的产生式规则或框架形式的知识库;③能清晰直观地指导设计高效的判别推理机。 相似文献
72.
T. Schaub 《Journal of Automated Reasoning》1995,15(1):95-165
We present a new approach to query answering in default logics. The basic idea is to treat default rules as classical implications along with some qualifying conditions restricting the use of such rules while query answering. We accomplish this by taking advantage of the conception of structure-oriented theorem proving provided by Bibel's connection method. We show that the structure-sensitive nature of the connection method allows for an elegant characterization of proofs in default logic. After introducing our basic method for query answering in default logics, we present a corresponding algorithm and describe its implementation. Both the algorithm and its implementation are obtained by slightly modifying an existing algorithm and an existing implementation of the standard connection method. In turn, we give a couple of refinements of the basic method that lead to conceptually different algorithms. The approach turns out to be extraordinarily qualified for implementations by means of existing automated theorem proving techniques. We substantiate this claim by presenting implementations of the various algorithms along with some experimental analysis.Even though our method has a general nature, we introduce it in the first part of this paper with the example of constrained default logic. This default logic is tantamount to a variant due to Brewka, and it coincides with Reiter's default logic and a variant due to ukaszewicz on a large fragment of default logic. Accordingly, our exposition applies to these instances of default logic without any modifications. 相似文献
73.
74.
P. Bison C. Ferrari E. Pagello L. Stocchiero 《Journal of Intelligent and Robotic Systems》1995,13(1):45-74
This paper presents the core of a software system able to determine a good grasp configuration on 3D objects for a three-fingered hand. The grasp planning problem has been studied considering both the constraints due to the stability and accessibility conditions, and the ones related to functionality. Physical, geometrical, spatial and task-related knowledge for solving the grasp planning problem have been properly modelled to support a heuristic-based reasoning process. A series of heuristic rules and geometric tests are used to scan the solution space, searching for a good grasp. In fact, when considering the three-dimensional case, a purely analytical and exhaustive approach appears too complex because of the dimension of the search space. This approach results in an incremental and modular model of grasp reasoning, that has been implemented using the Flex expert system shell. This work has been developed and demonstrated within the Esprit 2 project CIM-PLATO No. 2202. 相似文献
75.
Moving target defense (MTD) can break through asymmetry between attackers and defenders. To improve the effectiveness of cybersecurity defense techniques, defense requires not only advanced and practical defense technologies but effective, scientific decision-making methods. Due to complex attacker–defender interaction, autonomous, automatic, accurate, and effective selection of the optimal strategy is a challenging topic in the field of MTD. The essence of cybersecurity lies in the interaction between the attacker and defender. Game theory is a useful mathematical tool for strategy selection in a competitive environment. It provides strong theoretical support for the analysis of cyberattack and defense behaviors and subsequent decision-making, and can significantly improve the decision-making ability of MTD. This study presents the basic concepts of MTD and game theory, followed by a literature review, to study MTD decision-making methods based on game theory from the dimensions of space, time, space–time, and bounded rationality. Limitations of MTD game decision-making studies are discussed, as well as research directions, to provide references for future research. 相似文献
76.
将语义数据流处理引擎与知识图谱嵌入表示学习相结合,可以有效提高实时数据流推理查询性能,但是现有的知识表示学习模型更多关注静态知识图谱嵌入,忽略了知识图谱的动态特性,导致难以应用于实时动态语义数据流推理任务。为了使知识表示学习模型适应知识图谱的在线更新并能够应用于语义数据流引擎,建立一种基于改进多嵌入空间的动态知识图谱嵌入模型PUKALE。针对传递闭包等复杂推理场景,提出3种嵌入空间生成算法。为了在进行增量更新时更合理地选择嵌入空间,设计2种嵌入空间选择算法。基于上述算法实现PUKALE模型,并将其嵌入数据流推理引擎CSPARQL-engine中,以实现实时语义数据流推理查询。实验结果表明,与传统的CSPARQL和KALE推理相比,PUKALE模型的推理查询时间分别约降低85%和93%,其在支持动态图谱嵌入的同时能够提升实时语义数据流推理准确率。 相似文献
77.
Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《计算机、材料和连续体(英文)》2023,75(2):2957-2979
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 相似文献
78.
Influence maximization of temporal social networks (IMT) is a problem that aims to find the most influential set of nodes in the temporal network so that their information can be the most widely spread. To solve the IMT problem, we propose an influence maximization algorithm based on an improved K-shell method, namely improved K-shell in temporal social networks (KT). The algorithm takes into account the global and local structures of temporal social networks. First, to obtain the kernel value Ks of each node, in the global scope, it layers the network according to the temporal characteristic of nodes by improving the K-shell method. Then, in the local scope, the calculation method of comprehensive degree is proposed to weigh the influence of nodes. Finally, the node with the highest comprehensive degree in each core layer is selected as the seed. However, the seed selection strategy of KT can easily lose some influential nodes. Thus, by optimizing the seed selection strategy, this paper proposes an efficient heuristic algorithm called improved K-shell in temporal social networks for influence maximization (KTIM). According to the hierarchical distribution of cores, the algorithm adds nodes near the central core to the candidate seed set. It then searches for seeds in the candidate seed set according to the comprehensive degree. Experiments show that KTIM is close to the best performing improved method for influence maximization of temporal graph (IMIT) algorithm in terms of effectiveness, but runs at least an order of magnitude faster than it. Therefore, considering the effectiveness and efficiency simultaneously in temporal social networks, the KTIM algorithm works better than other baseline algorithms. 相似文献
79.
Reasoning about change is a central issue in research on human and robot planning. We study an approach to reasoning about action and change in a dynamic logic setting and provide a solution to problems which are related to the Frame problem. Unlike most work on the frame problem the logic described in this paper is monotonic. It (implicitly) allows for the occurrence of actions of multiple agents by introducing non-stationary notions of waiting and test. The need to state a large number of frame axioms is alleviated by introducing a concept of chronological preservation to dynamic logic. As a side effect, this concept permits the encoding of temporal properties in a natural way. We compare the relative merits of our approach and non-monotonic approaches as regards different aspects of the frame problem. Technically, we show that the resulting extended systems of propositional dynamic logic preserve (weak) completeness, finite model property and decidability. 相似文献
80.
Linear Least-Squares Algorithms for Temporal Difference Learning 总被引:8,自引:2,他引:6
We introduce two new temporal difference (TD) algorithms based on the theory of linear least-squares function approximation. We define an algorithm we call Least-Squares TD (LS TD) for which we prove probability-one convergence when it is used with a function approximator linear in the adjustable parameters. We then define a recursive version of this algorithm, Recursive Least-Square TD (RLS TD). Although these new TD algorithms require more computation per time-step than do Suttons TD() algorithms, they are more efficient in a statistical sense because they extract more information from training experiences. We describe a simulation experiment showing the substantial improvement in learning rate achieved by RLS TD in an example Markov prediction problem. To quantify this improvement, we introduce the TD error variance of a Markov chain, TD, and experimentally conclude that the convergence rate of a TD algorithm depends linearly on TD. In addition to converging more rapidly, LS TD and RLS TD do not have control parameters, such as a learning rate parameter, thus eliminating the possibility of achieving poor performance by an unlucky choice of parameters. 相似文献