首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5163篇
  免费   495篇
  国内免费   451篇
电工技术   172篇
综合类   391篇
化学工业   85篇
金属工艺   75篇
机械仪表   442篇
建筑科学   138篇
矿业工程   46篇
能源动力   25篇
轻工业   63篇
水利工程   43篇
石油天然气   13篇
武器工业   61篇
无线电   292篇
一般工业技术   206篇
冶金工业   245篇
原子能技术   7篇
自动化技术   3805篇
  2024年   19篇
  2023年   56篇
  2022年   97篇
  2021年   113篇
  2020年   99篇
  2019年   86篇
  2018年   76篇
  2017年   84篇
  2016年   124篇
  2015年   162篇
  2014年   229篇
  2013年   237篇
  2012年   242篇
  2011年   295篇
  2010年   250篇
  2009年   325篇
  2008年   372篇
  2007年   352篇
  2006年   404篇
  2005年   350篇
  2004年   283篇
  2003年   287篇
  2002年   230篇
  2001年   189篇
  2000年   187篇
  1999年   138篇
  1998年   140篇
  1997年   104篇
  1996年   106篇
  1995年   85篇
  1994年   87篇
  1993年   69篇
  1992年   56篇
  1991年   52篇
  1990年   29篇
  1989年   31篇
  1988年   20篇
  1987年   12篇
  1986年   9篇
  1985年   5篇
  1983年   2篇
  1982年   2篇
  1979年   2篇
  1975年   2篇
  1964年   1篇
  1962年   2篇
  1961年   2篇
  1959年   1篇
  1957年   1篇
  1955年   1篇
排序方式: 共有6109条查询结果,搜索用时 0 毫秒
71.
本文提出的判别树是一种既系统又直观地描述判别思路的模型,寄生树是一种用来判定判别树中结点的子特征的判别树。在专家系统的研究中,应用本模型有三个优点:①可有条理地描述、整理复杂的分类判别知识;②易于转换出相应的产生式规则或框架形式的知识库;③能清晰直观地指导设计高效的判别推理机。  相似文献   
72.
We present a new approach to query answering in default logics. The basic idea is to treat default rules as classical implications along with some qualifying conditions restricting the use of such rules while query answering. We accomplish this by taking advantage of the conception of structure-oriented theorem proving provided by Bibel's connection method. We show that the structure-sensitive nature of the connection method allows for an elegant characterization of proofs in default logic. After introducing our basic method for query answering in default logics, we present a corresponding algorithm and describe its implementation. Both the algorithm and its implementation are obtained by slightly modifying an existing algorithm and an existing implementation of the standard connection method. In turn, we give a couple of refinements of the basic method that lead to conceptually different algorithms. The approach turns out to be extraordinarily qualified for implementations by means of existing automated theorem proving techniques. We substantiate this claim by presenting implementations of the various algorithms along with some experimental analysis.Even though our method has a general nature, we introduce it in the first part of this paper with the example of constrained default logic. This default logic is tantamount to a variant due to Brewka, and it coincides with Reiter's default logic and a variant due to ukaszewicz on a large fragment of default logic. Accordingly, our exposition applies to these instances of default logic without any modifications.  相似文献   
73.
74.
This paper presents the core of a software system able to determine a good grasp configuration on 3D objects for a three-fingered hand. The grasp planning problem has been studied considering both the constraints due to the stability and accessibility conditions, and the ones related to functionality. Physical, geometrical, spatial and task-related knowledge for solving the grasp planning problem have been properly modelled to support a heuristic-based reasoning process. A series of heuristic rules and geometric tests are used to scan the solution space, searching for a good grasp. In fact, when considering the three-dimensional case, a purely analytical and exhaustive approach appears too complex because of the dimension of the search space. This approach results in an incremental and modular model of grasp reasoning, that has been implemented using the Flex expert system shell. This work has been developed and demonstrated within the Esprit 2 project CIM-PLATO No. 2202.  相似文献   
75.
Moving target defense (MTD) can break through asymmetry between attackers and defenders. To improve the effectiveness of cybersecurity defense techniques, defense requires not only advanced and practical defense technologies but effective, scientific decision-making methods. Due to complex attacker–defender interaction, autonomous, automatic, accurate, and effective selection of the optimal strategy is a challenging topic in the field of MTD. The essence of cybersecurity lies in the interaction between the attacker and defender. Game theory is a useful mathematical tool for strategy selection in a competitive environment. It provides strong theoretical support for the analysis of cyberattack and defense behaviors and subsequent decision-making, and can significantly improve the decision-making ability of MTD. This study presents the basic concepts of MTD and game theory, followed by a literature review, to study MTD decision-making methods based on game theory from the dimensions of space, time, space–time, and bounded rationality. Limitations of MTD game decision-making studies are discussed, as well as research directions, to provide references for future research.  相似文献   
76.
将语义数据流处理引擎与知识图谱嵌入表示学习相结合,可以有效提高实时数据流推理查询性能,但是现有的知识表示学习模型更多关注静态知识图谱嵌入,忽略了知识图谱的动态特性,导致难以应用于实时动态语义数据流推理任务。为了使知识表示学习模型适应知识图谱的在线更新并能够应用于语义数据流引擎,建立一种基于改进多嵌入空间的动态知识图谱嵌入模型PUKALE。针对传递闭包等复杂推理场景,提出3种嵌入空间生成算法。为了在进行增量更新时更合理地选择嵌入空间,设计2种嵌入空间选择算法。基于上述算法实现PUKALE模型,并将其嵌入数据流推理引擎CSPARQL-engine中,以实现实时语义数据流推理查询。实验结果表明,与传统的CSPARQL和KALE推理相比,PUKALE模型的推理查询时间分别约降低85%和93%,其在支持动态图谱嵌入的同时能够提升实时语义数据流推理准确率。  相似文献   
77.
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.  相似文献   
78.
Influence maximization of temporal social networks (IMT) is a problem that aims to find the most influential set of nodes in the temporal network so that their information can be the most widely spread. To solve the IMT problem, we propose an influence maximization algorithm based on an improved K-shell method, namely improved K-shell in temporal social networks (KT). The algorithm takes into account the global and local structures of temporal social networks. First, to obtain the kernel value Ks of each node, in the global scope, it layers the network according to the temporal characteristic of nodes by improving the K-shell method. Then, in the local scope, the calculation method of comprehensive degree is proposed to weigh the influence of nodes. Finally, the node with the highest comprehensive degree in each core layer is selected as the seed. However, the seed selection strategy of KT can easily lose some influential nodes. Thus, by optimizing the seed selection strategy, this paper proposes an efficient heuristic algorithm called improved K-shell in temporal social networks for influence maximization (KTIM). According to the hierarchical distribution of cores, the algorithm adds nodes near the central core to the candidate seed set. It then searches for seeds in the candidate seed set according to the comprehensive degree. Experiments show that KTIM is close to the best performing improved method for influence maximization of temporal graph (IMIT) algorithm in terms of effectiveness, but runs at least an order of magnitude faster than it. Therefore, considering the effectiveness and efficiency simultaneously in temporal social networks, the KTIM algorithm works better than other baseline algorithms.  相似文献   
79.
Reasoning about change is a central issue in research on human and robot planning. We study an approach to reasoning about action and change in a dynamic logic setting and provide a solution to problems which are related to the Frame problem. Unlike most work on the frame problem the logic described in this paper is monotonic. It (implicitly) allows for the occurrence of actions of multiple agents by introducing non-stationary notions of waiting and test. The need to state a large number of frame axioms is alleviated by introducing a concept of chronological preservation to dynamic logic. As a side effect, this concept permits the encoding of temporal properties in a natural way. We compare the relative merits of our approach and non-monotonic approaches as regards different aspects of the frame problem. Technically, we show that the resulting extended systems of propositional dynamic logic preserve (weak) completeness, finite model property and decidability.  相似文献   
80.
Linear Least-Squares Algorithms for Temporal Difference Learning   总被引:8,自引:2,他引:6  
We introduce two new temporal difference (TD) algorithms based on the theory of linear least-squares function approximation. We define an algorithm we call Least-Squares TD (LS TD) for which we prove probability-one convergence when it is used with a function approximator linear in the adjustable parameters. We then define a recursive version of this algorithm, Recursive Least-Square TD (RLS TD). Although these new TD algorithms require more computation per time-step than do Suttons TD() algorithms, they are more efficient in a statistical sense because they extract more information from training experiences. We describe a simulation experiment showing the substantial improvement in learning rate achieved by RLS TD in an example Markov prediction problem. To quantify this improvement, we introduce the TD error variance of a Markov chain, TD, and experimentally conclude that the convergence rate of a TD algorithm depends linearly on TD. In addition to converging more rapidly, LS TD and RLS TD do not have control parameters, such as a learning rate parameter, thus eliminating the possibility of achieving poor performance by an unlucky choice of parameters.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号