全文获取类型
收费全文 | 36052篇 |
免费 | 3774篇 |
国内免费 | 2548篇 |
专业分类
电工技术 | 2602篇 |
技术理论 | 8篇 |
综合类 | 5273篇 |
化学工业 | 2801篇 |
金属工艺 | 903篇 |
机械仪表 | 2327篇 |
建筑科学 | 3508篇 |
矿业工程 | 1267篇 |
能源动力 | 1255篇 |
轻工业 | 505篇 |
水利工程 | 1033篇 |
石油天然气 | 896篇 |
武器工业 | 602篇 |
无线电 | 3224篇 |
一般工业技术 | 4244篇 |
冶金工业 | 2247篇 |
原子能技术 | 329篇 |
自动化技术 | 9350篇 |
出版年
2024年 | 122篇 |
2023年 | 565篇 |
2022年 | 753篇 |
2021年 | 973篇 |
2020年 | 1118篇 |
2019年 | 999篇 |
2018年 | 1047篇 |
2017年 | 1199篇 |
2016年 | 1305篇 |
2015年 | 1347篇 |
2014年 | 2074篇 |
2013年 | 2525篇 |
2012年 | 2283篇 |
2011年 | 2652篇 |
2010年 | 2093篇 |
2009年 | 2185篇 |
2008年 | 2266篇 |
2007年 | 2382篇 |
2006年 | 2206篇 |
2005年 | 1926篇 |
2004年 | 1555篇 |
2003年 | 1288篇 |
2002年 | 1120篇 |
2001年 | 898篇 |
2000年 | 775篇 |
1999年 | 694篇 |
1998年 | 525篇 |
1997年 | 472篇 |
1996年 | 397篇 |
1995年 | 382篇 |
1994年 | 315篇 |
1993年 | 271篇 |
1992年 | 248篇 |
1991年 | 177篇 |
1990年 | 147篇 |
1989年 | 167篇 |
1988年 | 127篇 |
1987年 | 65篇 |
1986年 | 90篇 |
1985年 | 68篇 |
1984年 | 66篇 |
1983年 | 47篇 |
1982年 | 53篇 |
1981年 | 41篇 |
1980年 | 31篇 |
1979年 | 31篇 |
1978年 | 29篇 |
1977年 | 26篇 |
1964年 | 28篇 |
1955年 | 37篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
891.
平均保障延误时间(MLDT)建模方法研究 总被引:1,自引:0,他引:1
针对现代装备系统的精确化保障要求,对装备保障的主要参数指标MLDT进行了建模分析,主要分析了三种计算方法:图估法、解析法和基于排队论的MLDT建模理论,解决了评估MLDT指标时的定量计算问题。 相似文献
892.
雷丽萍 《计算机与数字工程》2011,(10):134-137
入侵检测技术是保证计算机网络安全的核心技术之一,在网络安全领域内发挥着重要的作用。但是目前的入侵检测系统不够完善,文章通过对记忆原理和模糊理论的分析将其应用在已有的入侵检测系统中,提出了一种新的基于生物模糊记忆的入侵检测系统模型,并用实验证明该模型具有更好的检测效果。 相似文献
893.
针对目前实时入侵检测系统所处理的网络数据具有的非线性和高维的特点,提出基于粗糙集理论的进化神经网络入侵检测方法。对网络中截获的数据,利用粗糙集属性约简方法对其属性集进行约简,得到影响分类精度的重要属性。把约简后形成的训练样本进行数值化和归一化处理,作为神经网络的输入数据,再利用遗传算法较强的宏观搜索能力和全局寻优的特点,优化神经网络权值,并在此基础上进行神经网络学习,从而建立入侵检测系统的优化分析模型。实验结果表明,该算法学习速度快,有效提高了入侵检测系统的检测效率。 相似文献
894.
YIN YunFei GONG GuangHong & HAN Liang College of Computer Science Chongqing University Chongqing China School of Automation Science Electrical Engineering Beijing University of Aeronautics Astronautics Beijing 《中国科学:信息科学(英文版)》2011,(4)
For the large quantity of data,rules and models generated in the course of computer generated forces (CGFs) behavior modeling,the common analytical methods are statistical methods based on the tactical rules,tactical doctrine and empirical knowledge.However,from the viewpoint of data mining,we can find many of these analytical methods are also each-and-every different data mining methods.In this paper,we survey the data mining theory and techniques that have appeared in the course of CGF behavior modeling f... 相似文献
895.
为了解决在校园网内部分网络安全事件和故障事件中只能确认攻击和事故的发生,而无法确定攻击和事故的源头这一问题.文章提出一种三步骤的校园网内网网络事件源定位模型.该模型将神经网络和证据理论相结合应用于攻击源定位.提高了校园网内网攻击定位的效率和准确性. 相似文献
896.
In this paper, we develop the idea of a universal anytime intelligence test. The meaning of the terms “universal” and “anytime” is manifold here: the test should be able to measure the intelligence of any biological or artificial system that exists at this time or in the future. It should also be able to evaluate both inept and brilliant systems (any intelligence level) as well as very slow to very fast systems (any time scale). Also, the test may be interrupted at any time, producing an approximation to the intelligence score, in such a way that the more time is left for the test, the better the assessment will be. In order to do this, our test proposal is based on previous works on the measurement of machine intelligence based on Kolmogorov complexity and universal distributions, which were developed in the late 1990s (C-tests and compression-enhanced Turing tests). It is also based on the more recent idea of measuring intelligence through dynamic/interactive tests held against a universal distribution of environments. We discuss some of these tests and highlight their limitations since we want to construct a test that is both general and practical. Consequently, we introduce many new ideas that develop early “compression tests” and the more recent definition of “universal intelligence” in order to design new “universal intelligence tests”, where a feasible implementation has been a design requirement. One of these tests is the “anytime intelligence test”, which adapts to the examinee's level of intelligence in order to obtain an intelligence score within a limited time. 相似文献
897.
James Pita Milind Tambe Fernando Ordóñez Sarit Kraus 《Artificial Intelligence》2010,174(15):1142-1171
How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such as oligopolistic markets and security domains. In Stackelberg games, one player, the leader, commits to a strategy and the follower makes her decision with knowledge of the leader's commitment. Existing algorithms for Stackelberg games efficiently find optimal solutions (leader strategy), but they critically assume that the follower plays optimally. Unfortunately, in many applications, agents face human followers (adversaries) who — because of their bounded rationality and limited observation of the leader strategy — may deviate from their expected optimal response. In other words, human adversaries' decisions are biased due to their bounded rationality and limited observations. Not taking into account these likely deviations when dealing with human adversaries may cause an unacceptable degradation in the leader's reward, particularly in security applications where these algorithms have seen deployment. The objective of this paper therefore is to investigate how to build algorithms for agent interactions with human adversaries.To address this crucial problem, this paper introduces a new mixed-integer linear program (MILP) for Stackelberg games to consider human adversaries, incorporating: (i) novel anchoring theories on human perception of probability distributions and (ii) robustness approaches for MILPs to address human imprecision. Since this new approach considers human adversaries, traditional proofs of correctness or optimality are insufficient; instead, it is necessary to rely on empirical validation. To that end, this paper considers four settings based on real deployed security systems at Los Angeles International Airport (Pita et al., 2008 [35]), and compares 6 different approaches (three based on our new approach and three previous approaches), in 4 different observability conditions, involving 218 human subjects playing 2960 games in total. The final conclusion is that a model which incorporates both the ideas of robustness and anchoring achieves statistically significant higher rewards and also maintains equivalent or faster solution speeds compared to existing approaches. 相似文献
898.
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the communication graph is a tree. It is shown how the relation between tree graphs and the null space of the corresponding incidence matrix encode fundamental properties for these two multi-agent control problems. 相似文献
899.
This communique presents forced second-order consensus protocols with communication time-delays for the network of agents with double integrator dynamics and gives a measure of the robustness of the protocols to the communication time-delays. By employing a frequency domain method, it is proven that the forced consensus is achieved asymptotically for appropriate time-delay if the network is connected. Particularly, the maximum fixed time-delay that can be tolerated by the network is found. The forced consensus protocols are distributed in the sense that each agent only needs information from its neighboring agents, which reduces the complexity of connections between agents significantly. Numerical simulation results are provided to demonstrate the effectiveness and the sharpness of the theoretical results. 相似文献
900.
In this paper, we consider the problem of how to derive mass functions systematically from data samples. We also consider the ensuing problem of how to combine different mass functions derived in this way. We show that a mass function can be efficiently and systematically derived from multivariate data. We also demonstrate that combining mass functions obtained in this manner can be done easily. The way of deriving and combining mass functions is illustrated with a simple example. 相似文献