全文获取类型
收费全文 | 37883篇 |
免费 | 4194篇 |
国内免费 | 2795篇 |
专业分类
电工技术 | 2925篇 |
技术理论 | 8篇 |
综合类 | 5627篇 |
化学工业 | 2798篇 |
金属工艺 | 912篇 |
机械仪表 | 2393篇 |
建筑科学 | 3651篇 |
矿业工程 | 1294篇 |
能源动力 | 1294篇 |
轻工业 | 529篇 |
水利工程 | 1058篇 |
石油天然气 | 884篇 |
武器工业 | 642篇 |
无线电 | 3486篇 |
一般工业技术 | 4453篇 |
冶金工业 | 2168篇 |
原子能技术 | 328篇 |
自动化技术 | 10422篇 |
出版年
2024年 | 151篇 |
2023年 | 642篇 |
2022年 | 873篇 |
2021年 | 1117篇 |
2020年 | 1274篇 |
2019年 | 1150篇 |
2018年 | 1163篇 |
2017年 | 1310篇 |
2016年 | 1423篇 |
2015年 | 1458篇 |
2014年 | 2234篇 |
2013年 | 2631篇 |
2012年 | 2453篇 |
2011年 | 2763篇 |
2010年 | 2213篇 |
2009年 | 2329篇 |
2008年 | 2399篇 |
2007年 | 2508篇 |
2006年 | 2316篇 |
2005年 | 1987篇 |
2004年 | 1590篇 |
2003年 | 1310篇 |
2002年 | 1131篇 |
2001年 | 903篇 |
2000年 | 778篇 |
1999年 | 680篇 |
1998年 | 536篇 |
1997年 | 478篇 |
1996年 | 407篇 |
1995年 | 387篇 |
1994年 | 316篇 |
1993年 | 278篇 |
1992年 | 254篇 |
1991年 | 181篇 |
1990年 | 147篇 |
1989年 | 167篇 |
1988年 | 127篇 |
1987年 | 68篇 |
1986年 | 90篇 |
1985年 | 67篇 |
1984年 | 67篇 |
1983年 | 48篇 |
1982年 | 54篇 |
1981年 | 42篇 |
1980年 | 33篇 |
1979年 | 31篇 |
1978年 | 29篇 |
1977年 | 26篇 |
1964年 | 28篇 |
1955年 | 35篇 |
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
971.
提出了一种参数稀疏信号的时间交替周期非均匀采样方案。相对于非均匀采样,周期非均匀采样可以在降低系统复杂度的前提下依然保持较高的转换速率。通过仿真证明,非均匀采样样本的超分辨率特性可以提高非线性最小二乘周期图谱估计的重构性能。 相似文献
972.
根据新型军械装备损坏程度具有不确定性的特点,提出了基于D-S证据理论的新型军械装备损坏程度评估方法,并求出了新型军械装备损坏程度区分.通过对典型新型军械装备损坏程度的评估,验证了该方法的有效性和实用性. 相似文献
973.
平均保障延误时间(MLDT)建模方法研究 总被引:1,自引:0,他引:1
针对现代装备系统的精确化保障要求,对装备保障的主要参数指标MLDT进行了建模分析,主要分析了三种计算方法:图估法、解析法和基于排队论的MLDT建模理论,解决了评估MLDT指标时的定量计算问题。 相似文献
974.
雷丽萍 《计算机与数字工程》2011,(10):134-137
入侵检测技术是保证计算机网络安全的核心技术之一,在网络安全领域内发挥着重要的作用。但是目前的入侵检测系统不够完善,文章通过对记忆原理和模糊理论的分析将其应用在已有的入侵检测系统中,提出了一种新的基于生物模糊记忆的入侵检测系统模型,并用实验证明该模型具有更好的检测效果。 相似文献
975.
针对目前实时入侵检测系统所处理的网络数据具有的非线性和高维的特点,提出基于粗糙集理论的进化神经网络入侵检测方法。对网络中截获的数据,利用粗糙集属性约简方法对其属性集进行约简,得到影响分类精度的重要属性。把约简后形成的训练样本进行数值化和归一化处理,作为神经网络的输入数据,再利用遗传算法较强的宏观搜索能力和全局寻优的特点,优化神经网络权值,并在此基础上进行神经网络学习,从而建立入侵检测系统的优化分析模型。实验结果表明,该算法学习速度快,有效提高了入侵检测系统的检测效率。 相似文献
976.
YIN YunFei GONG GuangHong & HAN Liang College of Computer Science Chongqing University Chongqing China School of Automation Science Electrical Engineering Beijing University of Aeronautics Astronautics Beijing 《中国科学:信息科学(英文版)》2011,(4)
For the large quantity of data,rules and models generated in the course of computer generated forces (CGFs) behavior modeling,the common analytical methods are statistical methods based on the tactical rules,tactical doctrine and empirical knowledge.However,from the viewpoint of data mining,we can find many of these analytical methods are also each-and-every different data mining methods.In this paper,we survey the data mining theory and techniques that have appeared in the course of CGF behavior modeling f... 相似文献
977.
TAO Jun ZHONG Xiao & LU YiFei Key Laboratory of Computer Network Information Integration Southeast University Ministry of Education Nanjing China School of Computer Science Engineering 《中国科学:信息科学(英文版)》2011,(1):12-22
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet users.However,the low effciency of equilibrium solutions affects their utility.Here the behavior of flow and congestion control based on infinitely repeated game models is addressed;the repeated and infinitely repeated flow and congestion control game model is presented; the existence and optimization of the Nash equilibrium point are proved;the discount ... 相似文献
978.
为了解决在校园网内部分网络安全事件和故障事件中只能确认攻击和事故的发生,而无法确定攻击和事故的源头这一问题.文章提出一种三步骤的校园网内网网络事件源定位模型.该模型将神经网络和证据理论相结合应用于攻击源定位.提高了校园网内网攻击定位的效率和准确性. 相似文献
979.
In this paper, we develop the idea of a universal anytime intelligence test. The meaning of the terms “universal” and “anytime” is manifold here: the test should be able to measure the intelligence of any biological or artificial system that exists at this time or in the future. It should also be able to evaluate both inept and brilliant systems (any intelligence level) as well as very slow to very fast systems (any time scale). Also, the test may be interrupted at any time, producing an approximation to the intelligence score, in such a way that the more time is left for the test, the better the assessment will be. In order to do this, our test proposal is based on previous works on the measurement of machine intelligence based on Kolmogorov complexity and universal distributions, which were developed in the late 1990s (C-tests and compression-enhanced Turing tests). It is also based on the more recent idea of measuring intelligence through dynamic/interactive tests held against a universal distribution of environments. We discuss some of these tests and highlight their limitations since we want to construct a test that is both general and practical. Consequently, we introduce many new ideas that develop early “compression tests” and the more recent definition of “universal intelligence” in order to design new “universal intelligence tests”, where a feasible implementation has been a design requirement. One of these tests is the “anytime intelligence test”, which adapts to the examinee's level of intelligence in order to obtain an intelligence score within a limited time. 相似文献
980.
James Pita Milind Tambe Fernando Ordóñez Sarit Kraus 《Artificial Intelligence》2010,174(15):1142-1171
How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such as oligopolistic markets and security domains. In Stackelberg games, one player, the leader, commits to a strategy and the follower makes her decision with knowledge of the leader's commitment. Existing algorithms for Stackelberg games efficiently find optimal solutions (leader strategy), but they critically assume that the follower plays optimally. Unfortunately, in many applications, agents face human followers (adversaries) who — because of their bounded rationality and limited observation of the leader strategy — may deviate from their expected optimal response. In other words, human adversaries' decisions are biased due to their bounded rationality and limited observations. Not taking into account these likely deviations when dealing with human adversaries may cause an unacceptable degradation in the leader's reward, particularly in security applications where these algorithms have seen deployment. The objective of this paper therefore is to investigate how to build algorithms for agent interactions with human adversaries.To address this crucial problem, this paper introduces a new mixed-integer linear program (MILP) for Stackelberg games to consider human adversaries, incorporating: (i) novel anchoring theories on human perception of probability distributions and (ii) robustness approaches for MILPs to address human imprecision. Since this new approach considers human adversaries, traditional proofs of correctness or optimality are insufficient; instead, it is necessary to rely on empirical validation. To that end, this paper considers four settings based on real deployed security systems at Los Angeles International Airport (Pita et al., 2008 [35]), and compares 6 different approaches (three based on our new approach and three previous approaches), in 4 different observability conditions, involving 218 human subjects playing 2960 games in total. The final conclusion is that a model which incorporates both the ideas of robustness and anchoring achieves statistically significant higher rewards and also maintains equivalent or faster solution speeds compared to existing approaches. 相似文献