全文获取类型
收费全文 | 540篇 |
免费 | 44篇 |
国内免费 | 57篇 |
专业分类
电工技术 | 17篇 |
综合类 | 32篇 |
化学工业 | 15篇 |
金属工艺 | 1篇 |
机械仪表 | 14篇 |
建筑科学 | 6篇 |
矿业工程 | 3篇 |
能源动力 | 1篇 |
轻工业 | 2篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
武器工业 | 1篇 |
无线电 | 33篇 |
一般工业技术 | 12篇 |
冶金工业 | 2篇 |
原子能技术 | 2篇 |
自动化技术 | 498篇 |
出版年
2024年 | 2篇 |
2023年 | 7篇 |
2022年 | 10篇 |
2021年 | 10篇 |
2020年 | 13篇 |
2019年 | 7篇 |
2018年 | 12篇 |
2017年 | 14篇 |
2016年 | 29篇 |
2015年 | 18篇 |
2014年 | 28篇 |
2013年 | 35篇 |
2012年 | 16篇 |
2011年 | 34篇 |
2010年 | 28篇 |
2009年 | 26篇 |
2008年 | 32篇 |
2007年 | 40篇 |
2006年 | 33篇 |
2005年 | 38篇 |
2004年 | 40篇 |
2003年 | 17篇 |
2002年 | 21篇 |
2001年 | 13篇 |
2000年 | 9篇 |
1999年 | 13篇 |
1998年 | 10篇 |
1997年 | 10篇 |
1996年 | 8篇 |
1995年 | 15篇 |
1994年 | 8篇 |
1993年 | 8篇 |
1992年 | 9篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1975年 | 2篇 |
排序方式: 共有641条查询结果,搜索用时 15 毫秒
1.
Shouguang Wang Mengdi Gan Mengchu Zhou Dan You 《IEEE/CAA Journal of Automatica Sinica》2015,2(4):345-352
As a powerful analysis tool of Petri nets, reachability trees are fundamental for systematically investigating many characteristics such as boundedness, liveness and reversibility. This work proposes a method to generate a reachability tree, called ωRT for short, for a class of unbounded generalized nets called ω-independent nets based on new modified reachability trees (NMRTs). ωRT can effectively decrease the number of nodes by removing duplicate and ω-duplicate nodes in the tree, and verify properties such as reachability, liveness and deadlocks. Two examples are provided to show its superiority over NMRTs in terms of tree size. 相似文献
2.
模糊Petri网及知识表示 总被引:6,自引:0,他引:6
蔡之华 《计算机应用与软件》1994,11(3):30-36
在建造专家系统中虽然有很多种知识表示方法,但都有不尽人意的地方,本文试图用一种新的方法-Petri网模型来表示知识。本文给出了Fuzzzy Petri网和广义Fuzzy Petri网两种模型,并给出了相应的推理算法,一旦专家知识用Petri网表示后,根据Petri网固有的特性,我们就能处理专家系统中并行推理、无回溯推理,反向推理等问题。 相似文献
3.
The communicating finite state machines can exchange messages over bounded FIFO channels. In this paper, a new technique, called reverse reachability analysis, is proposed to detect deadlocks on the communication between the communicating finite state machines. The technique is based on finding reverse reachable paths starting from possible deadlock states. If a reverse reachable path can reach the initial global state, then deadlock occurs. Otherwise the communication is deadlock-free. The effectiveness of the technique has been verified by some real protocols such as a specification of X.25 call establishment/clear protocol and Bartlet's alternating bit protocol. 相似文献
4.
We consider a system defined as the product of a finite set of periodic systems on cyclic groups. It is of interest to determine if certain subgroups and unions of subgroups of the state set are reachable from a specified initial state, and in particular to determine the computational complexity of verifying such reachability. These questions are motivated by certain problems that arise in the modelling and control of discrete event systems and certain forms of periodic scheduling. Our main result is that deciding whether or not the union of a certain set of subgroups is reachable or not is NP-complete. 相似文献
5.
6.
7.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship. 相似文献
8.
Abstract. Given length- n sampled time series, generated by an independent distributed process, in this paper we treat the problem of determining the greatest order, in n , that moments of the sample autocovariances and sample autocorrelations can attain. For the sample autocovariance moments, we achieve quite general results; but, for the autocorrelation moments, we restrict study to Gaussian white noise (normal, independent and identically distributed). Our main theorem relates to the cross-moments of the non-centred sample autocovariances, but we also establish a relation between these and the corresponding moments for the centred sample autocovariances. 相似文献
9.
《Journal of Process Control》2014,24(6):975-990
Soft sensor technology is an important means to estimate important process variables in real-time. Modeling for soft sensor system is the core of this technology. Most nonlinear dynamic modeling methods integrate the processes of building the dynamic and static relationships between secondary and primary variables, which limits the estimation accuracy for primary variables. To avoid the problem, a kind of soft sensor model consisting of a dynamic model in cascade with a static one is proposed. The model identification and update online are conducted in substep way. In order to improve the model update efficiency, two improved Gauss–Newton recursive algorithms, which avoid nonsingular covariance matrix, are proposed for time-invariant and time-variant soft sensor systems. The uniform convergence for dynamic model parameter and the existence of estimation deviations for static model parameters are proved for time-invariant soft sensor system. The parameters of time-variant soft sensor system would be boundedly convergent. Case study confirms that, on the basis of the proposed model and recursive algorithms, the dynamic and static characteristics of soft sensor system can be described efficiently, and the primary variables are ensured to be estimated accurately. 相似文献
10.