首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   540篇
  免费   44篇
  国内免费   57篇
电工技术   17篇
综合类   32篇
化学工业   15篇
金属工艺   1篇
机械仪表   14篇
建筑科学   6篇
矿业工程   3篇
能源动力   1篇
轻工业   2篇
水利工程   1篇
石油天然气   1篇
武器工业   1篇
无线电   33篇
一般工业技术   12篇
冶金工业   2篇
原子能技术   2篇
自动化技术   498篇
  2024年   2篇
  2023年   7篇
  2022年   10篇
  2021年   10篇
  2020年   13篇
  2019年   7篇
  2018年   12篇
  2017年   14篇
  2016年   29篇
  2015年   18篇
  2014年   28篇
  2013年   35篇
  2012年   16篇
  2011年   34篇
  2010年   28篇
  2009年   26篇
  2008年   32篇
  2007年   40篇
  2006年   33篇
  2005年   38篇
  2004年   40篇
  2003年   17篇
  2002年   21篇
  2001年   13篇
  2000年   9篇
  1999年   13篇
  1998年   10篇
  1997年   10篇
  1996年   8篇
  1995年   15篇
  1994年   8篇
  1993年   8篇
  1992年   9篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1975年   2篇
排序方式: 共有641条查询结果,搜索用时 15 毫秒
1.
As a powerful analysis tool of Petri nets, reachability trees are fundamental for systematically investigating many characteristics such as boundedness, liveness and reversibility. This work proposes a method to generate a reachability tree, called ωRT for short, for a class of unbounded generalized nets called ω-independent nets based on new modified reachability trees (NMRTs). ωRT can effectively decrease the number of nodes by removing duplicate and ω-duplicate nodes in the tree, and verify properties such as reachability, liveness and deadlocks. Two examples are provided to show its superiority over NMRTs in terms of tree size.   相似文献   
2.
模糊Petri网及知识表示   总被引:6,自引:0,他引:6  
在建造专家系统中虽然有很多种知识表示方法,但都有不尽人意的地方,本文试图用一种新的方法-Petri网模型来表示知识。本文给出了Fuzzzy Petri网和广义Fuzzy Petri网两种模型,并给出了相应的推理算法,一旦专家知识用Petri网表示后,根据Petri网固有的特性,我们就能处理专家系统中并行推理、无回溯推理,反向推理等问题。  相似文献   
3.
The communicating finite state machines can exchange messages over bounded FIFO channels. In this paper, a new technique, called reverse reachability analysis, is proposed to detect deadlocks on the communication between the communicating finite state machines. The technique is based on finding reverse reachable paths starting from possible deadlock states. If a reverse reachable path can reach the initial global state, then deadlock occurs. Otherwise the communication is deadlock-free. The effectiveness of the technique has been verified by some real protocols such as a specification of X.25 call establishment/clear protocol and Bartlet's alternating bit protocol.  相似文献   
4.
We consider a system defined as the product of a finite set of periodic systems on cyclic groups. It is of interest to determine if certain subgroups and unions of subgroups of the state set are reachable from a specified initial state, and in particular to determine the computational complexity of verifying such reachability. These questions are motivated by certain problems that arise in the modelling and control of discrete event systems and certain forms of periodic scheduling. Our main result is that deciding whether or not the union of a certain set of subgroups is reachable or not is NP-complete.  相似文献   
5.
6.
7.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
8.
Abstract. Given length- n sampled time series, generated by an independent distributed process, in this paper we treat the problem of determining the greatest order, in n , that moments of the sample autocovariances and sample autocorrelations can attain. For the sample autocovariance moments, we achieve quite general results; but, for the autocorrelation moments, we restrict study to Gaussian white noise (normal, independent and identically distributed). Our main theorem relates to the cross-moments of the non-centred sample autocovariances, but we also establish a relation between these and the corresponding moments for the centred sample autocovariances.  相似文献   
9.
Soft sensor technology is an important means to estimate important process variables in real-time. Modeling for soft sensor system is the core of this technology. Most nonlinear dynamic modeling methods integrate the processes of building the dynamic and static relationships between secondary and primary variables, which limits the estimation accuracy for primary variables. To avoid the problem, a kind of soft sensor model consisting of a dynamic model in cascade with a static one is proposed. The model identification and update online are conducted in substep way. In order to improve the model update efficiency, two improved Gauss–Newton recursive algorithms, which avoid nonsingular covariance matrix, are proposed for time-invariant and time-variant soft sensor systems. The uniform convergence for dynamic model parameter and the existence of estimation deviations for static model parameters are proved for time-invariant soft sensor system. The parameters of time-variant soft sensor system would be boundedly convergent. Case study confirms that, on the basis of the proposed model and recursive algorithms, the dynamic and static characteristics of soft sensor system can be described efficiently, and the primary variables are ensured to be estimated accurately.  相似文献   
10.
针对现实中许多超大规模图可达性查询的问题,提出了一种新的基于递归分解的算法,即将原图递归分解成一系列生成树和剩余图两类子图,并通过分别查询这两类子图来减少查询开销.相比于区间标记、链分解、2-hop标签和路径树等传统算法,该算法不仅空间开销更小,且时间复杂度更低.仿真实验表明,该算法对处理大规模有向图可达性问题上存储规模更小且查询效率更高.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号