首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35661篇
  免费   3744篇
  国内免费   2538篇
工业技术   41943篇
  2024年   99篇
  2023年   557篇
  2022年   729篇
  2021年   959篇
  2020年   1101篇
  2019年   1011篇
  2018年   1043篇
  2017年   1202篇
  2016年   1301篇
  2015年   1327篇
  2014年   2061篇
  2013年   2511篇
  2012年   2272篇
  2011年   2607篇
  2010年   2074篇
  2009年   2176篇
  2008年   2234篇
  2007年   2350篇
  2006年   2186篇
  2005年   1903篇
  2004年   1531篇
  2003年   1278篇
  2002年   1109篇
  2001年   886篇
  2000年   762篇
  1999年   674篇
  1998年   523篇
  1997年   469篇
  1996年   394篇
  1995年   381篇
  1994年   314篇
  1993年   271篇
  1992年   247篇
  1991年   176篇
  1990年   144篇
  1989年   166篇
  1988年   126篇
  1987年   65篇
  1986年   90篇
  1985年   67篇
  1984年   66篇
  1983年   47篇
  1982年   53篇
  1981年   41篇
  1980年   31篇
  1979年   32篇
  1978年   29篇
  1977年   26篇
  1964年   26篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 891 毫秒
991.
For the large quantity of data,rules and models generated in the course of computer generated forces (CGFs) behavior modeling,the common analytical methods are statistical methods based on the tactical rules,tactical doctrine and empirical knowledge.However,from the viewpoint of data mining,we can find many of these analytical methods are also each-and-every different data mining methods.In this paper,we survey the data mining theory and techniques that have appeared in the course of CGF behavior modeling f...  相似文献   
992.
为了解决在校园网内部分网络安全事件和故障事件中只能确认攻击和事故的发生,而无法确定攻击和事故的源头这一问题.文章提出一种三步骤的校园网内网网络事件源定位模型.该模型将神经网络和证据理论相结合应用于攻击源定位.提高了校园网内网攻击定位的效率和准确性.  相似文献   
993.
In this paper, we develop the idea of a universal anytime intelligence test. The meaning of the terms “universal” and “anytime” is manifold here: the test should be able to measure the intelligence of any biological or artificial system that exists at this time or in the future. It should also be able to evaluate both inept and brilliant systems (any intelligence level) as well as very slow to very fast systems (any time scale). Also, the test may be interrupted at any time, producing an approximation to the intelligence score, in such a way that the more time is left for the test, the better the assessment will be. In order to do this, our test proposal is based on previous works on the measurement of machine intelligence based on Kolmogorov complexity and universal distributions, which were developed in the late 1990s (C-tests and compression-enhanced Turing tests). It is also based on the more recent idea of measuring intelligence through dynamic/interactive tests held against a universal distribution of environments. We discuss some of these tests and highlight their limitations since we want to construct a test that is both general and practical. Consequently, we introduce many new ideas that develop early “compression tests” and the more recent definition of “universal intelligence” in order to design new “universal intelligence tests”, where a feasible implementation has been a design requirement. One of these tests is the “anytime intelligence test”, which adapts to the examinee's level of intelligence in order to obtain an intelligence score within a limited time.  相似文献   
994.
How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such as oligopolistic markets and security domains. In Stackelberg games, one player, the leader, commits to a strategy and the follower makes her decision with knowledge of the leader's commitment. Existing algorithms for Stackelberg games efficiently find optimal solutions (leader strategy), but they critically assume that the follower plays optimally. Unfortunately, in many applications, agents face human followers (adversaries) who — because of their bounded rationality and limited observation of the leader strategy — may deviate from their expected optimal response. In other words, human adversaries' decisions are biased due to their bounded rationality and limited observations. Not taking into account these likely deviations when dealing with human adversaries may cause an unacceptable degradation in the leader's reward, particularly in security applications where these algorithms have seen deployment. The objective of this paper therefore is to investigate how to build algorithms for agent interactions with human adversaries.To address this crucial problem, this paper introduces a new mixed-integer linear program (MILP) for Stackelberg games to consider human adversaries, incorporating: (i) novel anchoring theories on human perception of probability distributions and (ii) robustness approaches for MILPs to address human imprecision. Since this new approach considers human adversaries, traditional proofs of correctness or optimality are insufficient; instead, it is necessary to rely on empirical validation. To that end, this paper considers four settings based on real deployed security systems at Los Angeles International Airport (Pita et al., 2008 [35]), and compares 6 different approaches (three based on our new approach and three previous approaches), in 4 different observability conditions, involving 218 human subjects playing 2960 games in total. The final conclusion is that a model which incorporates both the ideas of robustness and anchoring achieves statistically significant higher rewards and also maintains equivalent or faster solution speeds compared to existing approaches.  相似文献   
995.
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the communication graph is a tree. It is shown how the relation between tree graphs and the null space of the corresponding incidence matrix encode fundamental properties for these two multi-agent control problems.  相似文献   
996.
Bo Yang  Huajing Fang 《Automatica》2010,46(3):629-632
This communique presents forced second-order consensus protocols with communication time-delays for the network of agents with double integrator dynamics and gives a measure of the robustness of the protocols to the communication time-delays. By employing a frequency domain method, it is proven that the forced consensus is achieved asymptotically for appropriate time-delay if the network is connected. Particularly, the maximum fixed time-delay that can be tolerated by the network is found. The forced consensus protocols are distributed in the sense that each agent only needs information from its neighboring agents, which reduces the complexity of connections between agents significantly. Numerical simulation results are provided to demonstrate the effectiveness and the sharpness of the theoretical results.  相似文献   
997.
Mass function derivation and combination in multivariate data spaces   总被引:1,自引:0,他引:1  
In this paper, we consider the problem of how to derive mass functions systematically from data samples. We also consider the ensuing problem of how to combine different mass functions derived in this way. We show that a mass function can be efficiently and systematically derived from multivariate data. We also demonstrate that combining mass functions obtained in this manner can be done easily. The way of deriving and combining mass functions is illustrated with a simple example.  相似文献   
998.
本文通过多传感器对影响储藏粮食因子的检测,利用D-S融合算法,得到较为科学、合理的储藏粮食影响因素的判断,为在储藏粮食过程中采取适当的措施提供了强有力的依据,为进一步评估储粮品质打下基础。  相似文献   
999.
该论文介绍了OSPF协议的背景;对软件测试理论和软件测试方法进行研究;将两者相结合得出常见的测试方法,并且在此基础上总结了自己的一套测试方法。这些测试方法可以对支持OSPF协议的不同厂商的路由器进行针对性测试,从而判断路由器的OSPF协议是否正确。最后举例说明校园网OSPF协议的应用。  相似文献   
1000.
Relying on SIDE theory, this 2 × 2 experimental design tested the effects of adherence to organizational norms and interpersonal familiarity in e‐mail messages from both superior and subordinate perspectives. Results reveal that using norm‐congruent e‐mail messages account for over 50% of the variance in both superior and subordinate attitudes toward the message and between 30% and 56% of the variance in perceptions of source credibility. Data from the superiors indicate that norm congruent e‐mail messages account for 14.4% of the variance in message compliance. Results from subordinates reveal an interaction effect that is consistent with SIDE‐based predictions. Subordinates believe superiors are most likely to comply with e‐mail requests from unfamiliar subordinates that are crafted in a manner congruent with organizational norms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号