全文获取类型
收费全文 | 15338篇 |
免费 | 1268篇 |
国内免费 | 972篇 |
专业分类
电工技术 | 437篇 |
技术理论 | 1篇 |
综合类 | 1235篇 |
化学工业 | 136篇 |
金属工艺 | 144篇 |
机械仪表 | 956篇 |
建筑科学 | 703篇 |
矿业工程 | 248篇 |
能源动力 | 102篇 |
轻工业 | 105篇 |
水利工程 | 398篇 |
石油天然气 | 102篇 |
武器工业 | 641篇 |
无线电 | 2067篇 |
一般工业技术 | 563篇 |
冶金工业 | 354篇 |
原子能技术 | 36篇 |
自动化技术 | 9350篇 |
出版年
2024年 | 15篇 |
2023年 | 142篇 |
2022年 | 223篇 |
2021年 | 300篇 |
2020年 | 317篇 |
2019年 | 266篇 |
2018年 | 292篇 |
2017年 | 374篇 |
2016年 | 476篇 |
2015年 | 497篇 |
2014年 | 1002篇 |
2013年 | 797篇 |
2012年 | 1009篇 |
2011年 | 1379篇 |
2010年 | 925篇 |
2009年 | 885篇 |
2008年 | 1049篇 |
2007年 | 1189篇 |
2006年 | 1140篇 |
2005年 | 895篇 |
2004年 | 751篇 |
2003年 | 766篇 |
2002年 | 597篇 |
2001年 | 469篇 |
2000年 | 357篇 |
1999年 | 305篇 |
1998年 | 243篇 |
1997年 | 176篇 |
1996年 | 142篇 |
1995年 | 145篇 |
1994年 | 75篇 |
1993年 | 58篇 |
1992年 | 43篇 |
1991年 | 43篇 |
1990年 | 25篇 |
1989年 | 33篇 |
1988年 | 17篇 |
1987年 | 12篇 |
1986年 | 19篇 |
1985年 | 30篇 |
1984年 | 18篇 |
1983年 | 15篇 |
1982年 | 10篇 |
1981年 | 17篇 |
1980年 | 11篇 |
1979年 | 8篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1975年 | 4篇 |
1973年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
诱导式卫星欺骗干扰可诱导航空器逐渐偏离预定航迹,难以被发现,因此及时有效地检测干扰是飞行安全的保障。在现有紧组合导航体制基础上,设计了一种基于误差估值累加开环校正的紧组合导航结构,并证明了其性能与传统闭环校正紧组合导航性能等效。在此结构中,将紧组合导航系统与自适应序贯概率比检测方法结合,提出了一种基于误差估值累加开环校正的诱导式欺骗检测方法,融合紧组合导航信息与其他不受欺骗影响的导航信息,构建欺骗检测统计量进行诱导式欺骗检测。仿真结果表明,开环校正结构可避免随时间累加的惯性导航系统误差所导致的组合导航滤波器发散问题,同时欺骗检测方法可进一步提高算法对“最坏”情形下微小诱导式欺骗的检测效果。 相似文献
3.
更长的飞行时间是四旋翼无人机领域研究热点方向之一;在对实际飞行中瞬时消耗电流和电池电压数据的研究中发现,过大姿态角下电池电量消耗显著提升;为了延长飞行时间和提升电池电量使用效率,提出一种长续航飞行模式;在该模式下,基于现有的角速度串级PID姿态控制器,将飞行加速度的控制算法改为飞行速度控制,限制过大姿态角的操作;在无风、微风和强风环境下的飞行实验表明,长续航飞行模式比传统飞行方式飞行时间增加8%~20%;长续航飞行模式可广泛应用于多种无需快速变换飞行路径,但需要更长飞行时间的的应用场景中。 相似文献
4.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another. 相似文献
5.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process. 相似文献
6.
Joanna Paliszkiewicz 《Journal of Computer Information Systems》2019,59(3):211-217
ABSTRACTThe purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn. 相似文献
8.
Ken Yoda 《Advanced Robotics》2019,33(3-4):108-117
ABSTRACTThis review summarizes the advances in bio-logging technology that enables us to monitor foraging behavior, movement, behavioral performance, physiological performance, and sociality in a wide range of bird species, as well as their habitat. Subsequently, navigation is discussed, using long-distance movements in streaked shearwaters as a case study. Moreover, challenges and future research directions in bio-logging science are presented, with focus on: multimodal recording, big data analysis, feedback logging, low-power consumption and power generation systems, logger effects, and capture–recapture methods. 相似文献
9.
Smart cities are built upon information and communication technologies (ICTs) to enable a broad range of advanced services. Through a comprehensive literature review, this study identified four pitfalls brought by the pervasive application of ICT, including information insecurity, privacy leakage, information islands, and digital divide. Therefore, a questionnaire survey together with 27 interviews was conducted in Hong Kong to investigate how the public perceived these pitfalls within the context of mobile apps providing real-time parking information which form a major part of smart mobility. System insecurity and privacy leakage were found to arouse worries among the app-users while their awareness of protecting personal data was found to have room for improvement. Islands of real-time parking information occur as a result of the lack of collaboration among private carpark operators. Digital divide existed widely among the disadvantaged groups and the problem cannot be solved by mere provision of ICT facilities. Overall, technologies alone cannot make a city smart or smarter. It is the suitable way in which ICTs are used to serve all citizens that matters. 相似文献
10.
视觉里程计利用视频信息来估计相机运动的位姿参数,实现对智能体的定位。传统视觉里程计方法需要特征提取、特征匹配/跟踪、外点剔除、运动估计、优化等流程,解算非常复杂,因此,提出了基于卷积神经网络的方法来实现端对端的单目视觉里程计。借助卷积神经网络对彩色图片自动学习提取图像帧间变化的全局特征,将用于分类的卷积神经网络转化为帧间时序特征网络,通过三层全连接层输出相机的帧间相对位姿参数。在KITTI数据集上的实验结果表明,提出的Deep-CNN-VO模型可以较准确地估计车辆的运动轨迹,证明了方法的可行性。在简化了复杂模型的基础上,与传统的视觉里程计系统相比,该模型的精度也有所提高。 相似文献