全文获取类型
收费全文 | 1394篇 |
免费 | 60篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 20篇 |
化学工业 | 307篇 |
金属工艺 | 11篇 |
机械仪表 | 23篇 |
建筑科学 | 59篇 |
矿业工程 | 4篇 |
能源动力 | 39篇 |
轻工业 | 116篇 |
水利工程 | 14篇 |
石油天然气 | 2篇 |
无线电 | 97篇 |
一般工业技术 | 240篇 |
冶金工业 | 300篇 |
原子能技术 | 15篇 |
自动化技术 | 214篇 |
出版年
2023年 | 11篇 |
2022年 | 12篇 |
2021年 | 15篇 |
2020年 | 21篇 |
2019年 | 22篇 |
2018年 | 28篇 |
2017年 | 22篇 |
2016年 | 33篇 |
2015年 | 24篇 |
2014年 | 29篇 |
2013年 | 86篇 |
2012年 | 52篇 |
2011年 | 66篇 |
2010年 | 55篇 |
2009年 | 61篇 |
2008年 | 68篇 |
2007年 | 66篇 |
2006年 | 41篇 |
2005年 | 38篇 |
2004年 | 28篇 |
2003年 | 43篇 |
2002年 | 25篇 |
2001年 | 30篇 |
2000年 | 26篇 |
1999年 | 25篇 |
1998年 | 15篇 |
1997年 | 15篇 |
1996年 | 20篇 |
1995年 | 15篇 |
1994年 | 18篇 |
1992年 | 12篇 |
1989年 | 11篇 |
1988年 | 15篇 |
1987年 | 18篇 |
1986年 | 16篇 |
1985年 | 19篇 |
1984年 | 18篇 |
1983年 | 13篇 |
1982年 | 18篇 |
1981年 | 16篇 |
1979年 | 14篇 |
1978年 | 21篇 |
1977年 | 11篇 |
1976年 | 10篇 |
1975年 | 19篇 |
1974年 | 28篇 |
1972年 | 12篇 |
1971年 | 12篇 |
1966年 | 15篇 |
1963年 | 12篇 |
排序方式: 共有1461条查询结果,搜索用时 150 毫秒
1.
Edwin P. D. Pednault 《Computational Intelligence》1988,4(3):356-372
This paper presents a method of solving planning problems that involve actions whose effects change according to the situations in which they are performed. The approach is an extension of the conventional planning methodology in which plans are constructed through an iterative process of scanning for goals that are not yet satisfied, inserting actions to achieve them, and introducing subgoals to these actions. This methodology was originally developed under the assumption that one would be dealing exclusively with actions that produce the same effects in every situation. The extension involves introducing additional subgoals to actions above and beyond the preconditions of execution normally introduced. These additional subgoals, called secondary preconditions, ensure that the actions are performed in contexts conducive to producing the effects we desire. This paper defines and analyzes secondary preconditions from a mathematically rigorous standpoint and demonstrates how they can be derived from regression operators. 相似文献
2.
We propose a technique to reconstruct the geometry of inclusions and their material parameters in thermal scattering near surfaces. The imaging problem is reformulated as a constrained optimization problem with a finite number of stationary constraints. The unknown domains and their parameters are the design variables. A descent method combining topological derivative analysis to find improved guesses of the objects and gradient iterations to correct their material parameters provides reasonable reconstructions. 相似文献
3.
De-Long Zhang Ping-Rang Hua Edwin Yue-Bun Pun Guei-Gu Siu 《Journal of the American Ceramic Society》2007,90(9):2893-2899
Vapor transport equilibration (VTE) treatments were performed on a Y-cut bulk Er (1.6 mol%)-doped congruent LiNbO3 crystal and an X-cut pure congruent crystal, on one surface of which a 40 nm-thick film of erbium metal was coated before the VTE treatment. Scanning electron microscope, powder or single-crystal X-ray diffraction (XRD), polarized infrared absorption/emission of Er3+ as well as micro-Raman spectroscopy were used to study the two VTE crystals. The results are discussed in comparison with a corresponding as-grown bulk Er-doped crystal, calcined ErNbO4 powder, and a locally Er-doped congruent LiNbO3 crystal prepared by using the standard Er-diffusion technique. The experimental results show that the VTE treatment induces the formation of micrometer-sized ErNbO4 precipitates with the crystallographic morphology of a flat polyhedron not only on the surfaces of both crystals but also in the bulk of the homogeneously Er-doped one. The optical absorption and emission studies show that the formation of the precipitates results in substantial spectral changes in both the 0.98 and 1.5 μm regions. The micro-Raman studies allow to resolve four additional Raman peaks around 800 cm−1 in the E(TO) spectra of the two VTE crystals. These additional Raman peaks are associated with the characteristic vibrations with respect to the NbO4 3− group. Characteristic XRD, optical absorption, and emission and Raman peaks for identifying the ErNbO4 phase are proposed. Finally, the formation mechanism and light-scattering effect of the precipitates are discussed. 相似文献
4.
5.
Sliding Mode Control with Adaptive Fuzzy Dead-Zone Compensation of an Electro-hydraulic Servo-System 总被引:2,自引:0,他引:2
Wallace M. Bessa Max S. Dutra Edwin Kreuzer 《Journal of Intelligent and Robotic Systems》2010,58(1):3-16
Electro-hydraulic servo-systems are widely employed in industrial applications such as robotic manipulators, active suspensions,
precision machine tools and aerospace systems. They provide many advantages over electric motors, including high force to
weight ratio, fast response time and compact size. However, precise control of electro-hydraulic systems, due to their inherent
nonlinear characteristics, cannot be easily obtained with conventional linear controllers. Most flow control valves can also
exhibit some hard nonlinearities such as dead-zone due to valve spool overlap. This work describes the development of an adaptive
fuzzy sliding mode controller for an electro-hydraulic system with unknown dead-zone. The boundedness and convergence properties
of the closed-loop signals are proven using Lyapunov stability theory and Barbalat’s lemma. Numerical results are presented
in order to demonstrate the control system performance. 相似文献
6.
Due to the nature of distribution and self-organization, mobile ad hoc networks rely on cooperation between nodes to transfer information. One of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next potential cooperative nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All of the above make it difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition with feedback, SCGM(1, 1) model and Markov chain, we present a pattern of prediction making. The analysis and experimental computation show that this scheme is efficient in trust prediction for ad hoc networks. 相似文献
7.
We consider the parallel machine scheduling problem of minimizing the sum of quadratic job completion times. We first prove that the problem is strongly NP-hard. We then demonstrate by probabilistic analysis that the shortest processing time rule solves the problem asymptotically. The relative error of the rule converges in probability to zero under the assumption that the job processing times are independent random variables uniformly distributed in (0, 1). We finally provide some computational results, which show that the rule is effective in solving the problem in practice. 相似文献
8.
Edwin Reynders Anne Teughels Guido De Roeck 《Mechanical Systems and Signal Processing》2010,24(5):1306-1323
The main limitations in the finite element (FE) model updating technique lie in the ability of the FE model to represent the true behavior of the structure (modelling problem), and in the ability to identify enough modal parameters with sufficient accuracy, especially for large structures that are tested in operational conditions (identification problem). In this paper, the identification problem is solved with an OMAX approach, where an artificial force is used in operational conditions and a structural model is identified that takes both the forced and the ambient excitation into account. From an extensive case study on a real three-span bridge, it is observed that, while updating the FE model using the experimental output-only data yields a good fit, discrepancies show up when the more extensive set of OMAX data is used for validation, or even for updating. It can be concluded that an OMAX approach not only increases the well-posedness of the updating problem, it also allows to detect potential inaccuracies in the FE model. 相似文献
9.
Recovery of surface orientation from diffuse polarization. 总被引:1,自引:0,他引:1
When unpolarized light is reflected from a smooth dielectric surface, it becomes partially polarized. This is due to the orientation of dipoles induced in the reflecting medium and applies to both specular and diffuse reflection. This paper is concerned with exploiting polarization by surface reflection, using images of smooth dielectric objects, to recover surface normals and, hence, height. This paper presents the underlying physics of polarization by reflection, starting with the Fresnel equations. These equations are used to interpret images taken with a linear polarizer and digital camera, revealing the shape of the objects. Experimental results are presented that illustrate that the technique is accurate near object limbs, as the theory predicts, with less precise, but still useful, results elsewhere. A detailed analysis of the accuracy of the technique for a variety of materials is presented. A method for estimating refractive indices using a laser and linear polarizer is also given. 相似文献
10.
Hui Xia Jia Yu Zhen-kuan Pan Xiang-guo Cheng Edwin H. -M. Sha 《Wireless Networks》2016,22(7):2239-2257
Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to the destruction of malicious attacks or denial of cooperation. It would be easy for an adversary or a malicious node to launch attacks on routing function, especially attacks on packet routing. In order to mitigate these hazards, we incorporate the concept of ‘trust’ into MANETs, and abstract a decentralized trust inference model. The core of this model is trust computation, which is divided into two parts: historical trust assessment and trust prediction. We can quantify a node’s historical trust based on its historical behaviors via introducing multiple trust attributes. The fuzzy AHP method based on entropy weights is used to calculate the weight of trust attributes. By making use of the obtained historical trust data sequence, we propose an improved dynamic grey-Markov chain prediction measure to effectively estimate node’s trust prediction. In order to verify the validity of our trust model, we propose a trust-enhanced unicast routing protocol and a trust-enhanced multicast routing protocol, respectively. Both of the two new protocols can provide a feasible approach to kick out the untrustworthy nodes and choose the optimal trusted routing path. Moreover, the new proposed data-driven route maintenance mechanisms can reduce the routing overhead. The persuasive experiments have been conducted to evaluate the effectiveness of the new proposed trust-enhanced routing protocols in the aspects of packets delivery ratio, end-to-end latency, malicious node detection and attack resistance. 相似文献