全文获取类型
收费全文 | 748380篇 |
免费 | 8408篇 |
国内免费 | 2202篇 |
专业分类
电工技术 | 13606篇 |
综合类 | 956篇 |
化学工业 | 115674篇 |
金属工艺 | 30138篇 |
机械仪表 | 23448篇 |
建筑科学 | 17138篇 |
矿业工程 | 5085篇 |
能源动力 | 19392篇 |
轻工业 | 60453篇 |
水利工程 | 8849篇 |
石油天然气 | 17929篇 |
武器工业 | 76篇 |
无线电 | 81853篇 |
一般工业技术 | 151538篇 |
冶金工业 | 131799篇 |
原子能技术 | 18519篇 |
自动化技术 | 62537篇 |
出版年
2021年 | 6785篇 |
2019年 | 6444篇 |
2018年 | 11137篇 |
2017年 | 11367篇 |
2016年 | 11907篇 |
2015年 | 7571篇 |
2014年 | 12805篇 |
2013年 | 34126篇 |
2012年 | 19965篇 |
2011年 | 27156篇 |
2010年 | 21678篇 |
2009年 | 24385篇 |
2008年 | 24756篇 |
2007年 | 24474篇 |
2006年 | 21174篇 |
2005年 | 19378篇 |
2004年 | 18800篇 |
2003年 | 18331篇 |
2002年 | 17715篇 |
2001年 | 17299篇 |
2000年 | 16475篇 |
1999年 | 16641篇 |
1998年 | 39158篇 |
1997年 | 28306篇 |
1996年 | 21919篇 |
1995年 | 16888篇 |
1994年 | 15118篇 |
1993年 | 14935篇 |
1992年 | 11345篇 |
1991年 | 11004篇 |
1990年 | 10737篇 |
1989年 | 10486篇 |
1988年 | 9982篇 |
1987年 | 9039篇 |
1986年 | 8862篇 |
1985年 | 9936篇 |
1984年 | 9061篇 |
1983年 | 8584篇 |
1982年 | 7801篇 |
1981年 | 7913篇 |
1980年 | 7644篇 |
1979年 | 7576篇 |
1978年 | 7527篇 |
1977年 | 8293篇 |
1976年 | 10543篇 |
1975年 | 6661篇 |
1974年 | 6400篇 |
1973年 | 6474篇 |
1972年 | 5519篇 |
1971年 | 5072篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
John P. kotter 《IT时代周刊》2007,(24):76-77
在拥有了多年大权在握、呼风唤雨的经历之后。相当一部分企业领导人很难从容地放弃权力。这时。董事会必须采取行动,不仅要帮助退休领导人选择和培养好接班人。更要积极参与管理层交接班的全过程。 相似文献
992.
QoS assessment of 3G video-phone calls by tracing watermarking exploiting the new colour space `YST?
Tracing watermarking has been recently proposed as a technique to provide a blind measure of the quality of service of the communication link, focusing on multimedia communication scenarios. 3G communication scenarios, where each customer transmits both voice and MPEG-4 video sequences in real time, have been considered. Typical video-phone call consists of close shots of speakers, framing their face in the foreground. For such particular application, a novel colour space (YST) is adopted to minimise the perceptual distortions on face coding introduced by watermarking. In the YST space, the luminance component (Y) is the same as in conventional YUV space, whereas the vectors S and T lie within the chrominance (UV) plane. The S (skin) component is a linear combination of U and V obtained as the 'average' chrominance estimated from an assorted set human faces to achieve a reasonable generalisation. The third component, T, is defined as orthogonal to the YS plane. The results show the benefits obtained in digital watermarking by the new representation against the conventional approach. In fact, the sensitivity of the YST representation outperforms the conventional one in terms of objective (mean square error, peak signal-to-noise ratio) and subjective (video-quality metrics) indicators. 相似文献
993.
Entrainment and musicality in the human system interface 总被引:1,自引:1,他引:0
Satinder P. Gill 《AI & Society》2007,21(4):567-605
What constitutes our human capacity to engage and be in the same frame of mind as another human? How do we come to share a sense of what ‘looks good’ and what ‘makes sense’? How do we handle differences and come to coexist with them? How do we come to feel that we understand what someone else is experiencing? How are we able to walk in silence with someone familiar and be sharing a peaceful space? All of these aspects are part of human ‘interaction’. In designing interactive technologies designers have endeavoured to explicate, analyse and simulate, our capacity for social adaptation. Their motivations are mixed and include the desires to improve efficiency, improve consumption, to connect people, to make it easier for people to work together, to improve education and learning. In these endeavours to explicate, analyse and simulate, there is a fundamental human capacity that is beyond technology and that facilitates these aspects of being, feeling and thinking with others. That capacity, we suggest, is human entrainment. This is our ability to coordinate the timing of our behaviours and rhythmically synchronise our attentional resources. Expressed within the movements of our bodies and voices, it has a quality that is akin to music. In this paper, disparate domains of research such as pragmatics, social psychology, behaviourism, cognitive science, computational linguistics, gesture, are brought together, and considered in light of the developments in interactive technology, in order to shape a conceptual framework for understanding entrainment in everyday human interaction. 相似文献
994.
Yu. P. Nikolaev 《Automation and Remote Control》2004,65(12):1904-1914
The D-decomposition of a two-dimensional plane of arbitrary coefficients of a discrete characteristic polynomial is studied. The geometry of the boundary curve is analyzed and its common properties with a linear discrete system of any order are described. Example are given. 相似文献
995.
A. V. Adel'shin 《Automation and Remote Control》2004,65(3):388-395
Problems of the maximum and the minimum satisfiability on the basis of the integer linear programming and L-partition are studied. The L-structure of polyhedrons of the problems is investigated. Families are set up of unweighted problems of the maximum and the minimum satisfiability, the powers of L-coverings of which grow exponentially with an increase in the number of variables in a formula. 相似文献
996.
V. P. Shmerko 《Automation and Remote Control》2004,65(6):893-912
Theoretical results due to V. Malyugin on linearization of arithmetical models of logical functions are interpreted and refined from the viewpoint of modern techniques of logical design of integral circuits and nearest neighbor technologies. 相似文献
997.
998.
A quantitative study of firewall configuration errors 总被引:1,自引:0,他引:1
The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the company's needs. Configuration is a crucial task, probably the most important factor in the security a firewall provides. 相似文献
999.
Tomer A. Goldin L. Kuflik T. Kimchi E. Schach S.R. 《IEEE transactions on pattern analysis and machine intelligence》2004,30(9):601-612
We propose a model that enables software developers to systematically evaluate and compare all possible alternative reuse scenarios. The model supports the clear identification of the basic operations involved and associates a cost component with each basic operation in a focused and precise way. The model is a practical tool that assists developers to weigh and evaluate different reuse scenarios, based on accumulated organizational data, and then to decide which option to select in a given situation. The model is currently being used at six different companies for cost-benefit analysis of alternative reuse scenarios; we give a case study that illustrates how it has been used in practice. 相似文献
1000.
In this note, the input-output linearization problem (IOLP) for a class of single-input-single-output nonlinear systems with multiple delays in the input, the output, and the state is studied. The problem is solved by means of various static or dynamic compensators, including state and output feedback. The mathematical setting is based on some noncommutative algebraic tools and the introduction of a nonlinear version of the so-called Roesser models for this class of systems. These are claimed to be the cornerstones for studying nonlinear time-delay systems. Necessary and sufficient conditions are given for the existence of a static or pure shift output feedback which solves the IOLP. Sufficient conditions for the existence of a dynamic state feedback solution are included as well. 相似文献