全文获取类型
收费全文 | 1015篇 |
免费 | 59篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 15篇 |
化学工业 | 253篇 |
金属工艺 | 40篇 |
机械仪表 | 39篇 |
建筑科学 | 25篇 |
矿业工程 | 3篇 |
能源动力 | 49篇 |
轻工业 | 165篇 |
水利工程 | 2篇 |
石油天然气 | 6篇 |
无线电 | 49篇 |
一般工业技术 | 208篇 |
冶金工业 | 41篇 |
原子能技术 | 8篇 |
自动化技术 | 174篇 |
出版年
2023年 | 16篇 |
2022年 | 17篇 |
2021年 | 33篇 |
2020年 | 31篇 |
2019年 | 34篇 |
2018年 | 56篇 |
2017年 | 28篇 |
2016年 | 40篇 |
2015年 | 33篇 |
2014年 | 70篇 |
2013年 | 131篇 |
2012年 | 67篇 |
2011年 | 70篇 |
2010年 | 65篇 |
2009年 | 66篇 |
2008年 | 53篇 |
2007年 | 34篇 |
2006年 | 25篇 |
2005年 | 18篇 |
2004年 | 11篇 |
2003年 | 13篇 |
2002年 | 12篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 6篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 9篇 |
1995年 | 6篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 4篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 10篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 5篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1973年 | 4篇 |
1972年 | 3篇 |
1970年 | 3篇 |
1961年 | 3篇 |
排序方式: 共有1077条查询结果,搜索用时 13 毫秒
91.
Catalysts of quaternary composition have been prepared and tested for the Sabatier process. For catalyst syntheses the following techniques have been used: sol‐gel methods, wet impregnation and incipient wetness impregnation. The Sabatier reaction was carried out at temperatures between 520 K and 670 K, pressures of 15 bar and 30 bar using a mixture H2:CO2 of 4:1. Activity screening of the microscale wall catalysts was performed by a custom‐built 10‐fold parallel gas‐flow microreactor setup in sequential operating mode. To analyze the gas phase compositions GC‐FID was used. 相似文献
92.
Mirko Viroli Tom Holvoet Alessandro Ricci Kurt Schelfthout Franco Zambonelli 《Autonomous Agents and Multi-Agent Systems》2007,14(1):49-60
The notion of environment is receiving an increasing attention in the development of multiagent applications. This is witnessed by the emergence of a number of infrastructures providing agent designers with useful means to develop the agent environment, and thus to structure an effective multiagent application. In this paper we analyse the role and features of such infrastructures, and survey some relevant examples. We endorse a general viewpoint where the environment of a multiagent system is seen as a set of basic bricks we call environment abstractions, which (i) provide agents with services useful for achieving individual and social goals, and (ii) are supported by some underlying software infrastructure managing their creation and exploitation. Accordingly, we focus the survey on the opportunities that environment infrastructures provide to system designers when developing multiagent applications. 相似文献
93.
ALBERTAS ČAPLINSKAS 《Journal of Intelligent Manufacturing》1998,9(6):493-502
The aim of this paper is comparative analysis of most important AI paradigms. An AI paradigm is defined as the pair composed by a concept of intelligence and a methodology in which intelligent computer systems are developed and operated. Three paradigms, the behaviourist paradigm, the agent paradigm, and the artificial life paradigm are discussed. 相似文献
94.
What Business Owners Expect From a Crisis Manager? A Competency Model: Survey Results From Czech Businesses 下载免费PDF全文
This competency model of a crisis manager has been developed based on cooperation with managers and experts in the field of crisis management. The brainwriting method was used to generate an overview of the competencies expected of a crisis manager. Using a mind map three basic groups of competencies were developed. The participants used Saaty's method to determine the significance of individual competencies. The different attributes of individual competencies according to the level of their development were established. Finally all individual competencies were assigned a target value which indicates the expected level of competence for the position of a crisis manager. The model of competencies is a practical tool for the establishment of crisis management system in a company. 相似文献
95.
Mirko Suznjevic Ognjen Dobrijevic Maja Matijasevic 《Multimedia Tools and Applications》2009,45(1-3):191-214
Providing Massively Multiplayer Online Role-Playing Games (MMORPGs) is a big challenge for future mobile, IP-based networks. Understanding how the players’ actions affect the network parameters, the game platform, and the overall perceived quality is highly relevant for the purposes of game design, as well as for the networking infrastructure and network support for games. We break player actions down into discrete categories, and show that each category is distinct in terms of several key metrics. We discuss which categories of actions could be supported on current mobile devices, and present evidence in form of a user survey demonstrating the demand for such services. The starting points into the discussion include the networking, session and latency requirements for particular player actions on one side, and the players’ interest on the other. The Blizzard Entertainment’s World of Warcraft (WoW) is used as a case study. 相似文献
96.
Miljan Vucetic Miroslav Hudec Mirko Vujošević 《Expert systems with applications》2013,40(7):2738-2745
In this paper, we present a new method for computing fuzzy functional dependencies between attributes in fuzzy relational database systems. The method is based on the use of fuzzy implications. A literature analysis has shown that there is no algorithm that would enable the identification of attribute relationships in fuzzy relational schemas. This fact was the motive for development a new methodology in the analysis of fuzzy functional dependencies over a given set of attributes. Solving this, not so new problem, is not only research challenge having theoretical importance, but it also has practical significance. Possible applications of the proposed methodology include GIS, data mining, information retrieval, reducing data redundancy in fuzzy relations through implementation of logical database model, estimation of missing values etc. 相似文献
97.
Knowing the estimation of a statistical process’s parameters for measured network traffic is very important as it can then be further used for the statistical analyses and modeling of network traffic in simulation tools. It is for this reason that different estimation methods are proposed that allow estimations of the statistical processes of network traffic. One of them is our own histograms comparison (EMHC) based method that can be used to estimate statistical data-length process parameters from measured packet traffic. The main part of EMHC method is Mapping Algorithm with Fragmentation Mimics (MAFM). 相似文献
98.
K. Čipková 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2006,10(6):471-475
In the paper we introduce a relation on the class of monounary algebras by means of -homomorphisms. It is a quasiorder. We take a subclass of containing monounary algebras satisfying the property We characterize algebras in by the notions of a degree and properties of their -endomorphisms. We apply the results to finite monounary algebras.
Supported by grant VEGA 1/0161/03 相似文献
99.
Štefan Černák 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(5):453-462
A convergence with a fixed regulator v in lattice ordered groups is applied to MV-algebras. For each Archimedean MV-algebra A there exists a v-Cauchy completion A
* and it is uniquely determined up to isomorphisms over A. The relation between the Dedekind completion A
∧ of A and A
* is established. There is solved a question of the existence of the greatest v-Cauchy complete ideal of A. 相似文献
100.
Jorge Santolaria Rosa Monge Ángel Tobajas Roberto Jimenez Mirko A. Cabrera Luis J. Fernandez 《Computers in Industry》2013
This paper presents the dimensional verification of encapsulations used to package microfluidic devices manufactured using a 3D printer of photopolymerisable resin. This characterisation has been performed by computed tomography (CT) by comparing newly manufactured encapsulations and samples that have been subjected to test conditions. Thus, it has been possible to draw conclusions both on the deviations of the nominal geometry of the encapsulations and on how this might affect their performance. This paper presents a scheme of dimensional verification from the point clouds obtained by CT. Finally, a combined threshold and scale factor correction technique of the tomography images is shown. This method is based on the simultaneous measurement of objective and master parts with known geometry. The results reveal the improvements achievable in the accuracy, given a particular machine configuration. The conclusions facilitate the improvement of the geometric design of these devices regarding their behaviour under test conditions. 相似文献