全文获取类型
收费全文 | 2323篇 |
免费 | 152篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 47篇 |
综合类 | 6篇 |
化学工业 | 675篇 |
金属工艺 | 60篇 |
机械仪表 | 60篇 |
建筑科学 | 147篇 |
矿业工程 | 2篇 |
能源动力 | 50篇 |
轻工业 | 165篇 |
水利工程 | 6篇 |
石油天然气 | 2篇 |
无线电 | 190篇 |
一般工业技术 | 503篇 |
冶金工业 | 164篇 |
原子能技术 | 11篇 |
自动化技术 | 389篇 |
出版年
2022年 | 29篇 |
2021年 | 50篇 |
2020年 | 33篇 |
2019年 | 47篇 |
2018年 | 52篇 |
2017年 | 69篇 |
2016年 | 70篇 |
2015年 | 77篇 |
2014年 | 88篇 |
2013年 | 131篇 |
2012年 | 115篇 |
2011年 | 166篇 |
2010年 | 104篇 |
2009年 | 105篇 |
2008年 | 124篇 |
2007年 | 110篇 |
2006年 | 101篇 |
2005年 | 79篇 |
2004年 | 59篇 |
2003年 | 63篇 |
2002年 | 42篇 |
2001年 | 41篇 |
2000年 | 43篇 |
1999年 | 41篇 |
1998年 | 54篇 |
1997年 | 43篇 |
1996年 | 45篇 |
1995年 | 35篇 |
1994年 | 21篇 |
1993年 | 31篇 |
1992年 | 25篇 |
1991年 | 22篇 |
1990年 | 17篇 |
1989年 | 22篇 |
1988年 | 18篇 |
1987年 | 12篇 |
1986年 | 25篇 |
1985年 | 20篇 |
1984年 | 21篇 |
1983年 | 15篇 |
1982年 | 13篇 |
1981年 | 18篇 |
1980年 | 13篇 |
1979年 | 19篇 |
1978年 | 20篇 |
1977年 | 17篇 |
1976年 | 15篇 |
1974年 | 12篇 |
1973年 | 11篇 |
1970年 | 10篇 |
排序方式: 共有2477条查询结果,搜索用时 15 毫秒
31.
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications not only are Semantic Wikis, Semantic Desktops, but also advanced Web Services and agents. The application of rules increases the expressiveness of the underlying knowledge in many ways. Likewise, the integration not only creates new challenges for the design process of such ontologies, but also existing evaluation methods have to cope with the extension of ontologies by rules.Since the verification of Owl ontologies with rule extensions is not tractable in general, we propose to verify ontologies at the symbolic level by using a declarative approach: With the new language Datalog?, known anomalies can be easily specified and tested in a compact manner. We introduce supplements to existing verification techniques to support the design of ontologies with rule enhancements, and we focus on the detection of anomalies that especially occur due to the combined use of rules and ontological definitions. 相似文献
32.
Holger Maune Mohsen Sazegar Yuliang Zheng Xianghui Zhou Andre Giere Patrick Scheele Florian Paul Joachim R. Binder Rolf Jakoby 《Microsystem Technologies》2011,17(2):213-224
The research on materials and systems for tunable microwave devices has gained attraction within the last years. The radio
frequency characterization and the component design of tunable microwave components based on dielectric ceramics especially
barium-strontium-titanate (BST) are presented in this second part, whereas the basic material properties are discussed in
detail in the first part. After a short introduction to the processing technology used for the fabrication of tunable components
based on a BST thick film, the relations between microwave properties and material properties as well as the microstructure
are presented in detail. The design process for tunable microwave components based on BST thick films is described. Especially
the considerations related to micro- and macrostructure and their connection are highlighted. The paper closes with two different
application examples: a reconfigurable array antenna for satellite communication and varactors for high power applications. 相似文献
33.
The geometric element transformation method (GETMe) is a geometry-based smoothing method for mixed and non-mixed meshes. It
is based on a simple geometric transformation applicable to elements bounded by polygons with an arbitrary number of nodes.
The transformation, if applied iteratively, leads to a regularization of the polygons. Global mesh smoothing is accomplished
by averaging the new node positions obtained by local element transformations. Thereby, the choice of transformation parameters
as well as averaging weights can be based on the element quality which leads to high quality results. In this paper, a concept
of an enhanced transformation approach is presented and a proof for the regularizing effect of the transformation based on
eigenpolygons is given. Numerical examples confirm that the GETMe approach leads to superior mesh quality if compared to other
geometry-based methods. In terms of quality it can even compete with optimization-based techniques, despite being conceptually
significantly simpler. 相似文献
34.
It is well-known that there are striking analogies between linear shift-invariant systems and morphological systems for image analysis. So far, however, the relations between both system theories are mainly understood on a pure convolution / erosion level. A formal connection on the level of differential or pseudodifferential equations and their induced scale-spaces is still missing. The goal of our paper is to close this gap. We present a simple and fairly general dictionary that allows to translate any linear shift-invariant evolution equation into its morphological counterpart and vice versa. It is based on a scale-space representation by means of the symbol of its (pseudo)differential operator. Introducing a novel transformation, the Cramér–Fourier transform, puts us in a position to relate the symbol to the structuring function of a morphological scale-space of Hamilton–Jacobi type. As an application of our general theory, we derive the morphological counterparts of many linear shift-invariant scale-spaces, such as the Poisson scale-space, \(\alpha \)-scale-spaces, summed \(\alpha \)-scale-spaces, relativistic scale-spaces, and their anisotropic variants. Our findings are illustrated by experiments. 相似文献
35.
In this paper, we present an automatic C-code generation strategy for real-time nonlinear model predictive control (NMPC), which is designed for applications with kilohertz sample rates. The corresponding code export module has been implemented within the software package ACADO Toolkit. It is capable of exporting fixed step-size integrators together with their sensitivities as well as a real-time Gauss–Newton method. Here, we employ the symbolic representation of optimal control problems in ACADO in order to auto-generate plain C-code which is optimized for final production. The exported code has been tested for model predictive control scenarios comprising constrained nonlinear dynamic systems with four states and a control horizon of ten samples. The numerical simulations show a promising performance of the exported code being able to provide feedback in much less than a millisecond. 相似文献
36.
We present an algorithm that finds out-trees and out-branchings with at least k leaves in directed graphs. These problems are known as Directed Maximum Leaf Out-Tree and Directed Maximum Leaf Out-Branching, respectively, and—in the case of undirected graphs—as Maximum Leaf Spanning Tree. The run time of our algorithm is O(4
k
nm) on directed graphs and O(poly(n)+4
k
k
2) on undirected graphs. This improves over the previously fastest algorithms for these problems with run times of 2
O(klog k)
poly(n) and O(poly(n)+6.75
k
poly(k)) respectively. 相似文献
37.
Knowledge visualization for evaluation tasks 总被引:1,自引:1,他引:0
Although various methods for the evaluation of intelligent systems have been proposed in the past, almost no techniques are
present that support the manual inspection of knowledge bases by the domain specialist. Manual knowledge base inspection is
an important and frequently applied method in knowledge engineering. Since it can hardly be performed in an automated manner,
it is a time-consuming and costly task. In this paper, we discuss a collection of appropriate visualization techniques that
help developers to interactively browse and analyze the knowledge base in order to find deficiencies and semantic errors in
their implementation. We describe standard visualization methods adapted to specifically support the analysis of the static
knowledge base structure, but also of the usage of knowledge base objects such as questions or solutions. Additionally, we
introduce a novel visualization technique that supports the validation of the derivation and interview behavior of a knowledge
system in a semi-automatic manner. The application of the presented methods was motivated by the daily practice of knowledge
base development. 相似文献
38.
Peter Coschurba Joachim Baumann Uwe Kubach Alexander Leonhardi 《Personal and Ubiquitous Computing》2001,5(1):16-19
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor
is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users
of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore,
we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our
considerations with a classification of new and existing metaphors using our taxonomy. 相似文献
39.
An Internet-based negotiation server for e-commerce 总被引:6,自引:0,他引:6
Stanley Y.W. Su Chunbo Huang Joachim Hammer Yihua Huang Haifei Li Liu Wang Youzhong Liu Charnyote Pluempitiwiriyawej Minsoo Lee Herman Lam 《The VLDB Journal The International Journal on Very Large Data Bases》2001,10(1):72-90
This paper describes the design and implementation of a replicable, Internet-based negotiation server for conducting bargaining-type
negotiations between enterprises involved in e-commerce and e-business. Enterprises can be buyers and sellers of products/services
or participants of a complex supply chain engaged in purchasing, planning, and scheduling. Multiple copies of our server can
be installed to complement the services of Web servers. Each enterprise can install or select a trusted negotiation server
to represent his/her interests. Web-based GUI tools are used during the build-time registration process to specify the requirements,
constraints, and rules that represent negotiation policies and strategies, preference scoring of different data conditions,
and aggregation methods for deriving a global cost-benefit score for the item(s) under negotiation. The registration information
is used by the negotiation servers to automatically conduct bargaining type negotiations on behalf of their clients. In this
paper, we present the architecture of our implementation as well as a framework for automated negotiations, and describe a
number of communication primitives which are used in the underlying negotiation protocol. A constraint satisfaction processor
(CSP) is used to evaluate a negotiation proposal or counterproposal against the registered requirements and constraints of
a client company. In case of a constraint violation, an event is posted to trigger the execution of negotiation strategic
rules, which either automatically relax the violated constraint, ask for human intervention, invoke an application, or perform
other remedial operations. An Event-Trigger-Rule (ETR) server is used to manage events, triggers, and rules. Negotiation strategic
rules can be added or modified at run-time. A cost-benefit analysis component is used to perform quantitative analysis of
alternatives. The use of negotiation servers to conduct automated negotiation has been demonstrated in the context of an integrated
supply chain scenario.
Received: 30 October 2000 / Accepted: 12 January 2001 Published online: 2 August 2001 相似文献
40.
Relations Between Regularization and Diffusion Filtering 总被引:4,自引:0,他引:4
Regularization may be regarded as diffusion filtering with an implicit time discretization where one single step is used. Thus, iterated regularization with small regularization parameters approximates a diffusion process. The goal of this paper is to analyse relations between noniterated and iterated regularization and diffusion filtering in image processing. In the linear regularization framework, we show that with iterated Tikhonov regularization noise can be better handled than with noniterated. In the nonlinear framework, two filtering strategies are considered: the total variation regularization technique and the diffusion filter technique of Perona and Malik. It is shown that the Perona-Malik equation decreases the total variation during its evolution. While noniterated and iterated total variation regularization is well-posed, one cannot expect to find a minimizing sequence which converges to a minimizer of the corresponding energy functional for the Perona–Malik filter. To overcome this shortcoming, a novel regularization technique of the Perona–Malik process is presented that allows to construct a weakly lower semi-continuous energy functional. In analogy to recently derived results for a well-posed class of regularized Perona–Malik filters, we introduce Lyapunov functionals and convergence results for regularization methods. Experiments on real-world images illustrate that iterated linear regularization performs better than noniterated, while no significant differences between noniterated and iterated total variation regularization have been observed. 相似文献