全文获取类型
收费全文 | 5250篇 |
免费 | 170篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 52篇 |
综合类 | 1篇 |
化学工业 | 952篇 |
金属工艺 | 95篇 |
机械仪表 | 91篇 |
建筑科学 | 299篇 |
矿业工程 | 18篇 |
能源动力 | 134篇 |
轻工业 | 461篇 |
水利工程 | 43篇 |
石油天然气 | 38篇 |
武器工业 | 1篇 |
无线电 | 308篇 |
一般工业技术 | 896篇 |
冶金工业 | 1080篇 |
原子能技术 | 18篇 |
自动化技术 | 944篇 |
出版年
2023年 | 35篇 |
2022年 | 42篇 |
2021年 | 95篇 |
2020年 | 76篇 |
2019年 | 65篇 |
2018年 | 94篇 |
2017年 | 77篇 |
2016年 | 125篇 |
2015年 | 93篇 |
2014年 | 169篇 |
2013年 | 356篇 |
2012年 | 249篇 |
2011年 | 323篇 |
2010年 | 230篇 |
2009年 | 199篇 |
2008年 | 257篇 |
2007年 | 240篇 |
2006年 | 193篇 |
2005年 | 196篇 |
2004年 | 141篇 |
2003年 | 135篇 |
2002年 | 133篇 |
2001年 | 81篇 |
2000年 | 72篇 |
1999年 | 85篇 |
1998年 | 124篇 |
1997年 | 130篇 |
1996年 | 81篇 |
1995年 | 81篇 |
1994年 | 59篇 |
1993年 | 76篇 |
1992年 | 78篇 |
1991年 | 46篇 |
1990年 | 55篇 |
1989年 | 53篇 |
1988年 | 50篇 |
1987年 | 49篇 |
1986年 | 57篇 |
1985年 | 71篇 |
1984年 | 60篇 |
1983年 | 71篇 |
1982年 | 49篇 |
1981年 | 37篇 |
1980年 | 47篇 |
1979年 | 62篇 |
1978年 | 45篇 |
1977年 | 46篇 |
1976年 | 40篇 |
1975年 | 37篇 |
1973年 | 25篇 |
排序方式: 共有5431条查询结果,搜索用时 0 毫秒
101.
Philip J. Nickel 《Minds and Machines》2013,23(4):489-502
Some of the systems used in natural language generation (NLG), a branch of applied computational linguistics, have the capacity to create or assemble somewhat original messages adapted to new contexts. In this paper, taking Bernard Williams’ account of assertion by machines as a starting point, I argue that NLG systems meet the criteria for being speech actants to a substantial degree. They are capable of authoring original messages, and can even simulate illocutionary force and speaker meaning. Background intelligence embedded in their datasets enhances these speech capacities. Although there is an open question about who is ultimately responsible for their speech, if anybody, we can settle this question by using the notion of proxy speech, in which responsibility for artificial speech acts is assigned legally or conventionally to an entity separate from the speech actant. 相似文献
102.
AbstractRecent data breaches at major retailers have created an extra awareness of information security risks within the IT internal auditors. This article focuses on top security topics which every internal auditor must consider before they finalize their audit plans 相似文献
103.
Luna Karlos; Higham Philip A.; Martín-Luengo Beatriz 《Canadian Metallurgical Quarterly》2011,17(2):148
We report two experiments that investigated the regulation of memory accuracy with a new regulatory mechanism: the plurality option. This mechanism is closely related to the grain-size option but involves control over the number of alternatives contained in an answer rather than the quantitative boundaries of a single answer. Participants were presented with a slideshow depicting a robbery (Experiment 1) or a murder (Experiment 2), and their memory was tested with five-alternative multiple-choice questions. For each question, participants were asked to generate two answers: a single answer consisting of one alternative and a plural answer consisting of the single answer and two other alternatives. Each answer was rated for confidence (Experiment 1) or for the likelihood of being correct (Experiment 2), and one of the answers was selected for reporting. Results showed that participants used the plurality option to regulate accuracy, selecting single answers when their accuracy and confidence were high, but opting for plural answers when they were low. Although accuracy was higher for selected plural than for selected single answers, the opposite pattern was evident for confidence or likelihood ratings. This dissociation between confidence and accuracy for selected answers was the result of marked overconfidence in single answers coupled with underconfidence in plural answers. We hypothesize that these results can be attributed to overly dichotomous metacognitive beliefs about personal knowledge states that cause subjective confidence to be extreme. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
104.
105.
106.
107.
109.
110.
Multipole expansions offer a natural path to coarse-graining the electrostatic potential. However, the validity of the expansion is restricted to regions outside a spherical enclosure of the distribution of charge and, therefore, not suitable for most applications that demand accurate representation at arbitrary positions around the molecule. We propose and demonstrate a distributed multipole expansion approach that resolves this limitation. We also provide a practical algorithm for the computational implementation of this approach. The method allows the partitioning of the charge distribution into subsystems so that the multipole expansion of each component of the partition, and therefore of their superposition, is valid outside an enclosing surface of the molecule of arbitrary shape. The complexity of the resulting coarse-grained model of electrostatic potential is dictated by the area of the molecular surface and therefore, for a typical three-dimensional molecule, it scale as N2/3 with N, the number of charges in the system. This makes the method especially useful for coarse-grained studies of biological systems consisting of many large macromolecules provided that the configuration of the individual molecules can be approximated as fixed. 相似文献