全文获取类型
收费全文 | 4110篇 |
免费 | 431篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 15篇 |
综合类 | 1篇 |
化学工业 | 1166篇 |
金属工艺 | 35篇 |
机械仪表 | 72篇 |
建筑科学 | 147篇 |
矿业工程 | 7篇 |
能源动力 | 60篇 |
轻工业 | 1579篇 |
水利工程 | 41篇 |
石油天然气 | 28篇 |
无线电 | 135篇 |
一般工业技术 | 599篇 |
冶金工业 | 262篇 |
原子能技术 | 3篇 |
自动化技术 | 395篇 |
出版年
2024年 | 15篇 |
2023年 | 44篇 |
2022年 | 77篇 |
2021年 | 127篇 |
2020年 | 135篇 |
2019年 | 137篇 |
2018年 | 238篇 |
2017年 | 224篇 |
2016年 | 250篇 |
2015年 | 230篇 |
2014年 | 234篇 |
2013年 | 440篇 |
2012年 | 349篇 |
2011年 | 344篇 |
2010年 | 225篇 |
2009年 | 177篇 |
2008年 | 175篇 |
2007年 | 209篇 |
2006年 | 117篇 |
2005年 | 117篇 |
2004年 | 92篇 |
2003年 | 103篇 |
2002年 | 87篇 |
2001年 | 32篇 |
2000年 | 21篇 |
1999年 | 27篇 |
1998年 | 65篇 |
1997年 | 60篇 |
1996年 | 36篇 |
1995年 | 32篇 |
1994年 | 18篇 |
1993年 | 17篇 |
1992年 | 8篇 |
1991年 | 5篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1982年 | 2篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 6篇 |
1976年 | 10篇 |
1974年 | 7篇 |
1969年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有4545条查询结果,搜索用时 15 毫秒
31.
Julio Vera Carlos González-Alcón Alberto Marín-Sanguino Néstor Torres 《Computers & Operations Research》2010,37(8):1427-1438
In this work we present a general (mono and multiobjective) optimization framework for the technological improvement of biochemical systems. The starting point of the method is a mathematical model in ordinary differential equations (ODEs) of the investigated system, based on qualitative biological knowledge and quantitative experimental data. In the method we take advantage of the special structural features of a family of ODEs called power-law models to reduce the computational complexity of the optimization program. In this way, the genetic manipulation of a biochemical system to meet a certain biotechnological goal can be expressed as an optimization program with some desired properties such as linearity or convexity.The general method of optimization is presented and discussed in its linear and geometric programming versions. We furthermore illustrate the use of the method by several real case studies. We conclude that the technological improvement of microorganisms can be afforded using the combination of mathematical modelling and optimization. The systematic nature of this approach facilitates the redesign of biochemical systems and makes this a predictive exercise rather than a trial-and-error procedure. 相似文献
32.
33.
34.
P. Javier Herrera Gonzalo Pajares María Guijarro José J. Ruz Jesús M. de la Cruz 《Expert systems with applications》2011,38(7):8622-8631
We present a novel strategy for computing disparity maps from omni-directional stereo images obtained with fish-eye lenses in forest environments. At a first segmentation stage, the method identifies textures of interest to be either matched or discarded. Two of them are identified by applying the powerful Support Vector Machines approach. At a second stage, a stereovision matching process is designed based on the application of four stereovision matching constraints: epipolarity, similarity, uniqueness and smoothness. The epipolarity guides the process. The similarity and uniqueness are mapped once again through the Support Vector Machines, but under a different way to the previous case; after this an initial disparity map is obtained. This map is later filtered by applying the Discrete Simulated Annealing framework where the smoothness constraint is conveniently mapped. The combination of the segmentation and stereovision matching approaches makes the main contribution. The method is compared against the usage of simple features and combined similarity matching strategies. 相似文献
35.
María Cristina Riff Xavier Bonnaire Bertrand Neveu 《Engineering Applications of Artificial Intelligence》2009,22(4-5):823-827
In this paper, we present a review of the recent approaches proposed in the literature for strip-packing problems. Many of them have been concurrently published, given some similar results for the same set of benchmarks. Due to the quantity of published papers, it is difficult to ascertain the level of current research in this area. 相似文献
36.
This paper presents a system that is able to process the information provided by a Tagged World to identify user’s behavior and to produce alarms in dangerous situations. The system inputs are signals from sensors, which are used to recognize correct behavior (action sequences) by Inductive Learning, using Data Mining techniques. The inference engine is a reasoning device that is implemented by means of Regular Grammars. It permits us to control user’s behavior. As output, the system produces and sends alarms when a user action sequence is wrong, indicating the erroneous actions, forgotten future, and so on. To test our system, the Tagged World is supposed to be at a house, where we have used RFID technology to control the objects inside it. 相似文献
37.
Virtual organizations (VOs) are formed by an alliance of organizations linked by a partnership for dealing with emerging challenges. Information and communication technologies play a fundamental role facilitating cooperation, communication and collaboration among the VO members. The formal identification and representation of Requirements Engineering (RE) for one organization have been researched to a large extent along with several elicitation techniques. However, these techniques are not adequate for covering the major challenges of RE for VO. We explore the work done in the management and RE fields to propose a model-based framework for eliciting VOs’ requirements. The goal is to analyze the VO from two points of view: border (intra-organizational, inter-organizational and extra-organizational) and abstract (intentional, organizational and operational). This article includes the framework validation with a case study and a transformation process to develop partial Business Process Diagram from the intentional models. 相似文献
38.
Luis Alvarez‐Icaza Oscar Rosas‐Jaimes María Elena Lárraga 《Asian journal of control》2017,19(2):494-509
A framework for stability analysis of local on‐ramp metering control strategies based on the cell transmission model is presented. Within this framework, it is possible to formulate Lyapunov and input‐state stability results for on‐ramp metering control strategies in an open section of highway with on‐ramps. Using this analysis, recommendations for the design of on‐ramp metering control laws set points are derived. Two examples on the use of such analysis are presented. One deals with the stability analysis of a local on‐ramp metering control law and the other with the design of a disturbance observer that, used in combination with the local on‐ramp metering control law, provides a more robust response to traffic regulation. Simulation results are included that confirm the possibility of using this framework to test the impact of local on‐ramp metering control strategies. 相似文献
39.
Arce-Urriza Marta Cebollada Javier Tarira María Fernanda 《Information Systems and E-Business Management》2017,15(1):69-87
Information Systems and e-Business Management - This study evaluates the differential effect of price promotions on brand choice across the offline and online channels of a grocery retailer. We use... 相似文献
40.
Juan M. Marín Pérez Jorge Bernal Bernabé Jose M. Alcaraz Calero Felix J. Garcia Clemente Gregorio Martínez Pérez Antonio F. Gómez Skarmeta 《Future Generation Computer Systems》2011,27(1):40-55
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process. 相似文献