首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16139篇
  免费   1246篇
  国内免费   22篇
电工技术   111篇
综合类   10篇
化学工业   5917篇
金属工艺   239篇
机械仪表   460篇
建筑科学   568篇
矿业工程   22篇
能源动力   403篇
轻工业   3607篇
水利工程   132篇
石油天然气   80篇
无线电   850篇
一般工业技术   2393篇
冶金工业   751篇
原子能技术   62篇
自动化技术   1802篇
  2024年   52篇
  2023年   231篇
  2022年   998篇
  2021年   1184篇
  2020年   550篇
  2019年   551篇
  2018年   667篇
  2017年   682篇
  2016年   746篇
  2015年   582篇
  2014年   761篇
  2013年   1128篇
  2012年   1080篇
  2011年   1216篇
  2010年   919篇
  2009年   858篇
  2008年   787篇
  2007年   710篇
  2006年   525篇
  2005年   420篇
  2004年   345篇
  2003年   310篇
  2002年   294篇
  2001年   190篇
  2000年   128篇
  1999年   160篇
  1998年   151篇
  1997年   145篇
  1996年   133篇
  1995年   89篇
  1994年   80篇
  1993年   69篇
  1992年   81篇
  1991年   64篇
  1990年   50篇
  1989年   42篇
  1988年   42篇
  1987年   40篇
  1986年   42篇
  1985年   44篇
  1984年   35篇
  1983年   28篇
  1982年   17篇
  1981年   20篇
  1980年   24篇
  1979年   24篇
  1978年   21篇
  1977年   20篇
  1976年   12篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
Local and Global Interactions in an Evolutionary Resource Game   总被引:2,自引:0,他引:2  
Conditions for the emergence of cooperation in a spatial common-pool resource game are studied. This combines in a unique way local and global interactions. A fixed number of harvesters are located on a spatial grid. Harvesters choose among three strategies: defection, cooperation, and enforcement. Individual payoffs are affected by both global factors, namely, aggregate harvest and resource stock level, and local factors, such as the imposition of sanctions on neighbors by enforcers. The evolution of strategies in the population is driven by social learning through imitation, based on local interaction or locally available information. Numerous types of equilibria exist in these settings. An important new finding is that clusters of cooperators and enforcers can survive among large groups of defectors. We discuss how the results contrast with the non-spatial, but otherwise similar, game of Sethi and Somanathan (American Economic Review 86(4):766–789, 1996).   相似文献   
162.
Optimal assembly plan generation: a simplifying approach   总被引:3,自引:0,他引:3  
The main difficulty in the overall process of optimal assembly plan generation is the great number of different ways to assemble a product (typically thousands of solutions). This problem confines the application of most existing automated planning methods to products composed of only a limited number of components. The presented method of assembly plan generation belongs to the approach called “disassembly” and is founded on a new representation of the assembly process, with introduction of a new concept, the equivalence of binary trees. This representation allows to generate the minimal list of all non-redundant (really different) assembly plans. Plan generation is directed by assembly operation constraints and plan-level performance criteria. The method was tested for various assembly applications and compared to other generation approaches. Results show a great reduction in the combinatorial explosion of the number of plans. Therefore, this simplifying approach of assembly sequence modeling allows to handle more complex products with a large number of parts.  相似文献   
163.
While fractional calculus (FC) is as old as integer calculus, its application has been mainly restricted to mathematics. However, many real systems are better described using FC equations than with integer models. FC is a suitable tool for describing systems characterised by their fractal nature, long-term memory and chaotic behaviour. It is a promising methodology for failure analysis and modelling, since the behaviour of a failing system depends on factors that increase the model’s complexity. This paper explores the proficiency of FC in modelling complex behaviour by tuning only a few parameters. This work proposes a novel two-step strategy for diagnosis, first modelling common failure conditions and, second, by comparing these models with real machine signals and using the difference to feed a computational classifier. Our proposal is validated using an electrical motor coupled with a mechanical gear reducer.  相似文献   
164.
This research aims to complex validate radar displacement products over Bucharest based on Global Navigation Satellite System or GNSS. Validation was represented by the comparison of the recent TerraSAR-X (TSX) displacement results with field GNSS data. For this purpose, 24 and 27 high-resolution images acquired from the TSX satellite between 2011 and 2014 were processed by Permanent Scatterer Inteferometry (PSI) and Small BASeline Subset (SBAS) – interferometric techniques using synthetic aperture radar (SAR) images. The images were selected from a larger pool of SAR images, after consulting weather databases, which helped eliminate the images acquired under adverse weather conditions. GNSS locations were cross-checked on high-resolution optical images and 21 ground points (including three permanent stations) were selected. All these points were (1) characterized by high coherence on radar images; (2) were on the ground; (3) were situated in large vacant spaces; and (4) far away from radar obstacles such as trees. A major challenge in achieving the research goal was to overcome the lack of permanent stations at the ground level within the area of Bucharest. Instead of permanent stations, our team designed and installed forced centring systems that remained stable over time, eliminating the instalment errors of GNSS receivers. The line-of-site (LOS) components derived from GNSS data have been compared with those of the SAR scatterers closest to the GNSS markers (never coinciding). For each location, the vertical reading was projected in the LOS of the SAR sensor. These readings were compared with the displacement values determined at the locations of permanent scatterers (PSs) within 100 m from the GNSS nodes, by eliminating all scatterers on buildings. The comparison has shown a good agreement.  相似文献   
165.
Robots must be able to adapt their motor behavior to unexpected situations in order to safely move among humans. A necessary step is to be able to predict failures, which result in behavior abnormalities and may cause irrecoverable damage to the robot and its surroundings, i.e. humans. In this paper we build a predictive model of sensor traces that enables early failure detection by means of a skill memory. Specifically, we propose an architecture based on a biped locomotion solution with improved robustness due to sensory feedback, and extend the concept of Associative Skill Memories (ASM) to periodic movements by introducing several mechanisms into the training workflow, such as linear interpolation and regression into a Dynamical Motion Primitive (DMP) system such that representation becomes time invariant and easily parameterizable. The failure detection mechanism applies statistical tests to determine the optimal operating conditions. Both training and failure testing were conducted on a DARwIn-OP inside a simulation environment to assess and validate the failure detection system proposed. Results show that the system performance in terms of the compromise between sensitivity and specificity is similar with and without the proposed mechanism, while achieving a significant data size reduction due to the periodic approach taken.  相似文献   
166.
In the context of fault detection and isolation of linear parameter‐varying systems, a challenging task appears when the dynamics and the available measurements render the model unobservable, which invalidates the use of standard set‐valued observers. Two results are obtained in this paper, namely, using a left‐coprime factorization, one can achieve set‐valued estimates with ultimately bounded hyper‐volume and convergence dependent on the slowest unobservable mode; and by rewriting the set‐valued observer equations and taking advantage of a coprime factorization, it is possible to have a low‐complexity fault detection and isolation method. Performance is assessed through simulation, illustrating, in particular, the detection time for various types of faults. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
167.
As the first broad reform of the EU data protection legislation is being achieved, and notwithstanding EU institutions’ confident discourse, scepticism remains about the reform’s ability to safeguard the fundamental right to data protection in the face of evolving data processing techniques underlying so-called big data. Yet, one might wonder whether the cause for this difficulty should be ascribed mainly to technological progresses that the law finds it hard to deal with or rather to the policy choices embedded in the legal reform itself. Indeed, a new data protection enforcement model is being adopted, which relies heavily on risk assessment and management by the data controllers themselves. Likewise, data protection authorities see their supervisory role significantly weakened. These developments and the underlying rationality are discussed. Given the limitations of the risk-based approach as currently devised, we suggest that it be reappraised in consideration of risk regulatory experiences in other domains.  相似文献   
168.
In a large organization, informal communication and simple backlogs are not sufficient for the management of requirements and development work. Many large organizations are struggling to successfully adopt agile methods, but there is still little scientific knowledge on requirements management in large-scale agile development organizations. We present an in-depth study of an Ericsson telecommunications node development organization which employs a large scale agile method to develop telecommunications system software. We describe how the requirements flow from strategy to release, and related benefits and problems. Data was collected by 43 interviews, which were analyzed qualitatively. The requirements management was done in three different processes, each of which had a different process model, purpose and planning horizon. The release project management process was plan-driven, feature development process was continuous and implementation management process was agile. The perceived benefits included reduced development lead time, increased flexibility, increased planning efficiency, increased developer motivation and improved communication effectiveness. The recognized problems included difficulties in balancing planning effort, overcommitment, insufficient understanding of the development team autonomy, defining the product owner role, balancing team specialization, organizing system-level work and growing technical debt. The study indicates that agile development methods can be successfully employed in organizations where the higher level planning processes are not agile. Combining agile methods with a flexible feature development process can bring many benefits, but large-scale software development seems to require specialist roles and significant coordination effort.  相似文献   
169.
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality.  相似文献   
170.
Precarious or temporary work is associated with adverse outcomes including low control over working hours, work-life conflict and stress. The rise in precarious employment is most marked in the service sector but little research has been done on its health effects in this sector. This study compares permanent and temporary workers in the hotel industry, where working hours are highly variable. Survey data from 150 workers from eight 3-Star hotels in urban and regional areas around Sydney were analyzed. Forty-five per cent were male and 52 per cent were female. Fifty four per cent were permanent full-time and 46 per cent were temporary workers. The effects of employment status on perceived job security, control over working hours, and work-life conflict are investigated using PLS-Graph 3.0. The effects of control over working hours, on work-life conflict and subsequent health outcomes are also explored. Temporary workers perceived themselves as less in control of their working hours, than permanent workers (β = .27). However, they also reported lower levels of work intensity (β = .25) and working hours (β = .38). The effects of low hours control (β = .20), work intensity (β = .29), and excessive hours (β = .39) on work-life conflict (r2 = .50), and subsequent health effects (r2 = .30), are illustrated in the final structural equation model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号