全文获取类型
收费全文 | 16139篇 |
免费 | 1246篇 |
国内免费 | 22篇 |
专业分类
电工技术 | 111篇 |
综合类 | 10篇 |
化学工业 | 5917篇 |
金属工艺 | 239篇 |
机械仪表 | 460篇 |
建筑科学 | 568篇 |
矿业工程 | 22篇 |
能源动力 | 403篇 |
轻工业 | 3607篇 |
水利工程 | 132篇 |
石油天然气 | 80篇 |
无线电 | 850篇 |
一般工业技术 | 2393篇 |
冶金工业 | 751篇 |
原子能技术 | 62篇 |
自动化技术 | 1802篇 |
出版年
2024年 | 52篇 |
2023年 | 231篇 |
2022年 | 998篇 |
2021年 | 1184篇 |
2020年 | 550篇 |
2019年 | 551篇 |
2018年 | 667篇 |
2017年 | 682篇 |
2016年 | 746篇 |
2015年 | 582篇 |
2014年 | 761篇 |
2013年 | 1128篇 |
2012年 | 1080篇 |
2011年 | 1216篇 |
2010年 | 919篇 |
2009年 | 858篇 |
2008年 | 787篇 |
2007年 | 710篇 |
2006年 | 525篇 |
2005年 | 420篇 |
2004年 | 345篇 |
2003年 | 310篇 |
2002年 | 294篇 |
2001年 | 190篇 |
2000年 | 128篇 |
1999年 | 160篇 |
1998年 | 151篇 |
1997年 | 145篇 |
1996年 | 133篇 |
1995年 | 89篇 |
1994年 | 80篇 |
1993年 | 69篇 |
1992年 | 81篇 |
1991年 | 64篇 |
1990年 | 50篇 |
1989年 | 42篇 |
1988年 | 42篇 |
1987年 | 40篇 |
1986年 | 42篇 |
1985年 | 44篇 |
1984年 | 35篇 |
1983年 | 28篇 |
1982年 | 17篇 |
1981年 | 20篇 |
1980年 | 24篇 |
1979年 | 24篇 |
1978年 | 21篇 |
1977年 | 20篇 |
1976年 | 12篇 |
1975年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
Local and Global Interactions in an Evolutionary Resource Game 总被引:2,自引:0,他引:2
Conditions for the emergence of cooperation in a spatial common-pool resource game are studied. This combines in a unique
way local and global interactions. A fixed number of harvesters are located on a spatial grid. Harvesters choose among three
strategies: defection, cooperation, and enforcement. Individual payoffs are affected by both global factors, namely, aggregate
harvest and resource stock level, and local factors, such as the imposition of sanctions on neighbors by enforcers. The evolution
of strategies in the population is driven by social learning through imitation, based on local interaction or locally available
information. Numerous types of equilibria exist in these settings. An important new finding is that clusters of cooperators
and enforcers can survive among large groups of defectors. We discuss how the results contrast with the non-spatial, but otherwise
similar, game of Sethi and Somanathan (American Economic Review 86(4):766–789, 1996).
相似文献
162.
Optimal assembly plan generation: a simplifying approach 总被引:3,自引:0,他引:3
The main difficulty in the overall process of optimal assembly plan generation is the great number of different ways to assemble
a product (typically thousands of solutions). This problem confines the application of most existing automated planning methods
to products composed of only a limited number of components. The presented method of assembly plan generation belongs to the
approach called “disassembly” and is founded on a new representation of the assembly process, with introduction of a new concept,
the equivalence of binary trees. This representation allows to generate the minimal list of all non-redundant (really different) assembly plans. Plan generation is directed by assembly operation constraints and plan-level performance
criteria. The method was tested for various assembly applications and compared to other generation approaches. Results show
a great reduction in the combinatorial explosion of the number of plans. Therefore, this simplifying approach of assembly
sequence modeling allows to handle more complex products with a large number of parts. 相似文献
163.
Ricardo Enrique Gutiérrez-Carvajal João Maurício Rosário J.A. Tenreiro Machado 《International journal of systems science》2016,47(9):2169-2177
While fractional calculus (FC) is as old as integer calculus, its application has been mainly restricted to mathematics. However, many real systems are better described using FC equations than with integer models. FC is a suitable tool for describing systems characterised by their fractal nature, long-term memory and chaotic behaviour. It is a promising methodology for failure analysis and modelling, since the behaviour of a failing system depends on factors that increase the model’s complexity. This paper explores the proficiency of FC in modelling complex behaviour by tuning only a few parameters. This work proposes a novel two-step strategy for diagnosis, first modelling common failure conditions and, second, by comparing these models with real machine signals and using the difference to feed a computational classifier. Our proposal is validated using an electrical motor coupled with a mechanical gear reducer. 相似文献
164.
Iuliana Armaş Mihaela Gheorghe Ana Maria Lendvai Paul Daniel Dumitru Octavian Bădescu Alexandru Călin 《International journal of remote sensing》2016,37(23):5565-5580
This research aims to complex validate radar displacement products over Bucharest based on Global Navigation Satellite System or GNSS. Validation was represented by the comparison of the recent TerraSAR-X (TSX) displacement results with field GNSS data. For this purpose, 24 and 27 high-resolution images acquired from the TSX satellite between 2011 and 2014 were processed by Permanent Scatterer Inteferometry (PSI) and Small BASeline Subset (SBAS) – interferometric techniques using synthetic aperture radar (SAR) images. The images were selected from a larger pool of SAR images, after consulting weather databases, which helped eliminate the images acquired under adverse weather conditions. GNSS locations were cross-checked on high-resolution optical images and 21 ground points (including three permanent stations) were selected. All these points were (1) characterized by high coherence on radar images; (2) were on the ground; (3) were situated in large vacant spaces; and (4) far away from radar obstacles such as trees. A major challenge in achieving the research goal was to overcome the lack of permanent stations at the ground level within the area of Bucharest. Instead of permanent stations, our team designed and installed forced centring systems that remained stable over time, eliminating the instalment errors of GNSS receivers. The line-of-site (LOS) components derived from GNSS data have been compared with those of the SAR scatterers closest to the GNSS markers (never coinciding). For each location, the vertical reading was projected in the LOS of the SAR sensor. These readings were compared with the displacement values determined at the locations of permanent scatterers (PSs) within 100 m from the GNSS nodes, by eliminating all scatterers on buildings. The comparison has shown a good agreement. 相似文献
165.
João André Cristina Santos Lino Costa 《Journal of Intelligent and Robotic Systems》2016,82(3-4):379-397
Robots must be able to adapt their motor behavior to unexpected situations in order to safely move among humans. A necessary step is to be able to predict failures, which result in behavior abnormalities and may cause irrecoverable damage to the robot and its surroundings, i.e. humans. In this paper we build a predictive model of sensor traces that enables early failure detection by means of a skill memory. Specifically, we propose an architecture based on a biped locomotion solution with improved robustness due to sensory feedback, and extend the concept of Associative Skill Memories (ASM) to periodic movements by introducing several mechanisms into the training workflow, such as linear interpolation and regression into a Dynamical Motion Primitive (DMP) system such that representation becomes time invariant and easily parameterizable. The failure detection mechanism applies statistical tests to determine the optimal operating conditions. Both training and failure testing were conducted on a DARwIn-OP inside a simulation environment to assess and validate the failure detection system proposed. Results show that the system performance in terms of the compromise between sensitivity and specificity is similar with and without the proposed mechanism, while achieving a significant data size reduction due to the periodic approach taken. 相似文献
166.
In the context of fault detection and isolation of linear parameter‐varying systems, a challenging task appears when the dynamics and the available measurements render the model unobservable, which invalidates the use of standard set‐valued observers. Two results are obtained in this paper, namely, using a left‐coprime factorization, one can achieve set‐valued estimates with ultimately bounded hyper‐volume and convergence dependent on the slowest unobservable mode; and by rewriting the set‐valued observer equations and taking advantage of a coprime factorization, it is possible to have a low‐complexity fault detection and isolation method. Performance is assessed through simulation, illustrating, in particular, the detection time for various types of faults. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
167.
Maria Eduarda Gonçalves 《Information & Communications Technology Law》2017,26(2):90-115
As the first broad reform of the EU data protection legislation is being achieved, and notwithstanding EU institutions’ confident discourse, scepticism remains about the reform’s ability to safeguard the fundamental right to data protection in the face of evolving data processing techniques underlying so-called big data. Yet, one might wonder whether the cause for this difficulty should be ascribed mainly to technological progresses that the law finds it hard to deal with or rather to the policy choices embedded in the legal reform itself. Indeed, a new data protection enforcement model is being adopted, which relies heavily on risk assessment and management by the data controllers themselves. Likewise, data protection authorities see their supervisory role significantly weakened. These developments and the underlying rationality are discussed. Given the limitations of the risk-based approach as currently devised, we suggest that it be reappraised in consideration of risk regulatory experiences in other domains. 相似文献
168.
Ville T. Heikkilä Maria Paasivaara Casper Lasssenius Daniela Damian Christian Engblom 《Empirical Software Engineering》2017,22(6):2892-2936
In a large organization, informal communication and simple backlogs are not sufficient for the management of requirements and development work. Many large organizations are struggling to successfully adopt agile methods, but there is still little scientific knowledge on requirements management in large-scale agile development organizations. We present an in-depth study of an Ericsson telecommunications node development organization which employs a large scale agile method to develop telecommunications system software. We describe how the requirements flow from strategy to release, and related benefits and problems. Data was collected by 43 interviews, which were analyzed qualitatively. The requirements management was done in three different processes, each of which had a different process model, purpose and planning horizon. The release project management process was plan-driven, feature development process was continuous and implementation management process was agile. The perceived benefits included reduced development lead time, increased flexibility, increased planning efficiency, increased developer motivation and improved communication effectiveness. The recognized problems included difficulties in balancing planning effort, overcommitment, insufficient understanding of the development team autonomy, defining the product owner role, balancing team specialization, organizing system-level work and growing technical debt. The study indicates that agile development methods can be successfully employed in organizations where the higher level planning processes are not agile. Combining agile methods with a flexible feature development process can bring many benefits, but large-scale software development seems to require specialist roles and significant coordination effort. 相似文献
169.
Rui C. Gonçalves Don Batory João L. Sobral Taylor L. Riché 《Software and Systems Modeling》2017,16(4):929-947
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality. 相似文献
170.
Precarious or temporary work is associated with adverse outcomes including low control over working hours, work-life conflict and stress. The rise in precarious employment is most marked in the service sector but little research has been done on its health effects in this sector. This study compares permanent and temporary workers in the hotel industry, where working hours are highly variable. Survey data from 150 workers from eight 3-Star hotels in urban and regional areas around Sydney were analyzed. Forty-five per cent were male and 52 per cent were female. Fifty four per cent were permanent full-time and 46 per cent were temporary workers. The effects of employment status on perceived job security, control over working hours, and work-life conflict are investigated using PLS-Graph 3.0. The effects of control over working hours, on work-life conflict and subsequent health outcomes are also explored. Temporary workers perceived themselves as less in control of their working hours, than permanent workers (β = .27). However, they also reported lower levels of work intensity (β = .25) and working hours (β = .38). The effects of low hours control (β = .20), work intensity (β = .29), and excessive hours (β = .39) on work-life conflict (r2 = .50), and subsequent health effects (r2 = .30), are illustrated in the final structural equation model. 相似文献