首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   708篇
  免费   16篇
电工技术   3篇
化学工业   102篇
金属工艺   20篇
机械仪表   7篇
建筑科学   28篇
矿业工程   1篇
能源动力   20篇
轻工业   64篇
水利工程   5篇
石油天然气   2篇
无线电   69篇
一般工业技术   95篇
冶金工业   234篇
原子能技术   5篇
自动化技术   69篇
  2021年   5篇
  2020年   13篇
  2019年   4篇
  2018年   6篇
  2017年   11篇
  2016年   9篇
  2015年   3篇
  2014年   20篇
  2013年   25篇
  2012年   24篇
  2011年   22篇
  2010年   16篇
  2009年   17篇
  2008年   20篇
  2007年   22篇
  2006年   25篇
  2005年   36篇
  2004年   22篇
  2003年   21篇
  2002年   21篇
  2001年   12篇
  2000年   15篇
  1999年   12篇
  1998年   55篇
  1997年   24篇
  1996年   35篇
  1995年   30篇
  1994年   18篇
  1993年   18篇
  1992年   16篇
  1991年   15篇
  1990年   9篇
  1989年   14篇
  1988年   15篇
  1987年   7篇
  1986年   11篇
  1985年   7篇
  1984年   3篇
  1983年   5篇
  1982年   4篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1977年   4篇
  1976年   13篇
  1975年   4篇
  1972年   3篇
  1969年   4篇
  1968年   3篇
  1966年   3篇
排序方式: 共有724条查询结果,搜索用时 15 毫秒
721.
Returnable transport items (RTIs) are key elements for enabling a smooth flow of goods throughout supply chains. Despite their importance, RTIs can be prone to high loss and breakage rates. Today’s RTI management processes are rather inefficient and are based on estimates about when, where and how RTIs are utilised. This limited visibility inevitably causes the involved parties to feel less responsible for the proper management of RTIs. As a consequence, inefficiencies created by a single party can result in a significant cost burden for the whole supply chain. The goal of this paper is therefore to explore the impact of increased asset visibility on the RTI management process. We describe a solution based on Radio Frequency Identification (RFID) technology and quantify its financial impact from each individual stakeholder’s perspective. Our findings suggest that RFID can provide a powerful means to counter inefficiencies in the RTI management process and improve the overall effectiveness of the RTI supply chain network.  相似文献   
722.
The attentional blink (J. E. Raymond, K. L. Shapiro, & K. M. Arnell, 1992) refers to an apparent gap in perception observed when a second target follows a first within several hundred milliseconds. Theoretical and computational work have provided explanations for early sets of blink data, but more recent data have challenged these accounts by showing that the blink is attenuated when subjects encode strings of stimuli (J. Kawahara, T. Kumada, & V. Di Lollo, 2006; M. R. Nieuwenstein & M. C. Potter, 2006; C. N. Olivers, 2007) or are distracted (C. N. Olivers & S. Nieuwenhuis, 2005) while viewing the rapid serial visual presentation stream. The authors describe the episodic simultaneous type, serial token model, a computational account of encoding visual stimuli into working memory that suggests that the attentional blink is a cognitive strategy rather than a resource limitation. This model is composed of neurobiologically plausible elements and simulates the attentional blink with a competitive attentional mechanism that facilitates the formation of episodically distinct representations within working memory. In addition to addressing the blink, the model addresses the phenomena of repetition blindness and whole report superiority, producing predictions that are supported by experimental work. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
723.
Previous research has developed a formal methods-based (cognitive-level) model of the Interacting Cognitive Subsystems central engine, with which we have simulated attentional capture in the context of Barnard’s key-distractor Attentional Blink task. This model captures core aspects of the allocation of human attention over time and as such should be applicable across a range of practical settings when human attentional limitations come into play. In addition, this model simulates human electrophysiological data, such as electroencephalogram recordings, which can be compared to real electrophysiological data recorded from human participants. We have used this model to evaluate the performance trade-offs that would arise from varying key parameters and applying either a constructive or a reactive approach to improving interactive systems in a stimulus rich environment. A strength of formal methods is that they are abstract and the resulting specifications of the operator are general purpose, ensuring that our findings are broadly applicable. Thus, we argue that new modelling techniques from computer science can also be employed in computational modelling of the mind. These would complement existing techniques, being specifically targeted at psychological level modelling, in which it is advantageous to directly represent the distribution of control.  相似文献   
724.
The effect of radial confinement of explosive on the impulse delivered to an explosively driven circular plate was investigated numerically. The results are applicable to the design of explosively formed penetrators. Aluminum radial confinement and additional radial explosive were investigated as means of increasing the impulse delivered to the plate. The radial thicknesses were varied from 0% to 10% of the explosive charge diameter with copper plates having thicknesses of 2%, 5% and 8% of the explosive charge diameter. Results show the use of radial confinement to be more effective with thicker plates. The increase in impulse provided by aluminum confinement was as great as 18% with an 8% charge diameter thick plate, compared to 12% with a 2% charge diameter thick plate. Regardless of the plate thickness, additional radial explosive can be more effective than aluminum radial confinement in increasing the impulse. For example a 10% charge diameter thickness of explosive increases the impulse by up to 28%, compared to 18% for the same thickness of aluminum. The results do not exhibit dependence on the method of detonation, nor on the length of the explosive charge.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号