全文获取类型
收费全文 | 4912篇 |
免费 | 174篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 39篇 |
综合类 | 5篇 |
化学工业 | 1156篇 |
金属工艺 | 84篇 |
机械仪表 | 79篇 |
建筑科学 | 219篇 |
矿业工程 | 20篇 |
能源动力 | 172篇 |
轻工业 | 391篇 |
水利工程 | 35篇 |
石油天然气 | 36篇 |
武器工业 | 2篇 |
无线电 | 431篇 |
一般工业技术 | 811篇 |
冶金工业 | 892篇 |
原子能技术 | 14篇 |
自动化技术 | 705篇 |
出版年
2023年 | 32篇 |
2022年 | 72篇 |
2021年 | 91篇 |
2020年 | 60篇 |
2019年 | 74篇 |
2018年 | 88篇 |
2017年 | 93篇 |
2016年 | 91篇 |
2015年 | 90篇 |
2014年 | 131篇 |
2013年 | 366篇 |
2012年 | 224篇 |
2011年 | 301篇 |
2010年 | 195篇 |
2009年 | 223篇 |
2008年 | 230篇 |
2007年 | 240篇 |
2006年 | 201篇 |
2005年 | 156篇 |
2004年 | 128篇 |
2003年 | 120篇 |
2002年 | 129篇 |
2001年 | 98篇 |
2000年 | 80篇 |
1999年 | 85篇 |
1998年 | 117篇 |
1997年 | 105篇 |
1996年 | 81篇 |
1995年 | 97篇 |
1994年 | 61篇 |
1993年 | 62篇 |
1992年 | 47篇 |
1991年 | 52篇 |
1990年 | 66篇 |
1989年 | 46篇 |
1988年 | 45篇 |
1987年 | 38篇 |
1986年 | 39篇 |
1985年 | 57篇 |
1984年 | 58篇 |
1983年 | 44篇 |
1982年 | 42篇 |
1981年 | 37篇 |
1980年 | 43篇 |
1979年 | 46篇 |
1978年 | 49篇 |
1977年 | 41篇 |
1976年 | 40篇 |
1975年 | 36篇 |
1973年 | 35篇 |
排序方式: 共有5091条查询结果,搜索用时 0 毫秒
51.
Component software architectures offer an alternative approach for building large, complex hydrologic modeling systems. In contrast to more traditional software paradigms (i.e. procedural or object-oriented approaches), using component-based approaches allows individuals to construct autonomous modeling units that can be linked together through shared boundary conditions during a simulation run. One of the challenges in component-based modeling is designing a simple yet robust means for authoring model components. We address this challenge by presenting an approach for efficiently creating standards-based, process-level hydrologic modeling components. Using this approach, a hydrologic process is implemented as a modeling component by (1) authoring a configuration file that defines the properties of the component and (2) creating a class with three methods that define the pre-run, runtime, and post-run behavior of the modeling component. We present the design and implementation of this approach, which we call the Simple Model Wrapper (SMW), and demonstrate how it can be applied to create an Open Modeling Interface (OpenMI)-compliant modeling component for a basic hydrologic process. 相似文献
52.
Understanding the navigational behaviour of website visitors is a significant factor of success in the emerging business models of electronic commerce and even mobile commerce. However, Web traversal patterns obtained by traditional Web usage mining approaches are ineffective for the content management of websites. They do not provide the big picture of the intentions of the visitors. The Web navigation patterns, termed throughout-surfing patterns (TSPs) as defined in this paper, are a superset of Web traversal patterns that effectively display the trends toward the next visited Web pages in a browsing session. TSPs are more expressive for understanding the purposes of website visitors. In this paper, we first introduce the concept of throughout-surfing patterns and then present an efficient method for mining the patterns. We propose a compact graph structure, termed a path traversal graph, to record information about the navigation paths of website visitors. The graph contains the frequent surfing paths that are required for mining TSPs. In addition, we devised a graph traverse algorithm based on the proposed graph structure to discover the TSPs. The experimental results show the proposed mining method is highly efficient to discover TSPs. 相似文献
53.
Anthony E. Richardson Morgan E. PowersLauren G. Bousquet 《Computers in human behavior》2011,27(1):552-560
In recent years, studies have shown that video game experience is related to improvements across a variety of cognitive and visuospatial tasks. This study investigated the relationship between prior video game experience and spatial performance in virtual and real environments. Across two experiments, gaming experience was related to performance in desktop virtual environments; those with more video game experience were more accurate in pointing to nonvisible targets. In contrast, gaming experience was unrelated to three different real environment tasks, suggesting that video games may primarily influence perceptual and cognitive abilities in the visual domain over abilities that also involve kinesthetic or vestibular input. Contrary to expectations, gaming experience was also related to performance in immersive virtual environments, which may be related to the use of a joystick interface during immersive travel. Video game experience was also positively related to performance in a dynamic spatial task and to verbal SAT and math SAT scores. Sex differences in desktop virtual navigation and dynamic spatial ability were eliminated when game experience was included as a covariate. 相似文献
54.
Many applications require teams of robots to cooperatively execute tasks. Among these domains are those in which successful
coordination must respect intra-path constraints, which are constraints that occur on the paths of agents and affect route
planning. This work focuses on multi-agent coordination for disaster response with intra-path precedence constraints, a compelling
application that is not well addressed by current coordination methods. In this domain a group of fire truck agents attempt
to address fires spread throughout a city in the wake of a large-scale disaster. The disaster has also caused many city roads
to be blocked by impassable debris, which can be cleared by bulldozer robots. A high-quality coordination solution must determine
not only a task allocation but also what routes the fire trucks should take given the intra-path precedence constraints and
which bulldozers should be assigned to clear debris along those routes. 相似文献
55.
In this paper, we propose an efficient algorithm, called CMP-Miner, to mine closed patterns in a time-series database where each record in the database, also called a transaction, contains multiple time-series sequences. Our proposed algorithm consists of three phases. First, we transform each time-series sequence in a transaction into a symbolic sequence. Second, we scan the transformed database to find frequent patterns of length one. Third, for each frequent pattern found in the second phase, we recursively enumerate frequent patterns by a frequent pattern tree in a depth-first search manner. During the process of enumeration, we apply several efficient pruning strategies to remove frequent but non-closed patterns. Thus, the CMP-Miner algorithm can efficiently mine the closed patterns from a time-series database. The experimental results show that our proposed algorithm outperforms the modified Apriori and BIDE algorithms. 相似文献
56.
We point out a subtle error in the proof of Chrobak's theorem that every unary NFA can be represented as a union of arithmetic progressions that is at most quadratically large. We propose a correction for this and show how Martinez's polynomial time algorithm, which realizes Chrobak's theorem, can be made correct accordingly. We also show that Martinez's algorithm cannot be improved to have logarithmic space, unless L = NL. 相似文献
57.
This paper describes a new method for code space optimization for interpreted languages called LZW‐CC . The method is based on a well‐known and widely used compression algorithm, LZW , which has been adapted to compress executable program code represented as bytecode. Frequently occurring sequences of bytecode instructions are replaced by shorter encodings for newly generated bytecode instructions. The interpreter for the compressed code is modified to recognize and execute those new instructions. When applied to systems where a copy of the interpreter is supplied with each user program, space is saved not only by compressing the program code but also by automatically removing the unused implementation code from the interpreter. The method's implementation within two compiler systems for the programming languages Haskell and Java is described and implementation issues of interest are presented, notably the recalculations of target jumps and the automated tailoring of the interpreter to program code. Applying LZW‐CC to nhc98 Haskell results in bytecode size reduction by up to 15.23% and executable size reduction by up to 11.9%. Java bytecode is reduced by up to 52%. The impact of compression on execution speed is also discussed; the typical speed penalty for Java programs is between 1.8 and 6.6%, while most compressed Haskell executables run faster than the original. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
58.
Charles W. Fox Ben Mitchinson Martin J. Pearson Anthony G. Pipe Tony J. Prescott 《Autonomous Robots》2009,26(4):223-239
Actuated artificial whiskers modeled on rat macrovibrissae can provide effective tactile sensor systems for autonomous robots.
This article focuses on texture classification using artificial whiskers and addresses a limitation of previous studies, namely,
their use of whisker deflection signals obtained under relatively constrained experimental conditions. Here we consider the
classification of signals obtained from a whiskered robot required to explore different surface textures from a range of orientations
and distances. This procedure resulted in a variety of deflection signals for any given texture. Using a standard Gaussian
classifier we show, using both hand-picked features and ones derived from studies of rat vibrissal processing, that a robust
rough-smooth discrimination is achievable without any knowledge of how the whisker interacts with the investigated object.
On the other hand, finer discriminations appear to require knowledge of the target’s relative position and/or of the manner
in which the whisker contact its surface.
Electronic Supplementary Material The online version of this article () contains supplementary material, which is available to authorized users.
相似文献
Anthony G. Pipe |
59.
It is widely agreed that employee non-adherence to information security policies poses a major problem for organizations. Previous research has pointed to the potential of theories of moral reasoning to better understand this problem. However, we find no empirical studies that examine the influence of moral reasoning on compliance with information security policies. We address this research gap by proposing a theoretical model that explains non-compliance in terms of moral reasoning and values. The model integrates two well-known psychological theories: the Theory of Cognitive Moral Development by Kohlberg and the Theory of Motivational Types of Values by Schwartz. Our empirical findings largely support the proposed model and suggest implications for practice and research on how to improve information security policy compliance. 相似文献
60.
Anthony?Etuk Timothy?J.?Norman Murat??ensoyEmail author Mudhakar?Srivatsa 《Autonomous Agents and Multi-Agent Systems》2017,31(3):531-560
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can affect decisions. Existing trust and reputation mechanisms typically rely on reports from as many sources as possible to mitigate the influence of misleading reports on decisions. In the real world, however, it is often the case that querying information sources can be costly in terms of energy, bandwidth, delay overheads, and other constraints. We present a model of source selection and fusion in resource-constrained environments, where there is uncertainty regarding the trustworthiness of sources. We exploit diversity among sources to stratify them into homogeneous subgroups to both minimise redundant sampling and mitigate the effect of certain biases. Through controlled experiments, we demonstrate that a diversity-based approach is robust to biases introduced due to dependencies among source reports, performs significantly better than existing approaches when sampling budget is limited and equally as good with an unlimited budget. 相似文献