全文获取类型
收费全文 | 917篇 |
免费 | 23篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 10篇 |
综合类 | 3篇 |
化学工业 | 275篇 |
金属工艺 | 16篇 |
机械仪表 | 20篇 |
建筑科学 | 24篇 |
能源动力 | 27篇 |
轻工业 | 61篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
武器工业 | 2篇 |
无线电 | 50篇 |
一般工业技术 | 216篇 |
冶金工业 | 54篇 |
原子能技术 | 2篇 |
自动化技术 | 179篇 |
出版年
2024年 | 1篇 |
2023年 | 7篇 |
2022年 | 38篇 |
2021年 | 34篇 |
2020年 | 17篇 |
2019年 | 15篇 |
2018年 | 30篇 |
2017年 | 22篇 |
2016年 | 25篇 |
2015年 | 28篇 |
2014年 | 40篇 |
2013年 | 60篇 |
2012年 | 51篇 |
2011年 | 62篇 |
2010年 | 33篇 |
2009年 | 50篇 |
2008年 | 39篇 |
2007年 | 51篇 |
2006年 | 30篇 |
2005年 | 27篇 |
2004年 | 21篇 |
2003年 | 18篇 |
2002年 | 21篇 |
2001年 | 17篇 |
2000年 | 15篇 |
1999年 | 8篇 |
1998年 | 24篇 |
1997年 | 21篇 |
1996年 | 20篇 |
1995年 | 8篇 |
1994年 | 12篇 |
1993年 | 12篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 7篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 8篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1970年 | 2篇 |
排序方式: 共有941条查询结果,搜索用时 21 毫秒
11.
The microscopic character of melting for quasi–two dimensional N
2
adlayers on graphite is examined for surface densities 0.2 1, where the upper limit corresponds to a complete monolayer. A Monte Carlo method, with the multiple histogram procedure, is employed to determine various thermodynamic quantities. Using the calculated specific heats and selected order parameters, determined at various surface densities, the mechanism for melting is shown to be vacancy mediated. The somewhat unusual behavior of the melting temperature versus density is shown to be entirely due to the vacancy concentration and their topology. Because this is determined by the free energy, our analysis should be general. Preliminary results for Xe on graphite supports this claim. 相似文献
12.
Damping of the quasiparticles in a layered two-dimensional electron gas has been calculated including the electron-phonon and electron-electron interaction. The calculations performed atT=0 andT0 show that the non-Fermi behavior can appear as in the case of the electron-plasmon interaction, but it is also enhanced by the presence of the phonons. 相似文献
13.
Smolic-Rocak N. Bogdan S. Kovacic Z. Petrovic T. 《Automation Science and Engineering, IEEE Transactions on》2010,7(1):151-155
This paper presents a dynamic routing method for supervisory control of multiple automated guided vehicles (AGVs) that are traveling within a layout of a given warehouse. In dynamic routing a calculated path particularly depends on the number of currently active AGVs' missions and their priorities. In order to solve the shortest path problem dynamically, the proposed routing method uses time windows in a vector form. For each mission requested by the supervisor, predefined candidate paths are checked if they are feasible. The feasibility of a particular path is evaluated by insertion of appropriate time windows and by performing the windows overlapping tests. The use of time windows makes the algorithm apt for other scheduling and routing problems. Presented simulation results demonstrate efficiency of the proposed dynamic routing. The proposed method has been successfully implemented in the industrial environment in a form of a multiple AGV control system. 相似文献
14.
We consider deterministic distributed broadcasting on multiple access channels in the framework of adversarial queuing. Packets
are injected dynamically by an adversary that is constrained by the injection rate and the number of packets that may be injected
simultaneously; the latter we call burstiness. A protocol is stable when the number of packets in queues at the stations stays
bounded. The maximum injection rate that a protocol can handle in a stable manner is called the throughput of the protocol.
We consider adversaries of injection rate 1, that is, of one packet per round, to address the question if the maximum throughput
1 can be achieved, and if so then with what quality of service. We develop a protocol that achieves throughput 1 for any number
of stations against leaky-bucket adversaries. The protocol has
O(n2+\textburstiness){\mathcal{O}(n^2+\text{burstiness})} packets queued simultaneously at any time, where n is the number of stations; this upper bound is proved to be best possible. A protocol is called fair when each packet is
eventually broadcast. We show that no protocol can be both stable and fair for a system of at least two stations against leaky-bucket adversaries. We study in detail small systems of exactly
two and three stations against window adversaries to exhibit differences in quality of broadcast among classes of protocols.
A protocol is said to have fair latency if the waiting time of packets is
O(\textburstiness){\mathcal{O}(\text{burstiness})}. For two stations, we show that fair latency can be achieved by a full sensing protocol, while there is no stable acknowledgment
based protocol. For three stations, we show that fair latency can be achieved by a general protocol, while no full sensing
protocol can be stable. Finally, we show that protocols that either are fair or do not have the queue sizes affect the order
of transmissions cannot be stable in systems of at least four stations against window adversaries. 相似文献
15.
Ma?gorzata ?ak-Szatkowska Ma?gorzata Bogdan 《Computational statistics & data analysis》2011,55(11):2908-2924
The classical model selection criteria, such as the Bayesian Information Criterion (BIC) or Akaike information criterion (AIC), have a strong tendency to overestimate the number of regressors when the search is performed over a large number of potential explanatory variables. To handle the problem of the overestimation, several modifications of the BIC have been proposed. These versions rely on supplementing the original BIC with some prior distributions on the class of possible models. Three such modifications are presented and compared in the context of sparse Generalized Linear Models (GLMs). The related choices of priors are discussed and the conditions for the asymptotic equivalence of these criteria are provided. The performance of the modified versions of the BIC is illustrated with an extensive simulation study and a real data analysis. Also, simplified versions of the modified BIC, based on least squares regression, are investigated. 相似文献
16.
For finite-buffer manufacturing systems, the major stability issue is "deadlock," rather than "bounded-buffer-length stability." The paper introduces the concept of "system deadlock," defined rigorously in Petri net terms, and system operation with uninterrupted part-flow is characterized in terms of the absence of this condition. For a large class of finite-buffer multiclass re-entrant flowline systems, an analysis of "circular waits" yields necessary and sufficient conditions for the occurrence of "system deadlock." This allows the formulation of a maximally permissive one-step-look-ahead deadlock-avoidance control policy for dispatching jobs, while maximizing the percent utilization of resources. The result is a generalized kanban dispatching strategy, which is more general than the standard multiclass last buffer first serve (LBFS) dispatching strategies for finite buffer flowlines that typically under-utilize the resources. The problem of computational complexity associated with Petri net (PN) applications is overcome by using certain sub-matrices of the PN incidence matrix. Computationally efficient matrix techniques are given for implementing the deadlock-free dispatching policy. 相似文献
17.
Automatic cluster detection in Kohonen's SOM. 总被引:1,自引:0,他引:1
Dominik Brugger Martin Bogdan Wolfgang Rosenstiel 《Neural Networks, IEEE Transactions on》2008,19(3):442-459
Kohonen's self-organizing map (SOM) is a popular neural network architecture for solving problems in the field of explorative data analysis, clustering, and data visualization. One of the major drawbacks of the SOM algorithm is the difficulty for nonexpert users to interpret the information contained in a trained SOM. In this paper, this problem is addressed by introducing an enhanced version of the Clusot algorithm. This algorithm consists of two main steps: 1) the computation of the Clusot surface utilizing the information contained in a trained SOM and 2) the automatic detection of clusters in this surface. In the Clusot surface, clusters present in the underlying SOM are indicated by the local maxima of the surface. For SOMs with 2-D topology, the Clusot surface can, therefore, be considered as a convenient visualization technique. Yet, the presented approach is not restricted to a certain type of 2-D SOM topology and it is also applicable for SOMs having an n-dimensional grid topology. 相似文献
18.
This paper presents the design and implementation of an integrated application program called ArcFVS that links the Forest Vegetation Simulator (FVS) and a Geographic Information System (GIS) to realize spatial selection of input files and graphic display of modeling output. Data for testing and running the model came from the U.S. Forest Service’s Forest Inventory and Analysis (FIA) Database and were also collected in field surveys in north-central Indiana. ArcFVS 1.0 is designed using the ArcGIS software from the Environmental Systems Research Institute (ESRI) and the Visual Basic for Applications (VBA) programming environment to manipulate ESRI’s ArcObjects. The resulting product offers custom functions as commands in a new menu or as tools on a new toolbar. They are used to: select spatially or by attribute the forest plots to be projected by FVS, create the FVS input files for the selected plots and display in a geospatial environment different types of FVS output (text output files, tables with variables of interest and visualization image files). Advantages of ArcFVS 1.0 include the new GIS capabilities, enhanced format translation functions and the standardized programming environment. 相似文献
19.
Bogdan J. FalkowskiAuthor Vitae Susanto RahardjaAuthor Vitae 《Computers & Electrical Engineering》2003,29(1):1-12
A non-linear transform, called “sign Haar transform” has recently been introduced. The transform is unique and converts binary/ternary vectors into ternary spectral domain. Recursive definitions for the calculation of sign Haar transform are developed. Essential properties of logic functions and variables in the spectral domain of a quantized transform based on Haar functions are presented. Sign Haar transform has the smallest computational cost of all the quantized transforms. The properties of logic functions are listed for two different codings of incompletely specified functions. 相似文献
20.