全文获取类型
收费全文 | 6854篇 |
免费 | 384篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 83篇 |
综合类 | 9篇 |
化学工业 | 1482篇 |
金属工艺 | 148篇 |
机械仪表 | 149篇 |
建筑科学 | 250篇 |
矿业工程 | 10篇 |
能源动力 | 194篇 |
轻工业 | 590篇 |
水利工程 | 56篇 |
石油天然气 | 28篇 |
无线电 | 1005篇 |
一般工业技术 | 1224篇 |
冶金工业 | 865篇 |
原子能技术 | 32篇 |
自动化技术 | 1133篇 |
出版年
2024年 | 10篇 |
2023年 | 112篇 |
2022年 | 197篇 |
2021年 | 336篇 |
2020年 | 243篇 |
2019年 | 226篇 |
2018年 | 277篇 |
2017年 | 230篇 |
2016年 | 322篇 |
2015年 | 217篇 |
2014年 | 281篇 |
2013年 | 453篇 |
2012年 | 368篇 |
2011年 | 453篇 |
2010年 | 344篇 |
2009年 | 310篇 |
2008年 | 340篇 |
2007年 | 299篇 |
2006年 | 212篇 |
2005年 | 193篇 |
2004年 | 159篇 |
2003年 | 129篇 |
2002年 | 123篇 |
2001年 | 123篇 |
2000年 | 80篇 |
1999年 | 90篇 |
1998年 | 218篇 |
1997年 | 114篇 |
1996年 | 101篇 |
1995年 | 87篇 |
1994年 | 66篇 |
1993年 | 86篇 |
1992年 | 54篇 |
1991年 | 38篇 |
1990年 | 38篇 |
1989年 | 40篇 |
1988年 | 25篇 |
1987年 | 33篇 |
1986年 | 28篇 |
1985年 | 27篇 |
1984年 | 29篇 |
1983年 | 19篇 |
1982年 | 16篇 |
1981年 | 14篇 |
1980年 | 14篇 |
1979年 | 12篇 |
1978年 | 13篇 |
1977年 | 15篇 |
1976年 | 9篇 |
1973年 | 8篇 |
排序方式: 共有7258条查询结果,搜索用时 15 毫秒
181.
We present an algorithm for fast and reliable extraction of page-formatted binary digital data. The advantages of the algorithm include a low raw bit-error rate, fast extraction speed, the use of a simple and density-efficient coding scheme, and large tolerance to a change of the signal-to-noise ratio. We used this algorithm to analyze shot-noise-limited binary data that had large interpage and intrapage intensity variations and obtained an improvement in the bit-error rate of 3-4 orders of magnitude compared with that in a single-threshold-detection scheme. Implications of our results for the development of high-speed, high-density holographic memories are discussed. 相似文献
182.
An efficient microfluidic sorter: implementation of double meandering micro striplines for magnetic particles switching 总被引:1,自引:1,他引:0
Tian Fook Kong Huan Shin E Hendrik Santoso Sugiarto Hwi Fen Liew Xinghua Wang Wen Siang Lew Nam-Trung Nguyen Yong Chen 《Microfluidics and nanofluidics》2011,10(5):1069-1078
The ability to trap, manipulate, and separate magnetic beads has become one of the key requirements in realizing an integrated
magnetic lab-on-chip biosensing system. In this article, we present the design and fabrication of an integrated magneto-fluidic
device for sorting magnetic particles with a sorting efficiency of up to 95%. The actuation and manipulation of magnetic beads
are realized using microfabricated square meandering current-carrying micro striplines. The current is alternated between
two neighboring micro striplines to switch the magnetic beads to either one of the two outlets. We performed a series of parametric
study to investigate the effect of applied current, flow rate, and switching frequency on the sorting efficiency. Experimental
results reveal that the sorting efficiency is proportional to the square of current applied to the stripline, and decreases
with increasing buffer flow rate and switching frequency. Such phenomena agree well with our theoretical analysis and simulation
result. The fastest switching rate, which is limited by the microchannel geometry and bead velocity, is 2 Hz. 相似文献
183.
184.
185.
Lawry's label semantics for modeling and computing with linguistic information in natural language provides a clear interpretation of linguistic expressions and thus a transparent model for real‐world applications. Meanwhile, annotated logic programs (ALPs) and its fuzzy extension AFLPs have been developed as an extension of classical logic programs offering a powerful computational framework for handling uncertain and imprecise data within logic programs. This paper proposes annotated linguistic logic programs (ALLPs) that embed Lawry's label semantics into the ALP/AFLP syntax, providing a linguistic logic programming formalism for development of automated reasoning systems involving soft data as vague and imprecise concepts occurring frequently in natural language. The syntax of ALLPs is introduced, and their declarative semantics is studied. The ALLP SLD‐style proof procedure is then defined and proved to be sound and complete with respect to the declarative semantics of ALLPs. © 2010 Wiley Periodicals, Inc. 相似文献
186.
Yih-Fang Chang Truong-Giang Nguyen Chia-Pin Wang 《Control Engineering Practice》2010,18(12):1399-1405
In this study, an open programmable logic controller (PLC) from Fuji electric prescribed in the Structured Text program was applied to develop a look-ahead linear jerk filter (LALJF) for a computerized numerically controlled (CNC) machine. To ensure the smooth and accurate motion of a tool with a linear change in jerk during real-time machining, the proposed filter was formed by combining a look-ahead algorithm with three modified moving average filters (3MMAF). The look-ahead algorithm performed a single look-ahead step-change in the speed of the speed curve. Based on a step-changing speed profile, given maximal acceleration/deceleration and maximum jerk, the speed curve was modified before it was passed through a linear jerk filter to reduce machining time. The speed commands filtered by the proposed filter stabilize machine table at the beginning and end of its motion, and at any point at which its speed exhibits a step-change. The theoretical and computational aspects of the LALJF are presented together with experimental results of its implementation on an X–Y table. The multiple-step-changing speed curve of a CNC machine and the speed curve of a high-speed measurement system were constructed in order to verify the feasibility and precision of the proposed method. 相似文献
187.
Nguyen Hung Jae Sung Im Sang-Kwun Jeong Hak-Kyeong Kim Sang Bong Kim 《International Journal of Control, Automation and Systems》2010,8(1):81-90
In this paper, a control scheme that combines a kinematic controller and a sliding mode dynamic controller with external disturbances
is proposed for an automatic guided vehicle to track a desired trajectory with a specified constant velocity. It provides
a method of taking into account specific mobile robot dynamics to convert desired velocity control inputs into torques for
the actual mobile robot. First, velocity control inputs are designed for the kinematic controller to make the tracking error
vector asymptotically stable. Then, a sliding mode dynamic controller is designed such that the mobile robot’s velocities
converge to the velocity control inputs. The control law is obtained based on the backstepping technique. System stability
is proved using the Lyapunov stability theory. In addition, a scheme for measuring the errors using a USB camera is described.
The simulation and experimental results are presented to illustrate the effectiveness of the proposed controller. 相似文献
188.
Sangmun Shin Nguyen Khoa Viet Truong Byung Rae Cho Sung Hoon Hong 《Computers & Industrial Engineering》2011
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed. 相似文献
189.
Context
Information system development (ISD) has been plagued with high failure rates. This is partially due to the activities being a combination of both a technical and social processes involving stakeholders with conflicting interests.Objective
Existing software risk management theories and frameworks offer limited suggestions for actions that can be taken to reduce the chance of failure of ISD projects. Our objective is to examine the connections among some of the more important user related risks in order to shed light on how specific strategies enhance the chance of project success.Method
We conducted a sample of information systems project managers to test a multivariate model to explain the impact of pursuing a partnership with users on the conflicts that arise between users and developers, role ambiguity, and subsequent impact on project performance.Results
The proposed model was supported, suggesting that user-developer conflict and role ambiguity have a negative impact on performance estimation difficulty, which negatively affects project performance.Conclusion
Pursuit of project partnering yields a number of significant relationships in the model indicating an organization can implement practices that reduce risks associated with role ambiguity and conflict in system development projects. 相似文献190.
Ad hoc networks consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. Such networks cannot rely on centralized and organized network management. The clustering problem consists of partitioning network nodes into non-overlapping groups called clusters. Clusters give a hierarchical organization to the network that facilitates network management and that increases its scalability.In a weight-based clustering algorithm, the clusterheads are selected according to their weight (a node’s parameter). The higher the weight of a node, the more suitable this node is for the role of clusterhead. In ad hoc networks, the amount of bandwidth, memory space or battery power of a node could be used to determine weight values.A self-stabilizing algorithm, regardless of the initial system configuration, converges to legitimate configurations without external intervention. Due to this property, self-stabilizing algorithms tolerate transient faults and they are adaptive to any topology change.In this paper, we present a robust self-stabilizing weight-based clustering algorithm for ad hoc networks. The robustness property guarantees that, starting from an arbitrary configuration, after one asynchronous round, the network is partitioned into clusters. After that, the network stays partitioned during the convergence phase toward a legitimate configuration where the clusters verify the “ad hoc clustering properties”. 相似文献