全文获取类型
收费全文 | 5658篇 |
免费 | 247篇 |
国内免费 | 31篇 |
专业分类
电工技术 | 49篇 |
综合类 | 33篇 |
化学工业 | 1078篇 |
金属工艺 | 100篇 |
机械仪表 | 128篇 |
建筑科学 | 239篇 |
矿业工程 | 35篇 |
能源动力 | 95篇 |
轻工业 | 578篇 |
水利工程 | 39篇 |
石油天然气 | 5篇 |
武器工业 | 1篇 |
无线电 | 358篇 |
一般工业技术 | 935篇 |
冶金工业 | 1547篇 |
原子能技术 | 27篇 |
自动化技术 | 689篇 |
出版年
2023年 | 35篇 |
2022年 | 48篇 |
2021年 | 107篇 |
2020年 | 88篇 |
2019年 | 71篇 |
2018年 | 177篇 |
2017年 | 161篇 |
2016年 | 171篇 |
2015年 | 148篇 |
2014年 | 145篇 |
2013年 | 362篇 |
2012年 | 310篇 |
2011年 | 298篇 |
2010年 | 225篇 |
2009年 | 188篇 |
2008年 | 260篇 |
2007年 | 201篇 |
2006年 | 179篇 |
2005年 | 160篇 |
2004年 | 125篇 |
2003年 | 152篇 |
2002年 | 132篇 |
2001年 | 99篇 |
2000年 | 99篇 |
1999年 | 92篇 |
1998年 | 510篇 |
1997年 | 285篇 |
1996年 | 187篇 |
1995年 | 113篇 |
1994年 | 96篇 |
1993年 | 104篇 |
1992年 | 23篇 |
1991年 | 40篇 |
1990年 | 25篇 |
1989年 | 32篇 |
1988年 | 28篇 |
1987年 | 24篇 |
1986年 | 19篇 |
1985年 | 37篇 |
1984年 | 25篇 |
1983年 | 24篇 |
1982年 | 36篇 |
1981年 | 36篇 |
1980年 | 20篇 |
1979年 | 20篇 |
1978年 | 24篇 |
1977年 | 46篇 |
1976年 | 45篇 |
1975年 | 18篇 |
1973年 | 16篇 |
排序方式: 共有5936条查询结果,搜索用时 15 毫秒
91.
Véronique Souchère Laurent Millair Javier Echeverria François Bousquet Christophe Le Page Michel Etienne 《Environmental Modelling & Software》2010,25(11):1359-1370
Erosive runoff is a recurring problem and is a source of sometimes deadly muddy floods in the Pays de Caux (France). The risk results from a conjunction of natural factors and human activity. Efficient actions against runoff in agricultural watersheds are well known. However they are still difficult to implement as they require co-operation between stakeholders. Local actors thus need tools to help them understand the collective consequences of their individual decisions and help to initiate a process of negotiation between them. We decided to use a participatory approach called companion modelling (ComMod), and, in close collaboration with one of the first group of local stakeholders, to create a role-playing game (RPG) to facilitate negotiations on the future management of erosive runoff. This paper describes and discusses the development of the RPG and its use with other groups of local stakeholders within the framework of two game sessions organized by two different watershed management committees. During the joint construction step, stakeholders shared their viewpoints about the environment, agents, rules, and how to model runoff in preparation for the creation of the RPG. During the RPG sessions, two groups of eight players, including farmers, mayors and watershed advisors, were confronted with disastrous runoff in a fictive agricultural watershed. Results showed that they managed to reduce runoff by 20–50% by engaging a dialogue about grass strips, storage ponds and management of the intercrop period. However, further progress is still needed to better control runoff through the implementation of better agricultural practices because, during the RPG sessions, the watershed advisors did not encourage farmers to do so. Because of the complexity of management problems, results of jointly constructing the game and the RPG sessions showed that modelling and simulation can be a very useful way of accompanying the collective learning process. This new way of working was welcomed by the participants who expressed their interest in organizing further RPG sessions. 相似文献
92.
Roberto Sanchez Geneviève Dauphin-Tanguy Xavier Guillaud Frédéric Colas 《Simulation Modelling Practice and Theory》2010,18(9):1185-1198
This paper proposes a model of a three phase electrical inverter with a LC output filter in delta connection used in a renewable energy supply system. The concept of inverse bond graph via bicausality is used for the control law design. The control law robustness is tested by connecting passive and active (induction machine) loads. 相似文献
93.
Mauro Baluda Pietro Braione Giovanni Denaro Mauro Pezzè 《Software Quality Journal》2011,19(4):725-751
Structural code coverage criteria have been studied since the early seventies, and now they are well supported by commercial
and open-source tools and are commonly embedded in several advanced industrial processes. Most industrial applications still
refer to simple criteria, like statement and branch coverage, and consider complex criteria, like modified condition decision
coverage, only rarely and often driven by the requirements of certification agencies. The industrial value of structural criteria
is limited by the difficulty of achieving high coverage, due to both the complexity of deriving test cases that execute specific
uncovered elements and the presence of many infeasible elements in the code. In this paper, we propose a technique that both
generates test cases that execute yet uncovered branches and identifies infeasible branches that can be eliminated from the
computation of the branch coverage. In this way, we can increase branch coverage to closely approximate full coverage, thus
improving its industrial value. The algorithm combines symbolic analysis, abstraction refinement, and a novel technique named
coarsening, to execute unexplored branches, identify infeasible ones, and mitigate the state space explosion problem. In the paper,
we present the technique and illustrate its effectiveness through a set of experimental results obtained with a prototype
implementation. 相似文献
94.
We explore one aspect of the structure of a codified legal system at the national level using a new type of representation
to understand the strong or weak dependencies between the various fields of law. In Part I of this study, we analyze the graph
associated with the network in which each French legal code is a vertex and an edge is produced between two vertices when
a code cites another code at least one time. We show that this network distinguishes from many other real networks from a
high density, giving it a particular structure that we call concentrated world and that differentiates a national legal system (as considered with a resolution at the code level) from small-world graphs identified in many social networks. Our analysis then shows that a few communities (groups of highly wired vertices)
of codes covering large domains of regulation are structuring the whole system. Indeed we mainly find a central group of influent
codes, a group of codes related to social issues and a group of codes dealing with territories and natural resources. The
study of this codified legal system is also of interest in the field of the analysis of real networks. In particular we examine
the impact of the high density on the structural characteristics of the graph and on the ways communities are searched for.
Finally we provide an original visualization of this graph on an hemicyle-like plot, this representation being based on a
statistical reduction of dissimilarity measures between vertices. In Part II (a following paper) we show how the consideration
of the weights attributed to each edge in the network in proportion to the number of citations between two vertices (codes)
allows deepening the analysis of the French legal system. 相似文献
95.
Tegawendé F. Bissyandé Laurent Réveillère Julia L. Lawall Gilles Muller 《Automated Software Engineering》2016,23(1):3-41
The Linux kernel does not export a stable, well-defined kernel interface, complicating the development of kernel-level services, such as device drivers and file systems. While there does exist a set of functions that are exported to external modules, this set of functions frequently changes, and the functions have implicit, ill-documented preconditions. No specific debugging support is provided. We present Diagnosys, an approach to automatically constructing a debugging interface for the Linux kernel. First, a designated kernel maintainer uses Diagnosys to identify constraints on the use of the exported functions. Based on this information, developers of kernel services can then use Diagnosys to generate a debugging interface specialized to their code. When a service including this interface is tested, it records information about potential problems. This information is preserved following a kernel crash or hang. Our experiments show that the generated debugging interface provides useful log information and incurs a low performance penalty. 相似文献
96.
Ahmed Chamseddine Ben Abdallah Michèle Gouiffès Lionel Lacassagne 《Machine Vision and Applications》2016,27(4):463-481
This paper presents a modular system for both abnormal event detection and categorization in videos. Complementary normalcy models are built both globally at the image level and locally within pixels blocks. Three features are analyzed: (1) spatio-temporal evolution of binary motion where foreground pixels are detected using an enhanced background subtraction method that keeps track of temporarily static pixels; (2) optical flow, using a robust pyramidal KLT technique; and (3) motion temporal derivatives. At the local level, a normalcy MOG model is built for each block and for each flow feature and is made more compact using PCA. Then, the activity is analyzed qualitatively using a set of compact hybrid histograms embedding both optical flow orientation (or temporal gradient orientation) and foreground statistics. A compact binary signature of maximal size 13 bits is extracted from these different features for event characterization. The performance of the system is illustrated on different datasets of videos recorded on static cameras. The experiments show that the anomalies are well detected even if the method is not dedicated to one of the addressed scenarios. 相似文献
97.
Ahmed Samet Eric Lefèvre Sadok Ben Yahia 《Journal of Intelligent Information Systems》2016,47(1):135-163
Associative classification has been shown to provide interesting results whenever of use to classify data. With the increasing complexity of new databases, retrieving valuable information and classifying incoming data is becoming a thriving and compelling issue. The evidential database is a new type of database that represents imprecision and uncertainty. In this respect, extracting pertinent information such as frequent patterns and association rules is of paramount importance task. In this work, we tackle the problem of pertinent information extraction from an evidential database. A new data mining approach, denoted EDMA, is introduced that extracts frequent patterns overcoming the limits of pioneering works of the literature. A new classifier based on evidential association rules is thus introduced. The obtained association rules, as well as their respective confidence values, are studied and weighted with respect to their relevance. The proposed methods are thoroughly experimented on several synthetic evidential databases and showed performance improvement. 相似文献
98.
Virtual organizations (VOs) are formed by an alliance of organizations linked by a partnership for dealing with emerging challenges. Information and communication technologies play a fundamental role facilitating cooperation, communication and collaboration among the VO members. The formal identification and representation of Requirements Engineering (RE) for one organization have been researched to a large extent along with several elicitation techniques. However, these techniques are not adequate for covering the major challenges of RE for VO. We explore the work done in the management and RE fields to propose a model-based framework for eliciting VOs’ requirements. The goal is to analyze the VO from two points of view: border (intra-organizational, inter-organizational and extra-organizational) and abstract (intentional, organizational and operational). This article includes the framework validation with a case study and a transformation process to develop partial Business Process Diagram from the intentional models. 相似文献
99.
Command governor for constrained switched systems with scheduled model transition dwell times 下载免费PDF全文
In this paper, a switched control architecture for constrained control systems is presented. The strategy is based on command governor ideas that are here specialized to ‘optimally’ schedule switching events on the plant dynamics for improving control performance at the expense of low computational burdens. The significance of the method mainly lies in its capability to avoid constraints violation and loss of stability regardless of any configuration change occurrence in the plant/constraint structure. To this end, the concept of model transition dwell time is used within the proposed control framework to formally define the minimum time necessary to enable a switching event under guaranteed conditions on the overall stability and constraint fulfilment. Simulation results on a simple linear system and on a Cessna 182 aircraft model show the effectiveness of the proposed strategy. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
100.