全文获取类型
收费全文 | 4281篇 |
免费 | 164篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 47篇 |
综合类 | 5篇 |
化学工业 | 1037篇 |
金属工艺 | 79篇 |
机械仪表 | 89篇 |
建筑科学 | 305篇 |
矿业工程 | 6篇 |
能源动力 | 106篇 |
轻工业 | 406篇 |
水利工程 | 26篇 |
石油天然气 | 22篇 |
无线电 | 251篇 |
一般工业技术 | 703篇 |
冶金工业 | 784篇 |
原子能技术 | 58篇 |
自动化技术 | 531篇 |
出版年
2022年 | 34篇 |
2021年 | 49篇 |
2020年 | 51篇 |
2019年 | 56篇 |
2018年 | 57篇 |
2017年 | 76篇 |
2016年 | 92篇 |
2015年 | 58篇 |
2014年 | 101篇 |
2013年 | 298篇 |
2012年 | 144篇 |
2011年 | 223篇 |
2010年 | 185篇 |
2009年 | 161篇 |
2008年 | 184篇 |
2007年 | 188篇 |
2006年 | 176篇 |
2005年 | 145篇 |
2004年 | 138篇 |
2003年 | 126篇 |
2002年 | 106篇 |
2001年 | 87篇 |
2000年 | 70篇 |
1999年 | 66篇 |
1998年 | 89篇 |
1997年 | 78篇 |
1996年 | 55篇 |
1995年 | 59篇 |
1994年 | 69篇 |
1993年 | 57篇 |
1992年 | 52篇 |
1991年 | 50篇 |
1990年 | 56篇 |
1989年 | 65篇 |
1988年 | 60篇 |
1987年 | 36篇 |
1986年 | 57篇 |
1985年 | 58篇 |
1984年 | 61篇 |
1983年 | 51篇 |
1982年 | 52篇 |
1981年 | 55篇 |
1980年 | 46篇 |
1979年 | 57篇 |
1978年 | 58篇 |
1977年 | 46篇 |
1976年 | 44篇 |
1975年 | 32篇 |
1974年 | 31篇 |
1973年 | 37篇 |
排序方式: 共有4455条查询结果,搜索用时 15 毫秒
101.
In this letter, we examine the computational mechanisms of reinforce-ment-based decision making. We bridge the gap across multiple levels of analysis, from neural models of corticostriatal circuits-the basal ganglia (BG) model (Frank, 2005 , 2006 ) to simpler but mathematically tractable diffusion models of two-choice decision making. Specifically, we generated simulated data from the BG model and fit the diffusion model (Ratcliff, 1978 ) to it. The standard diffusion model fits underestimated response times under conditions of high response and reinforcement conflict. Follow-up fits showed good fits to the data both by increasing nondecision time and by raising decision thresholds as a function of conflict and by allowing this threshold to collapse with time. This profile captures the role and dynamics of the subthalamic nucleus in BG circuitry, and as such, parametric modulations of projection strengths from this nucleus were associated with parametric increases in decision boundary and its modulation by conflict. We then present data from a human reinforcement learning experiment involving decisions with low- and high-reinforcement conflict. Again, the standard model failed to fit the data, but we found that two variants similar to those that fit the BG model data fit the experimental data, thereby providing a convergence of theoretical accounts of complex interactive decision-making mechanisms consistent with available data. This work also demonstrates how to make modest modifications to diffusion models to summarize core computations of the BG model. The result is a better fit and understanding of reinforcement-based choice data than that which would have occurred with either model alone. 相似文献
102.
Ying LiuAuthor Vitae Hui ZhangAuthor VitaeChunping LiAuthor Vitae Roger Jianxin JiaoAuthor Vitae 《Decision Support Systems》2012,52(3):685-697
It is increasingly common to see computer-based simulation being used as a vehicle to model and analyze business processes in relation to process management and improvement. While there are a number of business process management (BPM) and business process simulation (BPS) methodologies, approaches and tools available, it is more desirable to have a systemic BPS approach for operational decision support, from constructing process models based on historical data to simulating processes for typical and common problems. In this paper, we have proposed a generic approach of BPS for operational decision support which includes business processes modeling and workflow simulation with the models generated. Processes are modeled with event graphs through process mining from workflow logs that have integrated comprehensive information about the control-flow, data and resource aspects of a business process. A case study of a credit card application is presented to illustrate the steps involved in constructing an event graph. The evaluation detail is also given in terms of precision, generalization and robustness. Based on the event graph model constructed, we simulate the process under different scenarios and analyze the simulation logs for three generic problems in the case study: 1) suitable resource allocation plan for different case arrival rates; 2) teamwork performance under different case arrival rates; and 3) evaluation and prediction for personal performances. Our experimental results show that the proposed approach is able to model business processes using event graphs and simulate the processes for common operational decision support which collectively play an important role in process management and improvement. 相似文献
103.
Perfect fit for people has always been a target for product design. Designers commonly use traditional anthropometric dimensions for 3D product design thus creating a lot of fitting problems when dealing with the complexities of human body shapes. The development of recent 3D anthropometric survey has created an opportunity for complex shape analysis on human model by collecting 3D scan data. Using 3D point cloud data from the SizeChina survey, a methodology of creating a homologous 3D head and face model was demonstrated in this study. Anatomical and virtual landmarks, and surface modeling algorithm based on point cloud data were applied in building the model. The head and face models for all scans had the same amount of vertices with consistent features. The average Chinese models showed obvious differences between male and female. The variations of head and face shapes were analyzed using Principal Component Analysis and the results showed that the largest variations among people were general size, especially for width and depth. However face height, forehead, back of the head, chin and jaw area were also important when describing the 3D shape. The results from this study may be useful in the design of head and facial products. 相似文献
104.
One of the many complex problems that arise from the transmission and marketing of natural gas is when a shipper draws a contract
with a pipeline company to deliver a certain amount of gas among several points. What is actually delivered is often different
from the amount that had been originally agreed upon. This phenomenon is called an imbalance. When an imbalance occurs, the pipeline penalizes the shipper by imposing a cash-out penalty policy. Since this penalty is
a function of the operating daily imbalances, an important decision-making problem for the shippers is how to carry out their
daily imbalances so as to minimize their incurred penalty.
In this paper, we introduce the problem of minimizing the cash-out penalty costs from the point of view of a natural gas shipping
party. We present a mixed integer bilevel linear programming model and discuss its underlying assumptions. To solve it efficiently,
we reformulate it as a standard mathematical program and describe a penalty-function algorithm functions for its solution.
The algorithm is well-founded and its convergence is proved. Results of numerical experiments support the algorithm’s robustness
providing a valuable solution technique for this very important and complex problem in the natural gas market. 相似文献
105.
Fault and attack management in all-optical networks 总被引:2,自引:0,他引:2
Ridha Rejeb Mark S. Leeson Roger J. Green 《Communications Magazine, IEEE》2006,44(11):79-86
Network management for optical networks faces additional security challenges that arise by using transparent optical network components in communication systems. While some available management mechanisms are applicable to different types of network architectures, many of these are not adequate for all-optical networks. These have unique features and requirements in terms of security and quality of service, thus requiring a much more targeted approach in terms of network management. In this article we consider management issues with particular emphasis on complications that arise due to the unique characteristics and peculiar behaviors of transparent network components. In particular, signal quality monitoring is still a major complication in all-optical networks. Despite new methods for detection and localization of attacks having been proposed, no robust standards or techniques exist to date for guaranteeing the quality of service in these networks. Therefore, sophisticated mechanisms that assist in managing and assessing the proper function of transparent network components are highly desirable. Accordingly, we present an algorithm for multiple attack localization and identification that can participate in some tasks for fault management of all-optical networks 相似文献
106.
在过去的几年中,国际放射防护委员会鼓励对其计划将于2005年发表的下一个建议书表述辐射防护理念的最佳方式开展讨论。现在的建议书是由1990年发表的第60号出版物提出的,而且得到过去12年里发表的其它出版物的补充。现在显然委员会有必要总结在大约10个报告中推荐的数值数量的完整性。本文将完成这项工作,并由此而表明前进方向,提出一个简明且比较一致的21世纪初防护理念的表述。当然并不意在进行根本的修改,而是建议对现行政策做出连贯一致的表述,对其应用进行简化。 相似文献
107.
We consider an algorithmic problem that arises in the context of routing tables used by Internet routers. The Internet addressing scheme is hierarchical, where a group of hosts are identified by a prefix that is common to all the hosts in that group. Each host machine has a unique 32-bit address. Thus, all traffic between a source group s and a destination group d can be routed along a particular route c by maintaining a routing entry (s, d, c) at all intermediate routers, where s and d are binary bit strings. Many different routing tables can achieve the same routing behavior. In this paper we show how to compute the most compact routing table. In particular, we consider the following optimization problem: given a routing table D with N entries of the form (s, d, c) , determine a conflict-free routing table with fewest entries that has the same routing behavior as D. If the source and destination fields have up to w bits, and there are at most K different route values, then our algorithm runs in worst-case time O( NK w2) . 相似文献
108.
For small, portable devices, speech input has the advantages of low-cost and small hardware, can be used on the move or whilst
the eyes & hands are busy, and is natural and quick. Rather than rely on imperfect speech recognition we propose that information
entered as speech is kept as speech and suitable tools are provided to allow quick and easy access to the speech-as-data records.
This paper summarises our work on the technologies needed for these tools – for organising, browsing, searching and compressing
the stored speech. These technologies go a long way towards giving stored speech the characteristics of text without the associated
input problems.
Received: 5 March 2002 / Accepted: 1 September 2002
Nick Haddock Consultant
Acknowledgements The authors would like to thank the whole HP Labs Gryphon team for their valuable contributions to this work - Mike Collins
for the hierarchical chunking algorithm, Erik Geelhoed and David Frohlich for the users perspective, Richard Hull for starting
off the compression work, Steve Loughran for productisation, and Dave Reynolds for his consistent advice and support. We would
also like to thank our partners at Cambridge University, Steve Young and Tony Robinson, whose expertise and technology formed
the foundation for this work, as well as the efforts of Kate Knill on wordspotting, Carl Seymour on compression, James Christie
on recognition, and Robin Valenza whose brief excursion into the world of speech technology helped develop a simple and effective
summarisation technique. Finally we would like to thank the reviewers for their many helpful comments. 相似文献
109.
Preparation and characterisation of titanium dioxide films for catalytic applications generated by anodic spark deposition 总被引:1,自引:0,他引:1
The advanced plasma electrochemical process of anodic spark deposition (ASD) was used to generate photoactive titanium dioxide films on titanium metal substrates. A shift to easier-to-machine substrates was demonstrated by the deposition of a titanium film with physical vapour deposition onto different materials such as glass, silicon, and stainless steel prior to ASD. Obtained films were characterised by scanning electron microscopy, surface area measurement (Brunnauer-Emmett-Teller method, BET), X-ray diffraction, electron-probe microanalysis, and glow discharge spectroscopy. Additionally, film thickness was determined by eddy current measurements. Standard ASD conditions were defined as 180 V applied voltage over a 180 s hold time, a voltage ramp of 20 V/s, a duty cycle of 0.5 and a frequency of 1500 Hz. Most prominent characteristics of the titanium films produced under these standard conditions are a film thickness of ≤80 μm, a surface area of approximately 51 m2/g (BET) and an anatase content of approximately 30% and rutile content of approximately 70%. Furthermore, the film formation process is elucidated and the dependence of film thickness on deposition time and the dependence of the anatase and rutile content on the deposited mass are shown for varying ASD conditions. 相似文献
110.
Ratcliff Roger; Thapar Anjali; Gomez Pablo; McKoon Gail 《Canadian Metallurgical Quarterly》2004,19(2):278
The effects of aging on response time (RT) are examined in 2 lexical-decision experiments with young and older subjects (age 60-75). The results show that the older subjects were slower than the young subjects, but more accurate. R. Ratcliff s (1978) diffusion model provided a good account of RTs, their distributions, and response accuracy. The fits show an 80-100-ms slowing of the nondecision components of RT for older subjects relative to young subjects and more conservative decision criterion settings for older subjects than for young subjects. The rates of accumulation of evidence were not significantly different for older compared with young subjects (less than 2% and 5% higher for older subjects relative to young subjects in the 2 experiments). (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献