全文获取类型
收费全文 | 942篇 |
免费 | 54篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 1篇 |
综合类 | 1篇 |
化学工业 | 376篇 |
金属工艺 | 38篇 |
机械仪表 | 23篇 |
建筑科学 | 23篇 |
矿业工程 | 8篇 |
能源动力 | 39篇 |
轻工业 | 58篇 |
石油天然气 | 1篇 |
无线电 | 48篇 |
一般工业技术 | 144篇 |
冶金工业 | 59篇 |
原子能技术 | 6篇 |
自动化技术 | 173篇 |
出版年
2024年 | 5篇 |
2023年 | 13篇 |
2022年 | 97篇 |
2021年 | 118篇 |
2020年 | 26篇 |
2019年 | 26篇 |
2018年 | 47篇 |
2017年 | 40篇 |
2016年 | 51篇 |
2015年 | 28篇 |
2014年 | 54篇 |
2013年 | 61篇 |
2012年 | 58篇 |
2011年 | 60篇 |
2010年 | 49篇 |
2009年 | 35篇 |
2008年 | 29篇 |
2007年 | 20篇 |
2006年 | 27篇 |
2005年 | 23篇 |
2004年 | 22篇 |
2003年 | 14篇 |
2002年 | 7篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 12篇 |
1998年 | 9篇 |
1997年 | 8篇 |
1996年 | 5篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 7篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有998条查询结果,搜索用时 15 毫秒
11.
Marcin Ocypa 《Electrochimica acta》2006,51(11):2298-2305
Electrochemical properties of poly(3,4-ethylenedioxythiophene) doped with hexacyanoferrate(II,III) ions (PEDOT(HCF)) were studied in the presence of Cu2+ ions. Voltammetric and EDAX studies revealed retention of hexacyanoferrate anions in the polymer film and accumulation of Cu(II) cations, as well as formation of solid copper hexacyanoferrate near the polymer surface.Accumulation of Cu2+ ions was found to be advantageous from the point of view of PEDOT(HCF) applications as a solid contact (ion-to-electron transducer) in all-solid-state Cu2+-selective electrodes with solvent polymeric polyvinyl chloride (PVC) based membrane, containing Cu2+-selective ionophore. Binding of Cu2+ ions in the conducting polymer layer results in analyte ions flux into the transducer phase. Thus, pronounced enhancement of selectivity of the all-solid-state Cu2+-selective electrode or lower detection limit of the potentiometric response range was achieved, reaching under optimised conditions 10−7 M CuSO4. 相似文献
12.
Rémy Belmonte Petr A. Golovach Pinar Heggernes Pim van ’t Hof Marcin Kamiński Daniël Paulusma 《Algorithmica》2014,69(3):501-521
The Contractibility problem takes as input two graphs G and H, and the task is to decide whether H can be obtained from G by a sequence of edge contractions. The Induced Minor and Induced Topological Minor problems are similar, but the first allows both edge contractions and vertex deletions, whereas the latter allows only vertex deletions and vertex dissolutions. All three problems are NP-complete, even for certain fixed graphs H. We show that these problems can be solved in polynomial time for every fixed H when the input graph G is chordal. Our results can be considered tight, since these problems are known to be W[1]-hard on chordal graphs when parameterized by the size of H. To solve Contractibility and Induced Minor, we define and use a generalization of the classic Disjoint Paths problem, where we require the vertices of each of the k paths to be chosen from a specified set. We prove that this variant is NP-complete even when k=2, but that it is polynomial-time solvable on chordal graphs for every fixed k. Our algorithm for Induced Topological Minor is based on another generalization of Disjoint Paths called Induced Disjoint Paths, where the vertices from different paths may no longer be adjacent. We show that this problem, which is known to be NP-complete when k=2, can be solved in polynomial time on chordal graphs even when k is part of the input. Our results fit into the general framework of graph containment problems, where the aim is to decide whether a graph can be modified into another graph by a sequence of specified graph operations. Allowing combinations of the four well-known operations edge deletion, edge contraction, vertex deletion, and vertex dissolution results in the following ten containment relations: (induced) minor, (induced) topological minor, (induced) subgraph, (induced) spanning subgraph, dissolution, and contraction. Our results, combined with existing results, settle the complexity of each of the ten corresponding containment problems on chordal graphs. 相似文献
13.
14.
15.
Mischa Schmidt Jan Seedorf Stefano Napolitano Rosario G. Garroppo Andrea Cavaliere Thilo Ewald Armin Jahanpanah Zbigniew Kopertowski Marcin Pilarski Pawel Grochocki 《Peer-to-Peer Networking and Applications》2013,6(2):134-154
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all. 相似文献
16.
The problem of computing the chromatic number of a P
5-free graph (a graph which contains no path on 5 vertices as an induced subgraph) is known to be NP-hard. However, we show
that for every fixed integer k, there exists a polynomial-time algorithm determining whether or not a P
5-free graph admits a k-coloring, and finding one, if it does. 相似文献
17.
Marcin Miłkowski 《Minds and Machines》2009,19(4):465-475
In Darwin’s Dangerous Idea, Daniel Dennett claims that evolution is algorithmic. On Dennett’s analysis, evolutionary processes are trivially algorithmic
because he assumes that all natural processes are algorithmic. I will argue that there are more robust ways to understand
algorithmic processes that make the claim that evolution is algorithmic empirical and not conceptual. While laws of nature
can be seen as compression algorithms of information about the world, it does not follow logically that they are implemented
as algorithms by physical processes. For that to be true, the processes have to be part of computational systems. The basic
difference between mere simulation and real computing is having proper causal structure. I will show what kind of requirements
this poses for natural evolutionary processes if they are to be computational. 相似文献
18.
Application of the OBD method for optimization of neural state variable estimators of the two-mass drive system 总被引:1,自引:0,他引:1
This paper presents neural estimators of the mechanical state variables of the electrical drive system with elastic joints. The non-measurable state variables, as the torsional torque and the load machine speed are estimated using multilayer feed-forward neural networks. The main stages of the design methodology of these neural estimators are presented. The optimal brain damage method is implemented for the structure optimization of each neural network. Then signals estimated by neural estimators are tested in the electrical drive control structure with additional feedbacks from the estimated shaft torque and the difference between the motor and the load speeds. The simulation results show good accuracy of both presented neural estimators for the wide range of changes of the reference speed and the load torque. The simulation results are then verified by laboratory experiments. 相似文献
19.
Marcin Bienkowski Marek Klonowski Miroslaw Korzeniowski Dariusz R. Kowalski 《Distributed Computing》2016,29(5):341-359
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes execute a concurrent program that occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed algorithm to control entries and exits to/from the shared resource (also called a critical section), in such a way that at any time, there is at most one process accessing it. In our considerations, the shared resource is the shared communication channel itself (multiple access channel), and the main challenge arises because the channel is also the only mean of communication between these processes. We consider both the classic and a slightly weaker version of mutual exclusion, called \(\varepsilon \)-mutual-exclusion, where for each period of a process staying in the critical section the probability that there is some other process in the critical section is at most \(\varepsilon \). We show that there are channel settings, where the classic mutual exclusion is not feasible even for randomized algorithms, while the \(\varepsilon \)-mutual-exclusion is. In more relaxed channel settings, we prove an exponential gap between the makespan complexity of the classic mutual exclusion problem and its weaker \(\varepsilon \)-exclusion version. We also show how to guarantee fairness of mutual exclusion algorithms, i.e., that each process that wants to enter the critical section will eventually succeed. 相似文献
20.