全文获取类型
收费全文 | 40390篇 |
免费 | 1535篇 |
国内免费 | 65篇 |
专业分类
电工技术 | 419篇 |
综合类 | 34篇 |
化学工业 | 8196篇 |
金属工艺 | 765篇 |
机械仪表 | 810篇 |
建筑科学 | 2091篇 |
矿业工程 | 122篇 |
能源动力 | 1213篇 |
轻工业 | 3584篇 |
水利工程 | 456篇 |
石油天然气 | 128篇 |
武器工业 | 5篇 |
无线电 | 2819篇 |
一般工业技术 | 6765篇 |
冶金工业 | 7044篇 |
原子能技术 | 293篇 |
自动化技术 | 7246篇 |
出版年
2023年 | 266篇 |
2022年 | 609篇 |
2021年 | 857篇 |
2020年 | 562篇 |
2019年 | 741篇 |
2018年 | 932篇 |
2017年 | 838篇 |
2016年 | 964篇 |
2015年 | 874篇 |
2014年 | 1207篇 |
2013年 | 2654篇 |
2012年 | 1931篇 |
2011年 | 2374篇 |
2010年 | 1855篇 |
2009年 | 1732篇 |
2008年 | 1987篇 |
2007年 | 1945篇 |
2006年 | 1764篇 |
2005年 | 1562篇 |
2004年 | 1287篇 |
2003年 | 1210篇 |
2002年 | 1133篇 |
2001年 | 760篇 |
2000年 | 593篇 |
1999年 | 658篇 |
1998年 | 716篇 |
1997年 | 667篇 |
1996年 | 612篇 |
1995年 | 620篇 |
1994年 | 577篇 |
1993年 | 539篇 |
1992年 | 522篇 |
1991年 | 311篇 |
1990年 | 442篇 |
1989年 | 413篇 |
1988年 | 338篇 |
1987年 | 364篇 |
1986年 | 320篇 |
1985年 | 427篇 |
1984年 | 424篇 |
1983年 | 327篇 |
1982年 | 305篇 |
1981年 | 290篇 |
1980年 | 277篇 |
1979年 | 275篇 |
1978年 | 250篇 |
1977年 | 231篇 |
1976年 | 221篇 |
1975年 | 200篇 |
1974年 | 176篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
141.
Backlash-like hysteresis is one of the nonsmooth and multi-valued nonlinearities usually existing in mechanical systems. The traditional identification method is quite difficult to be used to model the systems involved with such complex nonlinearities. In this paper, a nonsmooth recursive identification algorithm for the systems with backlash-like hysteresis is proposed. In this method, the concept of Clarke subgradient is introduced to approximate the gradients at nonsmooth points and the so-called bundle method is used to obtain the optimization search direction in nonsmooth cases. Then, a recursive algorithm based on the idea of bundle method is developed for parameter estimation. After that, the convergence analysis of the algorithm is investigated. Finally, simulation results to validate the proposed method on a simulated mechanical transmission system are presented. 相似文献
142.
S. Travis Waller David Fajardo Melissa Duell Vinayak Dixit 《Networks and Spatial Economics》2013,13(4):427-443
This work introduces a novel formulation of system optimal dynamic traffic assignment that captures strategic route choice in users under demand uncertainty. We define strategic route choice to be that users choose a path prior to knowing the true travel demand which will be experienced (therefore users consider the full set of possible demand scenarios). The problem is formulated based on previous work by Ziliaskopoulos (Transp Sci 34(1):37–49, 2000). The resulting novel formulation requires substantial enhancement to account for path-based flows and scenario-based stochastic demands. Further, a numerical demonstration is presented on a network with different demand loading profiles. Finally, model complexity, implications on scalability and future research directions are discussed. 相似文献
143.
Sharp GC Lee SW Wehe DK 《IEEE transactions on pattern analysis and machine intelligence》2008,30(1):120-130
Missing data are common in range images, due to geometric occlusions, limitations in the sensor field of view, poor reflectivity, depth discontinuities, and cast shadows. Using registration to align these data often fails, because points without valid correspondences can be incorrectly matched. This paper presents a maximum likelihood method for registration of scenes with unmatched or missing data. Using ray casting, correspondences are formed between valid and missing points in each view. These correspondences are used to classify points by their visibility properties, including occlusions, field of view, and shadow regions. The likelihood of each point match is then determined using statistical properties of the sensor, such as noise and outlier distributions. Experiments demonstrate a high rates of convergence on complex scenes with varying degrees of overlap. 相似文献
144.
This paper proposes and implements a novel hybrid level set method which combines the numerical efficiency of the local level set approach with the temporal stability afforded by a semi-implicit technique. By introducing an extraction/insertion algorithm into the local level set approach, we can accurately capture complicated behaviors such as interface separation and coalescence. This technique solves a well known problem when treating a semi-implicit system with spectral methods, where spurious interface movements emerge when two interfaces are close to each other. Numerical experiments show that the proposed method is stable, efficient and scales up well into three dimensional problems. 相似文献
145.
Sanchez-Sanz M. Fernandez B. Velazquez A. 《Journal of microelectromechanical systems》2009,18(2):449-457
This paper explores the feasibility of using the unsteady forces generated by the Karman street around a microprism in the laminar flow regime as a means to generate mechanical work. In particular, the study has the objective of assessing whether this physical effect could be used for practical energy-harvesting purposes. The confined flow, either of a liquid or a gas, around a rectangular microprism, of which different aspect ratios have been studied, is considered at Reynolds 200 so as to make sure that the Karman street is developed and that the flow remains 2-D. The microprism is allowed to move freely in the direction perpendicular to the flow. The equation of motion of the prism includes a term that simulates its coupling with a vibration-driven micropower generator. Two different couplings have been considered: a velocity-damped resonant generator and a Coulomb-damped resonant generator. Different configurations have been studied, and comparisons have been carried out between them so as to draw a first set of design guidelines. Finally, it is shown that this type of energy-harvesting microdevice, which is basically 2-D, would yield a reasonable compromise between power output, manufacturing simplicity, and cost. 相似文献
146.
David G.W. Birch 《Information Security Technical Report》2009,14(3):143-145
It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility. 相似文献
147.
David Evans, BCS government relations, looks at what it couldtake to convince kids that the hard stuff is worth doing. 相似文献
148.
Some of the current best conformant probabilistic planners focus on finding a fixed length plan with maximal probability. While these approaches can find optimal solutions, they often do not scale for large problems or plan lengths. As has been shown in classical planning, heuristic search outperforms bounded length search (especially when an appropriate plan length is not given a priori). The problem with applying heuristic search in probabilistic planning is that effective heuristics are as yet lacking.In this work, we apply heuristic search to conformant probabilistic planning by adapting planning graph heuristics developed for non-deterministic planning. We evaluate a straight-forward application of these planning graph techniques, which amounts to exactly computing a distribution over many relaxed planning graphs (one planning graph for each joint outcome of uncertain actions at each time step). Computing this distribution is costly, so we apply Sequential Monte Carlo (SMC) to approximate it. One important issue that we explore in this work is how to automatically determine the number of samples required for effective heuristic computation. We empirically demonstrate on several domains how our efficient, but sometimes suboptimal, approach enables our planner to solve much larger problems than an existing optimal bounded length probabilistic planner and still find reasonable quality solutions. 相似文献
149.
David G. James Robert J. Bartelt Richard J. Faulder 《Journal of chemical ecology》1994,20(11):2805-2819
Synthetic aggregation pheromones ofCarpophilus hemipterus (L.) andCarpophilus mutilatus Erichson were field tested during a 10-month period in southern New South Wales stone fruit orchards to determineCarpophilus spp. phenology and the effect of two pheromone doses on attraction. Aggregation pheromones synergize the attraction of host volatiles toCarpophilus spp. Four major species,C. hemipterus, C. mutilatus, C. davidsoni Dobson andC. (Urophorus) humeralis (F.), were trapped, with greater numbers of each species inC. hemipterus pheromone/fermenting whole-wheat breaddough-baited traps, than in dough-only-traps. InC. mutilatus pheromone/ fermenting-dough-baited traps, onlyC. mutilatus andC. davidsoni responded in greater numbers than to dough-only traps. Beetles first appeared in traps in late September (early spring) when daily maximum temperatures averaged 17.5C. Trappings reached a peak during October and declined to very low levels in November–December (late spring-early summer). Numbers trapped of all species increased during February–March (late summer–early autumn), presumably due to the presence of abundant host resources (ripening and fallen fruit), and continued at high levels until May (late autumn). An 18-week study demonstrated significantly greater responses byCarpophilus spp. to 5000-g than to 500-g doses of C.hemipterus andC. mutilatus pheromones. Greatest responses to 5000g were recorded forC. hemipterus andC. mutilatus responding to their own pheromones (increased attraction over dough alone of 259x and 21.2x respectively). Implications of the study and the potential for using synthetic aggregation pheromones for managingCarpophilus spp. populations in Australian stone fruit are discussed. 相似文献
150.
The virtual path (VP) can simplifyAtm network management by minimizing connection routing and admission costs, and by facilitating the layered control of resources. However, fully exploiting these advantages may lead to a large number of relatively low capacity virtual paths travelling on each physical link. If each VP is treated as a separate unit, as is commonly assumed, low path capacities will lead to low network utilisation. This paper carefully examines the trade-off between simplification through traffic separation and improved efficiency due to traffic consolidation. We review existing vp bandwidth assignment and control techniques, and propose a new vp tagging control method. A comparison shows that by permitting resource sharing between paths it is possible to influence significantly the trade-off between simplified network management and multiplexing gain from traffic consolidation. 相似文献