全文获取类型
收费全文 | 13775篇 |
免费 | 767篇 |
国内免费 | 892篇 |
专业分类
电工技术 | 339篇 |
综合类 | 757篇 |
化学工业 | 1092篇 |
金属工艺 | 350篇 |
机械仪表 | 1370篇 |
建筑科学 | 957篇 |
矿业工程 | 194篇 |
能源动力 | 509篇 |
轻工业 | 258篇 |
水利工程 | 262篇 |
石油天然气 | 350篇 |
武器工业 | 93篇 |
无线电 | 1171篇 |
一般工业技术 | 683篇 |
冶金工业 | 339篇 |
原子能技术 | 118篇 |
自动化技术 | 6592篇 |
出版年
2024年 | 27篇 |
2023年 | 126篇 |
2022年 | 175篇 |
2021年 | 274篇 |
2020年 | 236篇 |
2019年 | 245篇 |
2018年 | 278篇 |
2017年 | 336篇 |
2016年 | 462篇 |
2015年 | 466篇 |
2014年 | 829篇 |
2013年 | 826篇 |
2012年 | 849篇 |
2011年 | 1163篇 |
2010年 | 770篇 |
2009年 | 804篇 |
2008年 | 830篇 |
2007年 | 951篇 |
2006年 | 866篇 |
2005年 | 737篇 |
2004年 | 677篇 |
2003年 | 687篇 |
2002年 | 504篇 |
2001年 | 411篇 |
2000年 | 297篇 |
1999年 | 295篇 |
1998年 | 263篇 |
1997年 | 213篇 |
1996年 | 164篇 |
1995年 | 153篇 |
1994年 | 106篇 |
1993年 | 70篇 |
1992年 | 76篇 |
1991年 | 48篇 |
1990年 | 41篇 |
1989年 | 50篇 |
1988年 | 31篇 |
1987年 | 11篇 |
1986年 | 17篇 |
1985年 | 20篇 |
1984年 | 13篇 |
1983年 | 11篇 |
1982年 | 9篇 |
1981年 | 6篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 3篇 |
1973年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
191.
Entering information on a computer keyboard is a ubiquitous mode of expression and communication. We investigate whether typing behavior is connected to two factors: the cognitive demands of a given task and the demographic features of the typist. We utilize features based on keystroke dynamics, stylometry, and “language production”, which are novel hybrid features that capture the dynamics of a typists linguistic choices. Our study takes advantage of a large data set (~350 subjects) made up of relatively short samples (~450 characters) of free text. Experiments show that these features can recognize the cognitive demands of task that an unseen typist is engaged in, and can classify his or her demographics with better than chance accuracy. We correctly distinguish High vs. Low cognitively demanding tasks with accuracy up to 72.39%. Detection of non-native speakers of English is achieved with F1=0.462 over a baseline of 0.166, while detection of female typists reaches F1=0.524 over a baseline of 0.442. Recognition of left-handed typists achieves F1=0.223 over a baseline of 0.100. Further analyses reveal that novel relationships exist between language production as manifested through typing behavior, and both cognitive and demographic factors. 相似文献
192.
Improved Quality Output through Computer‐Based Training: An Automotive Assembly Field Study 下载免费PDF全文
In this article, two field experiments, conducted in an automotive assembly plant, evaluate how computer‐based training of operational sequences and related quality information can support the assembly performance of the operators. The experiments were performed during the launch of a new vehicle. A comparison was made of learning progress and quality performance between a reference group of operators that only had regular training and a test group for which some of the regular training was replaced with individual computer‐based training. Both quantitative measures of the quality output and questionnaires and observations were used to evaluate the effects of computer‐based training. The results show a clear positive difference in learning progress and improvements in quality output for the test group compared with the reference group. This combined with positive attitudes expressed by the operators and their team leaders shows that this type of training is an effective way to train operators during launches of new vehicles in automotive production. 相似文献
193.
In this paper, a non-cooperative distributed MPC algorithm based on reduced order model is proposed to stabilize large-scale systems. The large-scale system consists of a group of interconnected subsystems. Each subsystem can be partitioned into two parts: measurable part, whose states can be directly measured by sensors, and the unmeasurable part. In the online computation phase, only the measurable dynamics of the corresponding subsystem and neighbour-to-neighbour communication are necessary for the local controller design. Satisfaction of the state constraints and the practical stability are guaranteed while the complexity of the optimization problem is reduced. Numerical examples are given to show the effectiveness of this algorithm. 相似文献
194.
《Advanced Engineering Informatics》2015,29(3):714-726
This paper presents a methodology for comparing the performance of model-reduction strategies to be used with a diagnostic methodology for leak detection in water distribution networks. The goal is to find reduction strategies that are suitable for error-domain model falsification, a model based data interpretation methodology. Twelve reduction strategies are derived from five strategy categories. Categories differ according to the manner in which nodes are selected for deletion. A node is selected for deletion according to: (1) the diameter of the pipes; (2) the number of pipes linked to a node; (3) the angle of the pipes in the case of two-pipe nodes; (4) the distribution of the water demand; and, (5) a pair-wise combination of some categories.The methodology is illustrated using part of a real network. Performance is evaluated first by judging the equivalency of the reduced network with the initial network (before the application of any reduction procedure) and secondly, by assessing the compatibility with the diagnostic methodology. The results show that for each reduction strategy the equivalency of networks is verified. Computational time can be reduced to less than 20% of the non-reduced network in the best case. Results of diagnostic performance show that the performance decreases when using reduced networks. The reduction strategy with the best diagnostic performance is that based on the angle of two-pipe nodes, with an angle threshold of 165°. In addition, the sensitivity of the performance of the reduced networks to variation in leak intensity is evaluated. Results show that the reduction strategies where the number of nodes is significantly reduced are the most sensitive.Finally this paper describes a Pareto analysis that is used to select the reduction strategy that is a good compromise between reduction of computational time and performance of the diagnosis. In this context, the extension strategy is the most attractive. 相似文献
195.
196.
大数据具有数据量巨大、数据形式多样化等特点,大数据时代为教育和学习提供了丰富的信息资源,但也给教育模式和人才培养带来挑战。首先具体说明大数据时代的特点及对高校人才培养的影响,分析大数据时代对信息系统及相应人才的要求,结合教学实践研究大数据背景下信息系统专业的人才培养模式。 相似文献
197.
Predictive control for voltage collapse avoidance using a modified discrete multi-valued PSO algorithm 总被引:2,自引:0,他引:2
Voltage stability is one of the most challenging concerns that power utilities are confronted with, and this paper proposes a voltage control scheme based on Model Predictive Control (MPC) to overcome this kind of instability. Voltage instability has a close relation with the adequacy of reactive power and the response of Under Load Tap Changers (ULTCs) to the voltage drop after the occurrence of a contingency. Therefore, the proposed method utilizes reactive power injection and tap changing to avoid voltage collapse. Considering discrete nature of the changes in the tap ratio and also in the reactive power injected by capacitor banks, the search area for the optimizer of MPC will be an integer area; consequently, a modified discrete multi-valued Particle Swarm Optimization (PSO) is considered to perform this optimization. Simulation results of applying the proposed control scheme to a 4-bus system confirm its capability to prevent voltage collapse. 相似文献
198.
Fabio Poiesi Riccardo Mazzon Andrea Cavallaro 《Computer Vision and Image Understanding》2013,117(10):1257-1272
We propose a generic online multi-target track-before-detect (MT-TBD) that is applicable on confidence maps used as observations. The proposed tracker is based on particle filtering and automatically initializes tracks. The main novelty is the inclusion of the target ID in the particle state, enabling the algorithm to deal with unknown and large number of targets. To overcome the problem of mixing IDs of targets close to each other, we propose a probabilistic model of target birth and death based on a Markov Random Field (MRF) applied to the particle IDs. Each particle ID is managed using the information carried by neighboring particles. The assignment of the IDs to the targets is performed using Mean-Shift clustering and supported by a Gaussian Mixture Model. We also show that the computational complexity of MT-TBD is proportional only to the number of particles. To compare our method with recent state-of-the-art works, we include a postprocessing stage suited for multi-person tracking. We validate the method on real-world and crowded scenarios, and demonstrate its robustness in scenes presenting different perspective views and targets very close to each other. 相似文献
199.
W. Ariyasriwatana W. Buente M. Oshiro D. Streveler 《New Review of Hypermedia and Multimedia》2013,19(4):317-340
Yelp, a social media site, undeniably has an influence on consumers' food choice in spite of its ability to reflect consumers' real voice being criticized. Since unhealthy food choices contribute to health problems, such as obesity and malnourishment, we attempted to examine these problems by better understanding consumers through health-related cues to action—a construct from the Health Belief Model (HBM)— on Yelp Honolulu's restaurant reviews. Our research revealed 13 main categories: Ingredient, Type of food, Taste, Lifestyle, Cooking, Option, Price, Portion, Well-being, Nutrition, Hygiene, Emotional attachment and indulgence, and Feeling. We argue that these categories may ultimately lead consumers to make healthier food choices. In search of the most appealing way to communicate with the target group, underlying concepts that derived from these categories can be tested. Marketers in food industry (or public health policy-makers) can craft their strategies for healthy food brands/products (or healthy eating scheme) based on the concept test research. Moreover, Yelp can apply these insights in the development of their algorithm and filter system in order to help consumers find healthy food if they wish to do so. Restaurants can also improve their strategy, menu, and communication execution to meet the growing demands of health conscious consumers. 相似文献
200.
In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SUs) access the frequency channels partially occupied by the licensed Primary Users (PUs). Each channel is characterized by an availability probability unknown to the SUs. We apply population game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behaviors. We develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both policies on the induced imitation dynamics and the convergence properties of the proposed policies to the Nash equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solely local interactions and thus is especially suited in decentralized adaptive learning environments as cognitive radio networks. 相似文献