全文获取类型
收费全文 | 35437篇 |
免费 | 3741篇 |
国内免费 | 2524篇 |
专业分类
电工技术 | 2581篇 |
技术理论 | 8篇 |
综合类 | 5198篇 |
化学工业 | 2780篇 |
金属工艺 | 901篇 |
机械仪表 | 2317篇 |
建筑科学 | 3422篇 |
矿业工程 | 1259篇 |
能源动力 | 1254篇 |
轻工业 | 495篇 |
水利工程 | 1027篇 |
石油天然气 | 880篇 |
武器工业 | 596篇 |
无线电 | 3195篇 |
一般工业技术 | 4212篇 |
冶金工业 | 2119篇 |
原子能技术 | 326篇 |
自动化技术 | 9132篇 |
出版年
2024年 | 119篇 |
2023年 | 560篇 |
2022年 | 735篇 |
2021年 | 961篇 |
2020年 | 1104篇 |
2019年 | 998篇 |
2018年 | 1046篇 |
2017年 | 1195篇 |
2016年 | 1290篇 |
2015年 | 1325篇 |
2014年 | 2036篇 |
2013年 | 2492篇 |
2012年 | 2243篇 |
2011年 | 2585篇 |
2010年 | 2055篇 |
2009年 | 2155篇 |
2008年 | 2225篇 |
2007年 | 2334篇 |
2006年 | 2171篇 |
2005年 | 1886篇 |
2004年 | 1523篇 |
2003年 | 1268篇 |
2002年 | 1099篇 |
2001年 | 878篇 |
2000年 | 761篇 |
1999年 | 672篇 |
1998年 | 521篇 |
1997年 | 468篇 |
1996年 | 394篇 |
1995年 | 381篇 |
1994年 | 313篇 |
1993年 | 269篇 |
1992年 | 245篇 |
1991年 | 176篇 |
1990年 | 144篇 |
1989年 | 166篇 |
1988年 | 126篇 |
1987年 | 65篇 |
1986年 | 90篇 |
1985年 | 67篇 |
1984年 | 66篇 |
1983年 | 47篇 |
1982年 | 53篇 |
1981年 | 41篇 |
1980年 | 31篇 |
1979年 | 31篇 |
1978年 | 29篇 |
1977年 | 26篇 |
1964年 | 26篇 |
1955年 | 35篇 |
排序方式: 共有10000条查询结果,搜索用时 641 毫秒
991.
992.
Sadok Rezig Zied Achour Mohamed-Ali Kammoun 《International journal of systems science》2016,47(14):3425-3435
This paper addresses the synthesis of Petri net (PN) controller for the forbidden state transition problem with a new utilisation of the theory of regions. Moreover, as any method of control synthesis based on a reachability graph, the theory of regions suffers from the combinatorial explosion problem. The proposed work minimises the number of equations in the linear system of theory of regions and therefore one can reduce the computation time. In this paper, two different approaches are proposed to select minimal cuts in the reachability graph in order to synthesise a PN controller. Thanks to a switch from one cut to another, one can activate and deactivate the corresponding?PNcontroller. An application is implemented in a flexible manufacturing system to illustrate the present method. Finally, comparison with previous works with experimental results in obtaining a maximally permissive controller is presented. 相似文献
993.
Fuzzy distributed cooperative tracking for a swarm of unmanned aerial vehicles with heterogeneous goals 总被引:1,自引:0,他引:1
Georgios P. Kladis Prathyush P. Menon Christopher Edwards 《International journal of systems science》2016,47(16):3803-3811
This article proposes a systematic analysis for a tracking problem which ensures cooperation amongst a swarm of unmanned aerial vehicles (UAVs), modelled as nonlinear systems with linear and angular velocity constraints, in order to achieve different goals. A distributed Takagi–Sugeno (TS) framework design is adopted for the representation of the nonlinear model of the dynamics of the UAVs. The distributed control law which is introduced is composed of both node and network level information. Firstly, feedback gains are synthesised using a parallel distributed compensation (PDC) control law structure, for a collection of isolated UAVs; ignoring communications among the swarm. Then secondly, based on an alternation-like procedure, the resulting feedback gains are used to determine Lyapunov matrices which are utilised at network level to incorporate into the control law, the relative differences in the states of the vehicles, and to induce cooperative behaviour. Eventually stability is guaranteed for the entire swarm. The control synthesis is performed using tools from linear control theory: in particular the design criteria are posed as linear matrix inequalities (LMIs). An example based on a UAV tracking scenario is included to outline the efficacy of the approach. 相似文献
994.
Jurjen Jansen Sander Veenstra Renske Zuurveen Wouter Stol 《Behaviour & Information Technology》2016,35(5):368-379
Information technology is becoming increasingly important for entrepreneurs. Protecting their technical infrastructure and stored data is, therefore, also becoming more vital. Nevertheless, research into the safety and security of entrepreneurs in general, and online threats targeted at entrepreneurs in particular, is still limited. This study investigates to what extent self-employed entrepreneurs protect themselves against online threats, and what motivates them to do so. Based on secondary analyses on data collected from 1622 Dutch entrepreneurs, we observe that the majority implement technical and personal coping measures. By adopting protection motivation theory as a theoretical basis for our study, we found that coping appraisal explains the adoption of protective measures. Entrepreneurs are likely to implement protective measures when they believe a measure is effective, when they are capable of using internet technology, when their attitude towards online protection is positive and when they believe they are responsible for their own online security. Although the secondary analysis provides some limitations, this study offers new insights into the usage of protective measures and the motivation for taking them. These insights can help to improve information security campaigns. 相似文献
995.
We consider the problem of revenue maximization on multi‐unit auctions where items are distinguished by their relative values; any pair of items has the same ratio of values to all buyers. As is common in the study of revenue maximizing problems, we assume that buyers' valuations are drawn from public known distributions and they have additive valuations for multiple items. Our problem is well motivated by sponsored search auctions, which made money for Google and Yahoo! in practice. In this auction, each advertiser bids an amount bi to compete for ad slots on a web page. The value of each ad slot corresponds to its click‐through‐rate, and each buyer has her own per‐click valuations, which is her private information. Obviously, a strategic bidder may bid an amount that is different with her true valuation to improve her utility. Our goal is to design truthful mechanisms avoiding this misreporting. We develop the optimal (with maximum revenue) truthful auction for a relaxed demand model (where each buyer i wants at most di items) and a sharp demand model (where buyer i wants exactly di items). We also find an auction that always guarantees at least half of the revenue of the optimal auction when the buyers are budget constrained. Moreover, all of the auctions we design can be computed efficiently, that is, in polynomial time. 相似文献
996.
《Information & Management》2016,53(6):740-751
This study develops a research model that explains the continuance of corporate social network service (SNS) pages. In order to find antecedents that influence end users’ continuance intention, this study adopts communicative ecology theory from media and communication studies. Results indicate that the quality of social interaction is the most salient feature, as indicated by the fact that it has the highest impact on perceived usefulness and enjoyment. Moreover, content quality also increases both perceived usefulness and enjoyment, while SNS platform quality and service quality increase perceived usefulness only. In addition, perceived network size moderates the impact of social interaction quality on perceived enjoyment. 相似文献
997.
《Information & Management》2016,53(7):857-867
The past decade has witnessed a growing number of business models that facilitate economic exchanges between individuals with limited institutional mediation. One of the important innovative business models is online peer-to-peer lending, which has received wide attention from government, industry, and researchers. Using the signaling theory, we compare the effects of various signals on the likelihood of successful funding in three models (i.e., first-time borrowing, repeated borrowing without prior lending, and repeated borrowing with prior lending). Using data collected from PPDAI.com, we verify the three proposed models by employing logistic regression. Results and implications are analyzed and discussed. 相似文献
998.
The Internet is the preferred source of health information followed by healthcare providers, friends and family, print media, and television (Baxter & Egbert, 2008). Yet, previous research about online sexual health resources for LGBTQ (lesbian, gay, bisexual, transgendered, queer) groups, especially lesbian and bisexual (LB) women, primarily consists of introductions and reviews of related websites rather than critique of the quality of the information present (e.g. Clark, 2003; Finlon, 2002; McKay, 2011). Thus, the goals of this study were to examine the LB women’s sexual and relational health content in online sources and identify the degree to which the online sources considered LB women’s identity and standpoint when presenting sexual and relational health messages. The analysis includes a comparison of text-based and video-based online messages related to LB women’s sexual and relational health. We argue that there is an overall lack of quality in the online sexual and relational health messages for LB women, and that websites are not comprehensive enough in their coverage of LB women’s sexual and relational health. 相似文献
999.
Moshe Sniedovich 《International Transactions in Operational Research》2016,23(4):625-653
Ever since its appearance on the scene in the 1940s, in the then nascent field of statistical decision theory, Wald's maximin paradigm has played a vital role in many disciplines in the treatment of nonprobabilistic uncertainty, both as a tool of thought and as a practical instrument. In fact, in some fields, such as modern robust optimization, Wald's paradigm dominates the scene. It is important to note that this paradigm's preeminence in many fields continues unabated, despite its obvious limitations and the criticism that had been and continues to be leveled at it. So, in this tutorial we examine the methodological aspects of this stalwart of decision theory from the viewpoint of robust decision‐making, paying special attention to its obvious and not so obvious limitations and to its relation to other maximin paradigms. 相似文献
1000.
Mario Guajardo Mikael Rönnqvist 《International Transactions in Operational Research》2016,23(3):371-392
Collaboration in transportation between two or more agents is becoming an important approach to find efficient solutions or plans. Efficiency can be measured in, for example, lower cost or more flexibility. An important aspect of the collaboration is to decide on how to share the benefits—for example, cost, profit, or resources. There are many sharing mechanisms or cost allocations proposed in the literature. Some are based on simple proportional rules and others are based on theoretical concepts found in game theory. We provide a survey on cost allocation methods found in the literature on collaborative transportation, including problems on planning, vehicle routing, traveling salesman, distribution, and inventory. A total of 55 scientific articles compose the main part of the survey, most of them published between 2010 and 2015. We identify more than 40 cost allocation methods used in this stream of literature. We describe the theoretical basis for the main methods as well as the cases where they are used. We also report savings from the collaborations when they are based on industrial data. Some directions for future research are discussed. 相似文献