首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35437篇
  免费   3741篇
  国内免费   2524篇
电工技术   2581篇
技术理论   8篇
综合类   5198篇
化学工业   2780篇
金属工艺   901篇
机械仪表   2317篇
建筑科学   3422篇
矿业工程   1259篇
能源动力   1254篇
轻工业   495篇
水利工程   1027篇
石油天然气   880篇
武器工业   596篇
无线电   3195篇
一般工业技术   4212篇
冶金工业   2119篇
原子能技术   326篇
自动化技术   9132篇
  2024年   119篇
  2023年   560篇
  2022年   735篇
  2021年   961篇
  2020年   1104篇
  2019年   998篇
  2018年   1046篇
  2017年   1195篇
  2016年   1290篇
  2015年   1325篇
  2014年   2036篇
  2013年   2492篇
  2012年   2243篇
  2011年   2585篇
  2010年   2055篇
  2009年   2155篇
  2008年   2225篇
  2007年   2334篇
  2006年   2171篇
  2005年   1886篇
  2004年   1523篇
  2003年   1268篇
  2002年   1099篇
  2001年   878篇
  2000年   761篇
  1999年   672篇
  1998年   521篇
  1997年   468篇
  1996年   394篇
  1995年   381篇
  1994年   313篇
  1993年   269篇
  1992年   245篇
  1991年   176篇
  1990年   144篇
  1989年   166篇
  1988年   126篇
  1987年   65篇
  1986年   90篇
  1985年   67篇
  1984年   66篇
  1983年   47篇
  1982年   53篇
  1981年   41篇
  1980年   31篇
  1979年   31篇
  1978年   29篇
  1977年   26篇
  1964年   26篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 641 毫秒
991.
992.
This paper addresses the synthesis of Petri net (PN) controller for the forbidden state transition problem with a new utilisation of the theory of regions. Moreover, as any method of control synthesis based on a reachability graph, the theory of regions suffers from the combinatorial explosion problem. The proposed work minimises the number of equations in the linear system of theory of regions and therefore one can reduce the computation time. In this paper, two different approaches are proposed to select minimal cuts in the reachability graph in order to synthesise a PN controller. Thanks to a switch from one cut to another, one can activate and deactivate the corresponding?PNcontroller. An application is implemented in a flexible manufacturing system to illustrate the present method. Finally, comparison with previous works with experimental results in obtaining a maximally permissive controller is presented.  相似文献   
993.
This article proposes a systematic analysis for a tracking problem which ensures cooperation amongst a swarm of unmanned aerial vehicles (UAVs), modelled as nonlinear systems with linear and angular velocity constraints, in order to achieve different goals. A distributed Takagi–Sugeno (TS) framework design is adopted for the representation of the nonlinear model of the dynamics of the UAVs. The distributed control law which is introduced is composed of both node and network level information. Firstly, feedback gains are synthesised using a parallel distributed compensation (PDC) control law structure, for a collection of isolated UAVs; ignoring communications among the swarm. Then secondly, based on an alternation-like procedure, the resulting feedback gains are used to determine Lyapunov matrices which are utilised at network level to incorporate into the control law, the relative differences in the states of the vehicles, and to induce cooperative behaviour. Eventually stability is guaranteed for the entire swarm. The control synthesis is performed using tools from linear control theory: in particular the design criteria are posed as linear matrix inequalities (LMIs). An example based on a UAV tracking scenario is included to outline the efficacy of the approach.  相似文献   
994.
Information technology is becoming increasingly important for entrepreneurs. Protecting their technical infrastructure and stored data is, therefore, also becoming more vital. Nevertheless, research into the safety and security of entrepreneurs in general, and online threats targeted at entrepreneurs in particular, is still limited. This study investigates to what extent self-employed entrepreneurs protect themselves against online threats, and what motivates them to do so. Based on secondary analyses on data collected from 1622 Dutch entrepreneurs, we observe that the majority implement technical and personal coping measures. By adopting protection motivation theory as a theoretical basis for our study, we found that coping appraisal explains the adoption of protective measures. Entrepreneurs are likely to implement protective measures when they believe a measure is effective, when they are capable of using internet technology, when their attitude towards online protection is positive and when they believe they are responsible for their own online security. Although the secondary analysis provides some limitations, this study offers new insights into the usage of protective measures and the motivation for taking them. These insights can help to improve information security campaigns.  相似文献   
995.
We consider the problem of revenue maximization on multi‐unit auctions where items are distinguished by their relative values; any pair of items has the same ratio of values to all buyers. As is common in the study of revenue maximizing problems, we assume that buyers' valuations are drawn from public known distributions and they have additive valuations for multiple items. Our problem is well motivated by sponsored search auctions, which made money for Google and Yahoo! in practice. In this auction, each advertiser bids an amount bi to compete for ad slots on a web page. The value of each ad slot corresponds to its click‐through‐rate, and each buyer has her own per‐click valuations, which is her private information. Obviously, a strategic bidder may bid an amount that is different with her true valuation to improve her utility. Our goal is to design truthful mechanisms avoiding this misreporting. We develop the optimal (with maximum revenue) truthful auction for a relaxed demand model (where each buyer i wants at most di items) and a sharp demand model (where buyer i wants exactly di items). We also find an auction that always guarantees at least half of the revenue of the optimal auction when the buyers are budget constrained. Moreover, all of the auctions we design can be computed efficiently, that is, in polynomial time.  相似文献   
996.
《Information & Management》2016,53(6):740-751
This study develops a research model that explains the continuance of corporate social network service (SNS) pages. In order to find antecedents that influence end users’ continuance intention, this study adopts communicative ecology theory from media and communication studies. Results indicate that the quality of social interaction is the most salient feature, as indicated by the fact that it has the highest impact on perceived usefulness and enjoyment. Moreover, content quality also increases both perceived usefulness and enjoyment, while SNS platform quality and service quality increase perceived usefulness only. In addition, perceived network size moderates the impact of social interaction quality on perceived enjoyment.  相似文献   
997.
《Information & Management》2016,53(7):857-867
The past decade has witnessed a growing number of business models that facilitate economic exchanges between individuals with limited institutional mediation. One of the important innovative business models is online peer-to-peer lending, which has received wide attention from government, industry, and researchers. Using the signaling theory, we compare the effects of various signals on the likelihood of successful funding in three models (i.e., first-time borrowing, repeated borrowing without prior lending, and repeated borrowing with prior lending). Using data collected from PPDAI.com, we verify the three proposed models by employing logistic regression. Results and implications are analyzed and discussed.  相似文献   
998.
The Internet is the preferred source of health information followed by healthcare providers, friends and family, print media, and television (Baxter & Egbert, 2008). Yet, previous research about online sexual health resources for LGBTQ (lesbian, gay, bisexual, transgendered, queer) groups, especially lesbian and bisexual (LB) women, primarily consists of introductions and reviews of related websites rather than critique of the quality of the information present (e.g. Clark, 2003; Finlon, 2002; McKay, 2011). Thus, the goals of this study were to examine the LB women’s sexual and relational health content in online sources and identify the degree to which the online sources considered LB women’s identity and standpoint when presenting sexual and relational health messages. The analysis includes a comparison of text-based and video-based online messages related to LB women’s sexual and relational health. We argue that there is an overall lack of quality in the online sexual and relational health messages for LB women, and that websites are not comprehensive enough in their coverage of LB women’s sexual and relational health.  相似文献   
999.
Ever since its appearance on the scene in the 1940s, in the then nascent field of statistical decision theory, Wald's maximin paradigm has played a vital role in many disciplines in the treatment of nonprobabilistic uncertainty, both as a tool of thought and as a practical instrument. In fact, in some fields, such as modern robust optimization, Wald's paradigm dominates the scene. It is important to note that this paradigm's preeminence in many fields continues unabated, despite its obvious limitations and the criticism that had been and continues to be leveled at it. So, in this tutorial we examine the methodological aspects of this stalwart of decision theory from the viewpoint of robust decision‐making, paying special attention to its obvious and not so obvious limitations and to its relation to other maximin paradigms.  相似文献   
1000.
Collaboration in transportation between two or more agents is becoming an important approach to find efficient solutions or plans. Efficiency can be measured in, for example, lower cost or more flexibility. An important aspect of the collaboration is to decide on how to share the benefits—for example, cost, profit, or resources. There are many sharing mechanisms or cost allocations proposed in the literature. Some are based on simple proportional rules and others are based on theoretical concepts found in game theory. We provide a survey on cost allocation methods found in the literature on collaborative transportation, including problems on planning, vehicle routing, traveling salesman, distribution, and inventory. A total of 55 scientific articles compose the main part of the survey, most of them published between 2010 and 2015. We identify more than 40 cost allocation methods used in this stream of literature. We describe the theoretical basis for the main methods as well as the cases where they are used. We also report savings from the collaborations when they are based on industrial data. Some directions for future research are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号