全文获取类型
收费全文 | 20163篇 |
免费 | 2597篇 |
国内免费 | 1602篇 |
专业分类
电工技术 | 2528篇 |
技术理论 | 2篇 |
综合类 | 1908篇 |
化学工业 | 957篇 |
金属工艺 | 352篇 |
机械仪表 | 1714篇 |
建筑科学 | 969篇 |
矿业工程 | 363篇 |
能源动力 | 348篇 |
轻工业 | 3036篇 |
水利工程 | 300篇 |
石油天然气 | 1160篇 |
武器工业 | 241篇 |
无线电 | 2260篇 |
一般工业技术 | 1678篇 |
冶金工业 | 435篇 |
原子能技术 | 139篇 |
自动化技术 | 5972篇 |
出版年
2024年 | 148篇 |
2023年 | 425篇 |
2022年 | 759篇 |
2021年 | 862篇 |
2020年 | 910篇 |
2019年 | 777篇 |
2018年 | 716篇 |
2017年 | 880篇 |
2016年 | 873篇 |
2015年 | 942篇 |
2014年 | 1307篇 |
2013年 | 1288篇 |
2012年 | 1531篇 |
2011年 | 1646篇 |
2010年 | 1197篇 |
2009年 | 1198篇 |
2008年 | 1118篇 |
2007年 | 1314篇 |
2006年 | 1120篇 |
2005年 | 882篇 |
2004年 | 707篇 |
2003年 | 621篇 |
2002年 | 544篇 |
2001年 | 390篇 |
2000年 | 357篇 |
1999年 | 270篇 |
1998年 | 257篇 |
1997年 | 225篇 |
1996年 | 163篇 |
1995年 | 156篇 |
1994年 | 122篇 |
1993年 | 98篇 |
1992年 | 82篇 |
1991年 | 71篇 |
1990年 | 57篇 |
1989年 | 53篇 |
1988年 | 35篇 |
1987年 | 27篇 |
1986年 | 28篇 |
1985年 | 15篇 |
1984年 | 27篇 |
1983年 | 14篇 |
1982年 | 23篇 |
1981年 | 22篇 |
1980年 | 27篇 |
1979年 | 14篇 |
1978年 | 14篇 |
1977年 | 8篇 |
1961年 | 4篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
有滞后环节的系统的闭环鲁棒辨识方法 总被引:4,自引:1,他引:4
提出一种新的针对带滞后环节的任意阶系统的闭环辨识方法。通过“三步法”,实现在闭环条件下的被控制对象的传递函数参数的辨识,所提出方法具有很强的鲁棒性。仿真例子表明该方法的有效性。 相似文献
62.
M. Riba J. A. Rosell M. Eizaguirre R. Canela A. Guerrero 《Journal of chemical ecology》1990,16(5):1471-1483
A new minor component in the female volatile extract ofLeucoptera malifoliella (Costa) (Lepidoptera, Lyonetiidae) has been identified as 5,9-dimethyloctadecane (2). The amount detected of the minor compound2 ranged from 4 to 8% in comparison with the major component 5,9-dimethylheptadecane (1). Neither compound has been found in the male volatile extract. The identification has been based on its spectroscopic properties and Chromatographic behavior in comparison with an authentic synthetic sample. The synthesis has been carried out through a short route from 2,6-dimethylcyclohexanone (3). In field tests, compound2 appears to act as a Synergist of the major component1 when mixed with the latter in a 1000.1– 5 ratio. 相似文献
63.
《Automatica》2014,50(12):3019-3029
An adaptive control algorithm for open-loop stable, constrained, linear, multiple input multiple output systems is presented. The proposed approach can deal with both input and output constraints, as well as measurement noise and output disturbances. The adaptive controller consists of an iterative set membership identification algorithm, that provides a set of candidate plant models at each time step, and a model predictive controller, that enforces input and output constraints for all the plants inside the model set. The algorithm relies only on the solution of standard convex optimization problems that are guaranteed to be recursively feasible. The experimental results obtained by applying the proposed controller to a quad-tank testbed are presented. 相似文献
64.
This contribution concerns variance analysis of linear multi-input single-output models when the inputs are temporally white but where different inputs may be correlated. An expression is provided for the variance of a linearly parametrized estimate of the frequency response function from one block, i.e. from one input to the output. In particular, this expression reveals that the variance increases in one block when the number of estimated parameters in another block is increased, but levels off when the number of parameters in the other block reaches the number of parameters in the block in question. It also quantifies exactly how correlation between inputs affects the resulting accuracy and a graphical representation is provided for this purpose. The results are applicable to parallel MISO Hammerstein models when the nonlinearities are known and generalize an existing variance expression for this type of model. 相似文献
65.
We compared methods for predicting and understanding the source of confusion errors during military vehicle identification training. Participants completed training to identify main battle tanks. They also completed card-sorting and similarity-rating tasks to express their mental representation of resemblance across the set of training items. We expected participants to selectively attend to a subset of vehicle features during these tasks, and we hypothesised that we could predict identification confusion errors based on the outcomes of the card-sort and similarity-rating tasks. Based on card-sorting results, we were able to predict about 45% of observed identification confusions. Based on multidimensional scaling of the similarity-rating data, we could predict more than 80% of identification confusions. These methods also enabled us to infer the dimensions receiving significant attention from each participant. This understanding of mental representation may be crucial in creating personalised training that directs attention to features that are critical for accurate identification.
Practitioner Summary: Participants completed military vehicle identification training and testing, along with card-sorting and similarity-rating tasks. The data enabled us to predict up to 84% of identification confusion errors and to understand the mental representation underlying these errors. These methods have potential to improve training and reduce identification errors leading to fratricide. 相似文献
66.
Wiener模型结构能有效地表征系统的动态和静态特性, 因此这里首先基于这一结构建立软测量模型, 利用动态与静态子模型分别建立辅助变量与主导变量间的动态与静态关系, 并说明该软测量模型的可行性, 给出模型具体表达式. 其次, 针对所提模型, 提出分步辨识方式获得最优模型参数, 说明其可行性. 再次, 为了减少计算和实现模型在线更新, 这里提出参数辨识递推算法, 并给出软测量模型参数的收敛性结论. 通过实例仿真, 可以看出本文提出模型的可行性, 以及分步辨识方式与递推算法的有效性. 相似文献
67.
《Expert systems with applications》2014,41(11):5009-5016
The weak signal concept according to Ansoff has the aim to advance strategic early warning. It enables to predict the appearance of events in advance that are relevant for an organization. An example is to predict the appearance of a new and relevant technology for a research organization. Existing approaches detect weak signals based on an environmental scanning procedure that considers textual information from the internet. This is because about 80% of all data in the internet are textual information. The texts are processed by a specific clustering approach where clusters that represent weak signals are identified. In contrast to these related approaches, we propose a new methodology that investigates a sequence of clusters measured at successive points in time. This enables to trace the development of weak signals over time and thus, it enables to identify relevant weak signal developments for organization’s decision making in strategic early warning environment. 相似文献
68.
69.
In the present investigation, we develop a method for estimating rheological parameters of viscoelastic fluids using velocity measurement in a square straight channel. It is believed that a somewhat complicated patterns of secondary flows due to the non-zero second normal stress difference are more useful than the simple viscometric flows traditionally adopted in the determination of rheological parameters. The inverse problem of determining the rheological parameters from a set of velocity measurements is solved using a conjugate gradient method. When applied to a general constitutive equation encompassing the UCM model, the Oldroyd-B model and the PTT model, the present method is found to yield a reasonably accurate estimation of five rheological parameters simultaneously even with noisy velocity measurements. 相似文献
70.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献