全文获取类型
收费全文 | 1636篇 |
免费 | 201篇 |
国内免费 | 141篇 |
专业分类
电工技术 | 48篇 |
综合类 | 135篇 |
化学工业 | 49篇 |
金属工艺 | 29篇 |
机械仪表 | 154篇 |
建筑科学 | 36篇 |
矿业工程 | 21篇 |
能源动力 | 9篇 |
轻工业 | 17篇 |
水利工程 | 10篇 |
石油天然气 | 15篇 |
武器工业 | 33篇 |
无线电 | 191篇 |
一般工业技术 | 69篇 |
冶金工业 | 234篇 |
自动化技术 | 928篇 |
出版年
2024年 | 13篇 |
2023年 | 45篇 |
2022年 | 52篇 |
2021年 | 64篇 |
2020年 | 67篇 |
2019年 | 59篇 |
2018年 | 38篇 |
2017年 | 48篇 |
2016年 | 68篇 |
2015年 | 74篇 |
2014年 | 105篇 |
2013年 | 114篇 |
2012年 | 114篇 |
2011年 | 112篇 |
2010年 | 92篇 |
2009年 | 100篇 |
2008年 | 92篇 |
2007年 | 103篇 |
2006年 | 105篇 |
2005年 | 90篇 |
2004年 | 69篇 |
2003年 | 69篇 |
2002年 | 53篇 |
2001年 | 43篇 |
2000年 | 19篇 |
1999年 | 22篇 |
1998年 | 20篇 |
1997年 | 23篇 |
1996年 | 15篇 |
1995年 | 13篇 |
1994年 | 14篇 |
1993年 | 10篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 9篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1967年 | 1篇 |
1964年 | 2篇 |
1963年 | 2篇 |
1962年 | 2篇 |
1959年 | 1篇 |
1957年 | 3篇 |
1956年 | 3篇 |
1955年 | 2篇 |
1954年 | 1篇 |
排序方式: 共有1978条查询结果,搜索用时 15 毫秒
1.
Sei‐ichiro Kawase 《International Journal of Satellite Communications and Networking》2005,23(1):67-76
This paper proposes a technique for monitoring the longitudinal motion of geosynchronous satellites. A two‐antenna interferometer is used, with the baseline orientation adjusted to a particular horizontal azimuth. The interferometer then becomes insensitive to the north–south motion of the satellite, and this enables direct measurement of the satellite's longitudinal motion. Longitudes are monitored continuously, with no delay when orbital manoeuvres occur. The proposed technique is particularly useful when two or more satellites are operating in close proximity and their longitudes must be precisely monitored for safety control. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
2.
基于多信道预约可冲突避免的多址接入协议 总被引:3,自引:0,他引:3
本文为多跳分布多无线网络提出了一套灵活而有效的自适应获取冲突避免(AACA)的多址接入协议。在该协议中,各节点竞争公共信道,利用RTS/CTS对话形式来预约各业务信道,成功预约后的分组传输不会受到其他节点的干扰。它使用任意确定数目信道,以异步方式工作,并且使得各节点利用半双工无线电台就可以灵活、简便地实现资源预约。分析和比较结果说明,所提出的多信道预约协议可以有效地解决隐藏终端、暴露终端以及侵入终端的问题。 相似文献
3.
Cooper M. Lynne; Wood Phillip K.; Orcutt Holly K.; Albino Austin 《Canadian Metallurgical Quarterly》2003,84(2):390
Longitudinal data from a representative sample of 1,978 Black and White adolescents were used to examine the role of personality in multiple risk or problem behaviors. Results indicate that covariation among diverse behaviors (educational underachievement, delinquent behavior, substance use, sexual behavior) can be adequately modeled by a single higher order factor, and that impulsivity and avoidance coping serve as generalized risk factors for involvement in these behaviors. Whereas none of the personality variables examined explained change in problem behaviors once established, avoidance coping prospectively predicted involvement among a subgroup of adolescents with little or no prior involvement. Results suggest that dysfunctional styles of regulating emotions and emotionally driven behaviors are core features of risky or problem behaviors during adolescence. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
4.
Several studies have suggested that primates react differently to spatial reduction. In this article, the authors tested some general hypotheses on primate response to spatial reduction by studying the Apenheul lowland gorillas (Gorilla gorilla gorilla; Apeldoorn, the Netherlands). The frequency of conflicts did not greatly change between the 2 housing settings, thus not supporting the density- aggression model. Indoor, gorillas performed touching behavior more often and increased their level of reconciliation. These findings support the coping model. Indoor, the gorillas also maintained broader interindividual distances by increasing the levels of sitting alone, avoidance, and dismissing behaviors. In conclusion, the Apenheul gorillas modified selectively the distribution of some patterns typical of their behavioral repertoire in response to a high-density condition. Both avoidance and coping tactics were used, thus revealing high levels of behavioral flexibility in this species. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
5.
The communicating finite state machines can exchange messages over bounded FIFO channels. In this paper, a new technique, called reverse reachability analysis, is proposed to detect deadlocks on the communication between the communicating finite state machines. The technique is based on finding reverse reachable paths starting from possible deadlock states. If a reverse reachable path can reach the initial global state, then deadlock occurs. Otherwise the communication is deadlock-free. The effectiveness of the technique has been verified by some real protocols such as a specification of X.25 call establishment/clear protocol and Bartlet's alternating bit protocol. 相似文献
6.
We introduce an effective computer aided learning visual tool (CALVT) to teach graph-based applications. We present the robot motion planning problem as an example of such applications. The proposed tool can be used to simulate and/or further to implement practical systems in different areas of computer science such as graphics, computational geometry, robotics and networking. In the robot motion planning example, CALVT enables users to setup the working environment by creating obstacles and a robot of different shapes, specifying starting and goal positions, and setting other path or environment parameters from a user-friendly interface. The path planning system involves several phases. Each of these modules is complex and therefore we provide the possibility of visualizing graphically the output of each phase. Based on our experience, this tool has been an effective one in classroom teaching. It not only cuts down, significantly, on the instructor’s time and effort but also motivates senior/graduate students to pursue work in this specific area of research. 相似文献
7.
Martijn Hendriks Barend van den Nieuwelaar Frits Vaandrager 《International Journal on Software Tools for Technology Transfer (STTT)》2006,8(6):633-647
For a case-study of a wafer scanner from the semiconductor industry it is shown how model checking techniques can be used
to compute (1) a simple yet optimal deadlock avoidance policy, and (2) an infinite schedule that optimizes throughput. in
the absence of errors. Deadlock avoidance is studied based on a simple finite state model using Smv, and for throughput analysis a more detailed timed automaton model has been constructed and analyzed using the Uppaal tool. The Smv and Uppaal models are formally related through the notion of a stuttering bisimulation. The results were obtained within 2 weeks, which
confirms once more that model checking techniques may help to improve the design process of realistic, industrial systems.
Methodologically, the case study is interesting since two models were used to obtain results that could not have been obtained
using only a single model.
Supported by the European Community Project IST-2001-35304 (Ametist), http://ametist.cs.utwente.nl/. 相似文献
8.
Planning collision-free trajectories in time-varying environments: a two-level hierarchy 总被引:1,自引:0,他引:1
We propose a two-level hierarchy for planning collision-free trajectories in time varying environments. Global geometric algorithms for trajectory planning are used in conjunction with a local avoidance strategy. Simulations have been developed for a mobile robot in the plane among stationary and moving obstacles. Essentially, the robot has a global geometric planner that provides a coarse global trajectory (the path and velocity along it), which may be locally modified by the low-level local avoidance module if local sensors detect any obstacles in the vicinity of the robot. This hierarchy makes effective use of the complementary aspects of the global trajectory planning approaches and the local obstacle avoidance approaches. 相似文献
9.
A computationally efficient, obstacle avoidance algorithm for redundant robots is presented in this paper. This algorithm incorporates the neural networks and pseudodistance function D
p in the framework of resolved motion rate control. Thus, it is well suited for real-time implementation. Robot arm kinematic control is carried out by the Hopfield network. The connection weights of the network can be determined from the current value of Jacobian matrix at each sampling time, and joint velocity commands can be generated from the outputs of the network. The obstacle avoidance task is achieved by formulating the performance criterion as D
p>d
min (d
min represents the minimal distance between the redundant robot and obstacles). Its calculation is only related to some vertices which are used to model the robot and obstacles, and the computational times are nearly linear in the total number of vertices. Several simulation cases for a four-link planar manipulator are given to prove that the proposed collision-free trajectory planning scheme is efficient and practical. 相似文献
10.