全文获取类型
收费全文 | 661篇 |
免费 | 58篇 |
国内免费 | 48篇 |
专业分类
电工技术 | 30篇 |
综合类 | 92篇 |
化学工业 | 17篇 |
金属工艺 | 4篇 |
机械仪表 | 11篇 |
建筑科学 | 19篇 |
矿业工程 | 15篇 |
能源动力 | 14篇 |
轻工业 | 24篇 |
水利工程 | 11篇 |
石油天然气 | 1篇 |
无线电 | 33篇 |
一般工业技术 | 41篇 |
冶金工业 | 177篇 |
原子能技术 | 8篇 |
自动化技术 | 270篇 |
出版年
2024年 | 9篇 |
2023年 | 17篇 |
2022年 | 21篇 |
2021年 | 21篇 |
2020年 | 23篇 |
2019年 | 15篇 |
2018年 | 15篇 |
2017年 | 10篇 |
2016年 | 13篇 |
2015年 | 16篇 |
2014年 | 25篇 |
2013年 | 26篇 |
2012年 | 32篇 |
2011年 | 39篇 |
2010年 | 43篇 |
2009年 | 37篇 |
2008年 | 40篇 |
2007年 | 40篇 |
2006年 | 38篇 |
2005年 | 40篇 |
2004年 | 46篇 |
2003年 | 31篇 |
2002年 | 27篇 |
2001年 | 21篇 |
2000年 | 13篇 |
1999年 | 14篇 |
1998年 | 9篇 |
1997年 | 14篇 |
1996年 | 8篇 |
1995年 | 16篇 |
1994年 | 11篇 |
1993年 | 6篇 |
1992年 | 10篇 |
1991年 | 7篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1982年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1968年 | 1篇 |
1964年 | 1篇 |
1961年 | 1篇 |
1960年 | 1篇 |
排序方式: 共有767条查询结果,搜索用时 15 毫秒
1.
The convexity and continuity of fuzzy mappings are defined through a linear ordering and a metric on the set of fuzzy numbers. The local-global minimum property of real-valued convex functions is extended to convex fuzzy mappings. It is proved that a strict local minimizer of a quasiconvex fuzzy mapping is also a strict global minimizer. Characterizations for convex fuzzy mappings and quasiconvex fuzzy mappings are given. In addition, the Weirstrass theorem is extended from real-valued functions to fuzzy mappings. 相似文献
2.
A Simple Constraint-Based Algorithm for Efficiently Mining Observational Databases for Causal Relationships 总被引:4,自引:0,他引:4
Gregory F. Cooper 《Data mining and knowledge discovery》1997,1(2):203-224
This paper presents a simple, efficient computer-based method for discovering causal relationships from databases that contain observational data. Observational data is passively observed, as contrasted with experimental data. Most of the databases available for data mining are observational. There is great potential for mining such databases to discover causal relationships. We illustrate how observational data can constrain the causal relationships among measured variables, sometimes to the point that we can conclude that one variable is causing another variable. The presentation here is based on a constraint-based approach to causal discovery. A primary purpose of this paper is to present the constraint-based causal discovery method in the simplest possible fashion in order to (1) readily convey the basic ideas that underlie more complex constraint-based causal discovery techniques, and (2) permit interested readers to rapidly program and apply the method to their own databases, as a start toward using more elaborate causal discovery algorithms. 相似文献
3.
Gorgievski-Duijvesteijn Marjan J.; Bakker Arnold B.; Schaufeli Wilmar B.; van der Heijden Peter G. M. 《Canadian Metallurgical Quarterly》2005,10(3):210
This study of 513 Dutch farmers tested a dynamic equilibrium model of resources (an extension of the conservation of resources theory; S. E. Hobfoll, 1989, 1998, 2001). With structural equation modeling, the advantages of a 3-wave longitudinal design were comprehensively used, such as addressing bidirectional causal effects and within-individual vs. between-individual change. This allowed for a careful analysis of the management function of resources in the stress process. Results showed that well-being had stronger within-person stability than finances. Increased levels of financial problems temporarily increased psychological distress but not self-reported illness. Conversely, farmers with higher stable baselines of psychological distress also had higher baselines of self-reported illness and experienced more negative changes in their financial situation. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
4.
Algebraic properties of cryptosystem PGM 总被引:2,自引:0,他引:2
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ
G
is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results
is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest
security conditions that can be offered by a private-key encryption system.
S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center
for Communication and Information Science of the University of Nebraska. 相似文献
5.
David E. Wilkins 《Computational Intelligence》1988,4(3):373-380
Reasoning about actions necessarily involves tracking the truth of assertions about the world over time. The SIPE planning system retains the efficiency of the STRIPS assumption for this while enhancing expressive power by allowing the specification of a causl theory. Separation of knowledge about causality from knowledge about actions relieves operators of much of their representational burden and allows them to be applicable in a wide range of contexts. The implementation of causal theories is described, together with examples and evaluations of the system's expressive power and efficiency. 相似文献
6.
Optimal solutions of several variants of the probabilistic reasoning problem were found by a new technique that integrates
integer programming and probabilistic deduction graphs (PDG). PDGs are extended from deduction graphs of the and-type via
normal deduction graphs. The foregoing variants to be solved can involve multiple hypotheses and multiple evidences where
the former is given and the latter is unknown and being found or vice versa. The relationship among these hypotheses and evidences
with possible intermediaries is represented by a causal graph. The proposed method can handle a large causal graph of any
type and find an optimal solution by invoking a linear integer programming package. In addition, formulating the reasoning
problem to fit integer programming takes a polynomial time.
H.-L. Li was visiting the Department of Computer Sciences, University of North Texas in 1988–1989. He is with the Institute
of Information Management, National Chiao Tung University, Hsinchu, Taiwan, R.O.C. 相似文献
7.
Crits-Christoph Paul; Gibbons Mary Beth Connolly; Hearon Bridget 《Canadian Metallurgical Quarterly》2006,43(3):280
Research has consistently documented that the quality of the therapeutic alliance is related to the outcome of diverse psychotherapies. Insufficient attention, however, has been directed at identifying the nature and magnitude of the causal relationship between the alliance and outcome. In this commentary, we discuss the major threats to causal interpretation of alliance-outcome correlations and provide suggestions for future research that would help clarify the extent to which the alliance causes positive outcomes. Assuming the alliance is a causal factor in relation to outcome, we provide recommendations for research on the alliance that would attempt to improve patient care by enhancing the alliance. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
8.
Schulz Laura E.; Bonawitz Elizabeth Baraff; Griffiths Thomas L. 《Canadian Metallurgical Quarterly》2007,43(5):1124
Causal learning requires integrating constraints provided by domain-specific theories with domain-general statistical learning. In order to investigate the interaction between these factors, the authors presented preschoolers with stories pitting their existing theories against statistical evidence. Each child heard 2 stories in which 2 candidate causes co-occurred with an effect. Evidence was presented in the form: AB→E; CA→E; AD→E; and so forth. In 1 story, all variables came from the same domain; in the other, the recurring candidate cause, A, came from a different domain (A was a psychological cause of a biological effect). After receiving this statistical evidence, children were asked to identify the cause of the effect on a new trial. Consistent with the predictions of a Bayesian model, all children were more likely to identify A as the cause within domains than across domains. Whereas 3.5-year-olds learned only from the within-domain evidence, 4- and 5-year-olds learned from the cross-domain evidence and were able to transfer their new expectations about psychosomatic causality to a novel task. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
9.
对于遵循高层体系结构(HLA)标准构建的分布式虚拟环境(DVE),时间管理服务的性能将直接影响分布式仿真的效率和正确性。目前的时间管理服务实现了两种消息排序机制:接收序和时戳序。接收序对消息按其接收顺序进行处理,实时性高,但无法正确处理接收顺序与产生顺序相违背的消息;时戳序通常指保守时戳序机制,能对消息按其产生的时间顺序进行处理,但时间开销较大,难以到达DVE的实时性要求。因此,本文以分布式中间件的方式为DVE设计实现了一种因果消息序时间管理服务,提供符合HLA标准的程序接口,使分布式仿真应用在不改变原有调用接口的情况下,能够通过中间件对消息实现因果序时间管理。实验表明,使用该中间件可以有效维护消息的处理顺序,同时时间开销小,能够较好地满足DVE的实时性要求。 相似文献
10.
Various human factors classification frameworks have been used to identified causal factors for clinical adverse events. A systematic review was conducted to identify human factors classification frameworks that identified the causal factors (including human error) of adverse events in a hospital setting. Six electronic databases were searched, identifying 1997 articles and 38 of these met inclusion criteria. Most studies included causal contributing factors as well as error and error type, but the nature of coding varied considerably between studies. The ability of human factors classification frameworks to provide information on specific causal factors for an adverse event enables the focus of preventive attention on areas where improvements are most needed. This review highlighted some areas needing considerable improvement in order to meet this need, including better definition of terms, more emphasis on assessing reliability of coding and greater sophistication in analysis of results of the classification.
Practitioner Summary: Human factors classification frameworks can be used to identify causal factors of clinical adverse events. However, this review suggests that existing frameworks are diverse, limited in their identification of the context of human error and have poor reliability when used by different individuals. 相似文献