全文获取类型
收费全文 | 635篇 |
免费 | 40篇 |
专业分类
电工技术 | 5篇 |
综合类 | 2篇 |
化学工业 | 171篇 |
金属工艺 | 18篇 |
机械仪表 | 10篇 |
建筑科学 | 49篇 |
矿业工程 | 2篇 |
能源动力 | 17篇 |
轻工业 | 38篇 |
水利工程 | 2篇 |
无线电 | 52篇 |
一般工业技术 | 133篇 |
冶金工业 | 34篇 |
原子能技术 | 6篇 |
自动化技术 | 136篇 |
出版年
2023年 | 15篇 |
2022年 | 5篇 |
2021年 | 20篇 |
2020年 | 12篇 |
2019年 | 11篇 |
2018年 | 12篇 |
2017年 | 16篇 |
2016年 | 28篇 |
2015年 | 15篇 |
2014年 | 32篇 |
2013年 | 32篇 |
2012年 | 32篇 |
2011年 | 42篇 |
2010年 | 45篇 |
2009年 | 43篇 |
2008年 | 38篇 |
2007年 | 43篇 |
2006年 | 14篇 |
2005年 | 25篇 |
2004年 | 24篇 |
2003年 | 14篇 |
2002年 | 6篇 |
2001年 | 9篇 |
2000年 | 13篇 |
1999年 | 13篇 |
1998年 | 6篇 |
1997年 | 10篇 |
1996年 | 10篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 8篇 |
1985年 | 3篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1966年 | 3篇 |
1965年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有675条查询结果,搜索用时 31 毫秒
11.
Mohammad Farhan Tanzim Nuno Fortunato Ilias Samathrakis Ruiwen Xie Ingo Opahle Oliver Gutfleisch Hongbin Zhang 《Advanced functional materials》2023,33(28):2214967
All-d Heuslers are a category of novel compounds combining versatile functionalities such as caloric responses and spintronics with enhanced mechanical properties. Despite the promising transport properties (anomalous Hall (AHC) and anomalous Nernst (ANC) conductivities) shown in the conventional Co2XY Heuslers with p-d hybridization, the all-d Heuslers with only d-d hybridization open a new horizon to search for new candidates with outstanding transport properties. In this work, the AHC and ANC are evaluated for thermodynamically stable ferro/ferri-magnetic all-d-metal regular Heusler compounds based on high-throughput first-principles calculations. It is observed that quite a few materials exhibit giant AHCs and ANCs, such as cubic Re2TaMn with an AHC of 2011 S cm-1, and tetragonal Pt2CrRh with an AHC of 1966 S cm-1 and an ANC of 7.50 A m-1K-1. Comprehensive analysis on the electronic structure reveals that the high AHC can be attributed to the occurrence of the Weyl nodes or gapped nodal lines in the neighborhood of the Fermi level. The correlations between such transport properties and the number of valence electrons are also thoroughly investigated, which provides a practical guidance to tailor AHC and ANC via chemical doping for transverse thermoelectric applications. 相似文献
12.
Recent advances in the field of kernel-based machine learning methods allow fast processing of text using string kernels utilizing suffix arrays. kernlab provides both kernel methods’ infrastructure and a large collection of already implemented algorithms and includes an implementation of suffix-array-based string kernels. Along with the use of the text mining infrastructure provided by tm these packages provide R with functionality in processing, visualizing and grouping large collections of text data using kernel methods. The emphasis is on the performance of various types of string kernels at these tasks. 相似文献
13.
Oliver Schreer Ingo Feldmann Isabel Alonso Mediavilla Pedro Concejero Abdul H. Sadka Mohammad Rafiq Swash Sergio Benini Riccardo Leonardi Tijana Janjusevic Ebroul Izquierdo 《Multimedia Tools and Applications》2010,48(1):23-49
Multimedia analysis and reuse of raw un-edited audio visual content known as rushes is gaining acceptance by a large number
of research labs and companies. A set of research projects are considering multimedia indexing, annotation, search and retrieval
in the context of European funded research, but only the FP6 project RUSHES is focusing on automatic semantic annotation,
indexing and retrieval of raw and un-edited audio-visual content. Even professional content creators and providers as well
as home-users are dealing with this type of content and therefore novel technologies for semantic search and retrieval are
required. In this paper, we present a summary of the most relevant achievements of the RUSHES project, focusing on specific
approaches for automatic annotation as well as the main features of the final RUSHES search engine. 相似文献
14.
15.
16.
17.
We compare four tools regarding their suitability for teaching formal software verification, namely the Frege Program Prover,
the Key system, Perfect Developer, and the Prototype Verification System (PVS). We evaluate them on a suite of small programs, which are typical of courses dealing with Hoare-style verification, weakest
preconditions, or dynamic logic. Finally we report our experiences with using Perfect Developer in class. 相似文献
18.
Scott R Boss Laurie J Kirsch Ingo Angermeier Raymond A Shingler R Wayne Boss 《欧洲信息系统杂志》2009,18(2):151-164
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply. 相似文献
19.
Martin Dietzfelbinger Jonathan E. Rowe Ingo Wegener Philipp Woelfel 《Algorithmica》2011,59(3):301-322
We investigate the effects of precision on the efficiency of various local search algorithms on 1-D unimodal functions. We
present a (1+1)-EA with adaptive step size which finds the optimum in O(log n) steps, where n is the number of points used. We then consider binary (base-2) and reflected Gray code representations with single bit mutations.
The standard binary method does not guarantee locating the optimum, whereas using the reflected Gray code does so in Θ((log n)2) steps. A(1+1)-EA with a fixed mutation probability distribution is then presented which also runs in O((log n)2). Moreover, a recent result shows that this is optimal (up to some constant scaling factor), in that there exist unimodal
functions for which a lower bound of Ω((log n)2) holds regardless of the choice of mutation distribution. For continuous multimodal functions, the algorithm also locates
the global optimum in O((log n)2). Finally, we show that it is not possible for a black box algorithm to efficiently optimise unimodal functions for two or
more dimensions (in terms of the precision used). 相似文献
20.
Traditional database query languages are based on set theory and crisp first order logic. However, many applications require
retrieval-like queries which return result objects associated with a degree of being relevant to the query. Historically,
retrieval systems estimate relevance by exploiting hidden object semantics whereas query processing in database systems relies
on matching select-conditions with attribute values. Thus, different mechanisms were developed for database and information
retrieval systems. In consequence, there is a lack of support for queries involving both retrieval and database search terms.
In this work, we introduce the quantum query language (QQL). Its underlying unifying theory is based on the mathematical formalism
of quantum mechanics and quantum logic. Van Rijsbergen already discussed the strong relation between the formalism of quantum
mechanics and information retrieval. In this work, we interrelate concepts from database query processing to concepts from
quantum mechanics and logic. As result, we obtain a common theory which allows us to incorporate seamlessly retrieval search
into traditional database query processing. 相似文献