全文获取类型
收费全文 | 2164篇 |
免费 | 150篇 |
国内免费 | 59篇 |
专业分类
电工技术 | 98篇 |
综合类 | 77篇 |
化学工业 | 280篇 |
金属工艺 | 70篇 |
机械仪表 | 90篇 |
建筑科学 | 228篇 |
矿业工程 | 52篇 |
能源动力 | 227篇 |
轻工业 | 224篇 |
水利工程 | 50篇 |
石油天然气 | 90篇 |
武器工业 | 18篇 |
无线电 | 206篇 |
一般工业技术 | 159篇 |
冶金工业 | 81篇 |
原子能技术 | 7篇 |
自动化技术 | 416篇 |
出版年
2024年 | 6篇 |
2023年 | 60篇 |
2022年 | 65篇 |
2021年 | 79篇 |
2020年 | 101篇 |
2019年 | 64篇 |
2018年 | 47篇 |
2017年 | 77篇 |
2016年 | 89篇 |
2015年 | 93篇 |
2014年 | 144篇 |
2013年 | 131篇 |
2012年 | 129篇 |
2011年 | 196篇 |
2010年 | 137篇 |
2009年 | 133篇 |
2008年 | 114篇 |
2007年 | 119篇 |
2006年 | 106篇 |
2005年 | 95篇 |
2004年 | 67篇 |
2003年 | 68篇 |
2002年 | 63篇 |
2001年 | 49篇 |
2000年 | 30篇 |
1999年 | 20篇 |
1998年 | 15篇 |
1997年 | 19篇 |
1996年 | 12篇 |
1995年 | 2篇 |
1994年 | 12篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有2373条查询结果,搜索用时 31 毫秒
51.
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user’s notice. 相似文献
52.
53.
The interaction spaces between instructors and learners in the traditional face-to-face classroom environment are being changed by the diffusion and adoption of many forms of computer-based pedagogy. An integrated understanding of these evolving interaction spaces together with how they interconnect and leverage learning are needed to develop meaningful strategies for effective teaching and learning. The 18i collaborative interaction spaces model was designed based on constructivist principles, and describes 18 mixed instructor–learner spaces contextualized at a finer operational scale that makes explicit a wider range of interactions. The model was implemented during the life cycle of an undergraduate GIS-based multimedia cartography course. One output was the generation of a repository of rule-based trajectory plans for rapid planning and problem solving. The model provides an integrated workflow to manage course contents, products, interactions, individuality, and learning styles in blended environments. 相似文献
54.
持续审计(CA)研究综述 总被引:4,自引:0,他引:4
持续审计(Continuous Auditing,CA)是目前计算机辅助审计领域中的一个研究前沿问题.本文对CA的研究进行了分析、比较和展望.首先分析了CA的内涵.然后,对CA的相关研究进行了分类:(1)技术实现方法,分成嵌入式和分离式两种;(2)理论分析;(3)应用于CA的关键技术,并根据该分类对CA的研究分别进行了分析.最后,总结了本文的工作,并对将来CA的研究做了展望. 相似文献
55.
基于3D和VIRTOOLS技术的物理虚拟实验室架构设计 总被引:2,自引:0,他引:2
3D和VIRTOOLS技术是一种VR技术,采用该技术开发的虚拟实验具有真实性、沉浸性、交互性和易实现等特点.提出了一个基于3D和 VIRTOOLS 技术的物理虚拟实验室模型,分析了该模型的结构框架以及组成模块,介绍了如何进行相关设置实现虚拟实验室的优化,最后列举了伏安法测电阻的虚拟实验. 相似文献
56.
Nowadays, the cooperative intelligent transport systems are part of a largest system. Transportations are modal operations integrated in logistics and, logistics is the main process of the supply chain management. The supply chain strategic management as a simultaneous local and global value chain is a collaborative/cooperative organization of stakeholders, many times in co-opetition, to perform a service to the customers respecting the time, place, price and quality levels. The transportation, like other logistics operations must add value, which is achieved in this case through compression lead times and order fulfillments. The complex supplier's network and the distribution channels must be efficient and the integral visibility (monitoring and tracing) of supply chain is a significant source of competitive advantage. Nowadays, the competition is not discussed between companies but among supply chains. This paper aims to evidence the current and emerging manufacturing and logistics system challenges as a new field of opportunities for the automation and control systems research community. Furthermore, the paper forecasts the use of radio frequency identification (RFID) technologies integrated into an information and communication technologies (ICT) framework based on distributed artificial intelligence (DAI) supported by a multi-agent system (MAS), as the most value advantage of supply chain management (SCM) in a cooperative intelligent logistics systems. Logistical platforms (production or distribution) as nodes of added value of supplying and distribution networks are proposed as critical points of the visibility of the inventory, where these technological needs are more evident. 相似文献
57.
58.
Chaoying Zhang Jiaxing Gong Jingyu Zhang Ziyu Zhu Ying Qian Kejie Lu Siyi Zhou Tianyi Gu Huiming Wang Yong He Mengfei Yu 《Advanced functional materials》2023,33(40):2302251
Autograft replaced by a nerve guidance conduit (NGC) is challenging in peripheral nerve injury because current NGC is still limited by precise conductivity and excellent biocompatibility in vivo, which influences the peripheral nerve repair even for a long lesion gap repair. Several particular elements have the potential function for nerve conductivity acceleration based on the traditional three factors of neural tissue engineering. The review aims to address three questions: 1) What is the superior factor for nerve conduction in the application? 2) How can a more conductive regenerative scaffold be constructed in vivo? 3) What is the next step in nerve regeneration for NGC? The bibliometrics analysis of NGC-related references is adopted to acquire that the conductive material, manufacturing technology of neural scaffold, and electrical stimulation (ES) play essential roles in the acceleration of nerve conduction. This review visually analyses the research status and summarizes the main types of conductive materials, the manufacturing technologies of neural scaffolds, and the characteristics of ES. The viewpoints and outlook of developing NGC are also discussed in this review. The proposed three elements are expected to improve the nerve conduction of NGC in vivo and even address the dilemma of long-distance peripheral nerve injury. 相似文献
59.
Hosam El- El-Sofany 《计算机系统科学与工程》2022,43(2):573-589
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called “Bio_Authen_as_a_Service” for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%. 相似文献
60.