全文获取类型
收费全文 | 27325篇 |
免费 | 3655篇 |
国内免费 | 3027篇 |
专业分类
电工技术 | 1971篇 |
技术理论 | 4篇 |
综合类 | 2309篇 |
化学工业 | 205篇 |
金属工艺 | 93篇 |
机械仪表 | 982篇 |
建筑科学 | 308篇 |
矿业工程 | 467篇 |
能源动力 | 120篇 |
轻工业 | 85篇 |
水利工程 | 166篇 |
石油天然气 | 157篇 |
武器工业 | 158篇 |
无线电 | 8320篇 |
一般工业技术 | 750篇 |
冶金工业 | 99篇 |
原子能技术 | 56篇 |
自动化技术 | 17757篇 |
出版年
2024年 | 119篇 |
2023年 | 504篇 |
2022年 | 691篇 |
2021年 | 832篇 |
2020年 | 1084篇 |
2019年 | 773篇 |
2018年 | 748篇 |
2017年 | 1110篇 |
2016年 | 1375篇 |
2015年 | 1800篇 |
2014年 | 2825篇 |
2013年 | 2372篇 |
2012年 | 3166篇 |
2011年 | 2932篇 |
2010年 | 1995篇 |
2009年 | 1804篇 |
2008年 | 2026篇 |
2007年 | 1917篇 |
2006年 | 1362篇 |
2005年 | 1096篇 |
2004年 | 813篇 |
2003年 | 688篇 |
2002年 | 510篇 |
2001年 | 418篇 |
2000年 | 240篇 |
1999年 | 198篇 |
1998年 | 121篇 |
1997年 | 106篇 |
1996年 | 96篇 |
1995年 | 62篇 |
1994年 | 56篇 |
1993年 | 26篇 |
1992年 | 32篇 |
1991年 | 20篇 |
1990年 | 17篇 |
1989年 | 13篇 |
1988年 | 12篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1972年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 812 毫秒
971.
内容管理系统是目前企业信息管理领域的研究热点。该文介绍了企业内容管理系统的意义和技术发展趋势,并分析了现在企业系统中存在的问题。针对中小企事业单位的需求,设计和实现了易特内容管理系统,尤其在安全性上的改进,保障了企业各类信息的安全可靠。其实现思路对于提高内容管理系统在企业的应用提供了很好的参考价值。 相似文献
972.
973.
974.
975.
本文深入了解了国内外无线传感器网络领域目前的发展现状和发展动态,并对现有的无线传感器网络操作系统进行了大量的钻研,为研究无线传感器网络数据库打下了夯实的理论基础。论文从现有的无线传感器网络数据库分析入手,并着重设计和实现了基于TaraxOS无线传感器网络操作系统的数据库TaraxDB。然后基于对无线传感器网络数据库的分析,设计和实现了无线传感器网络数据库TaraxDB,设计实现了客户端查询的接收、解析和表示,数据库客户端与传感器网络之间发送查询和接收结果,数据库客户端与用户之间接收查询和提交结果。 相似文献
976.
977.
Zigbee无线传感器网络安全研究及改进 总被引:1,自引:0,他引:1
无线传感器网络综合了传感器技术、嵌入式计算技术、分布式信息处理技术和无线通信技术,本文针对ZigBee技术在组网方式、安全结构等安全方面进行了全面的分析,提出多冗余路径安全机制,从而更适合无线传感器网络的应用。 相似文献
978.
Feng-Hsu Wang 《Information Sciences》2008,178(7):1848-1876
In item promotion applications, there is a strong need for tools that can help to unlock the hidden profit within each individual customer’s transaction history. Discovering association patterns based on the data mining technique is helpful for this purpose. However, the conventional association mining approach, while generating “strong” association rules, cannot detect potential profit-building opportunities that can be exposed by “soft” association rules, which recommend items with looser but significant enough associations. This paper proposes a novel mining method that automatically detects hidden profit-building opportunities through discovering soft associations among items from historical transactions. Specifically, this paper proposes a relaxation method of association mining with a new support measurement, called soft support, that can be used for mining soft association patterns expressed with the “most” fuzzy quantifier. In addition, a novel measure for validating the soft-associated rules is proposed based on the estimated possibility of a conditioned quantified fuzzy event. The new measure is shown to be effective by comparison with several existing measures. A new association mining algorithm based on modification of the FT-Tree algorithm is proposed to accommodate this new support measure. Finally, the mining algorithm is applied to several data sets to investigate its effectiveness in finding soft patterns and content recommendation. 相似文献
979.
Server applications augmented with behavioral adaptation logic can react to environmental changes, creating self‐managing server applications with improved quality of service at runtime. However, developing adaptive server applications is challenging due to the complexity of the underlying server technologies and highly dynamic application environments. This paper presents an architecture framework, the Adaptive Server Framework (ASF), to facilitate the development of adaptive behavior for legacy server applications. ASF provides a clear separation between the implementation of adaptive behavior and the business logic of the server application. This means a server application can be extended with programmable adaptive features through the definition and implementation of control components defined in ASF. Furthermore, ASF is a lightweight architecture in that it incurs low CPU overhead and memory usage. We demonstrate the effectiveness of ASF through a case study, in which a server application dynamically determines the resolution and quality to scale an image based on the load of the server and network connection speed. The experimental evaluation demonstrates the performance gains possible by adaptive behavior and the low overhead introduced by ASF. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
980.
Francesco Bellotti Riccardo Berta Massimiliano Margarone Alessandro De Gloria 《Software》2008,38(12):1241-1259
The RFID technology is becoming ever more popular in the development of ubiquitous computing applications. A full exploitation of the RFID potential requires the study and implementation of human–computer interaction (HCI) modalities to be able to support wide usability by the target audience. This implies the need for programming methodologies specifically dedicated to support the easy and efficient prototyping of applications to have feedback from early tests with users. On the basis of our field‐working experience, we have designed oDect, a high‐level language and platform‐independent application programming interface (API), ad hoc designed to meet the needs of typical applications for mobile devices (smart phones and PDAs). oDect aims at allowing application developers to create their prototypes focusing on the needs of the final users, without having to care about the low‐level software that interacts with the RFID hardware. Further, in an end‐user developing (EUD) approach, oDect provides specific support for the application end‐user herself to cope with typical problems of RFID applications in detecting objects. We describe in detail the features of the API and discuss the findings of a test with four programmers, where we analyse and evaluate the use of the API in four sample applications. We also present results of an end‐user test, which investigated strengths and weaknesses of the territorial agenda (TA) concept. The TA is an RFID‐based citizen guide that aids—through time‐ and location‐based reminders—users in their daily activities in a city. The TA directly exploits EUD features of oDect, in particular concerning the possibility of linking detected objects with custom actions. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献