全文获取类型
收费全文 | 4409篇 |
免费 | 162篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 21篇 |
综合类 | 8篇 |
化学工业 | 1190篇 |
金属工艺 | 44篇 |
机械仪表 | 47篇 |
建筑科学 | 186篇 |
矿业工程 | 13篇 |
能源动力 | 67篇 |
轻工业 | 727篇 |
水利工程 | 27篇 |
石油天然气 | 9篇 |
无线电 | 125篇 |
一般工业技术 | 487篇 |
冶金工业 | 1086篇 |
原子能技术 | 24篇 |
自动化技术 | 515篇 |
出版年
2023年 | 27篇 |
2022年 | 189篇 |
2021年 | 204篇 |
2020年 | 82篇 |
2019年 | 98篇 |
2018年 | 108篇 |
2017年 | 84篇 |
2016年 | 100篇 |
2015年 | 94篇 |
2014年 | 134篇 |
2013年 | 259篇 |
2012年 | 173篇 |
2011年 | 225篇 |
2010年 | 190篇 |
2009年 | 156篇 |
2008年 | 212篇 |
2007年 | 192篇 |
2006年 | 149篇 |
2005年 | 134篇 |
2004年 | 119篇 |
2003年 | 96篇 |
2002年 | 120篇 |
2001年 | 72篇 |
2000年 | 66篇 |
1999年 | 88篇 |
1998年 | 79篇 |
1997年 | 53篇 |
1996年 | 73篇 |
1995年 | 50篇 |
1994年 | 55篇 |
1993年 | 54篇 |
1992年 | 61篇 |
1990年 | 49篇 |
1989年 | 69篇 |
1988年 | 45篇 |
1987年 | 51篇 |
1986年 | 55篇 |
1985年 | 53篇 |
1984年 | 58篇 |
1983年 | 45篇 |
1982年 | 30篇 |
1981年 | 47篇 |
1980年 | 26篇 |
1979年 | 23篇 |
1978年 | 22篇 |
1977年 | 23篇 |
1976年 | 30篇 |
1975年 | 26篇 |
1973年 | 16篇 |
1970年 | 17篇 |
排序方式: 共有4576条查询结果,搜索用时 0 毫秒
61.
Andrej GisbrechtAuthor VitaeBassam MokbelAuthor Vitae Barbara HammerAuthor Vitae 《Neurocomputing》2011,74(9):1359-1371
The generative topographic mapping (GTM) has been proposed as a statistical model to represent high-dimensional data by a distribution induced by a sparse lattice of points in a low-dimensional latent space, such that visualization, compression, and data inspection become possible. The formulation in terms of a generative statistical model has the benefit that relevant parameters of the model can be determined automatically based on an expectation maximization scheme. Further, the model offers a large flexibility such as a direct out-of-sample extension and the possibility to obtain different degrees of granularity of the visualization without the need of additional training. Original GTM is restricted to Euclidean data points in a given Euclidean vector space. Often, data are not explicitly embedded in a Euclidean vector space, rather pairwise dissimilarities of data can be computed, i.e. the relations between data points are given rather than the data vectors themselves. We propose a method which extends the GTM to relational data and which allows us to achieve a sparse representation of data characterized by pairwise dissimilarities, in latent space. The method, relational GTM, is demonstrated on several benchmarks. 相似文献
62.
Bruno Rossi Barbara Russo Giancarlo Succi 《Information and Software Technology》2011,53(11):1209-1226
Context
Adopting IT innovation in organizations is a complex decision process driven by technical, social and economic issues. Thus, those organizations that decide to adopt innovation take a decision of uncertain success of implementation, as the actual use of a new technology might not be the one expected. The misalignment between planned and effective use of innovation is called assimilation gap.Objective
This research aims at defining a quantitative instrument for measuring the assimilation gap and applying it to the case of the adoption of OSS.Method
In this paper, we use the theory of path dependence and increasing returns of Arthur. In particular, we model the use of software applications (planned or actual) by stochastic processes defined by the daily amounts of files created with the applications. We quantify the assimilation gap by comparing the resulting models by measures of proximity.Results
We apply and validate our method to a real case study of introduction of OpenOffice. We have found a gap between the planned and the effective use despite well-defined directives to use the new OS technology. These findings suggest a need of strategy re-calibration that takes into account environmental factors and individual attitudes.Conclusions
The theory of path dependence is a valid instrument to model the assimilation gap provided information on strategy toward innovation and quantitative data on actual use are available. 相似文献63.
Six different methods to calculate the Strain Index (SI) scores for jobs with multiple forces/tasks were developed. Exposure data of 733 subjects from 12 different worksites were used to calculate these SI scores. Results show that using different SI computation methods could result in different SI scores, hence different risk level classifications. However, some simpler methods generated SI scores were comparable to the more complicated composite SI method. Despite differences in the scores between the six different SI computation methods, Spearman rank-order correlation coefficients of 0.61-0.97 were found between the methods. With some confidence, ergonomic practitioners may use simpler methods, depending on their specificity requirement in job evaluations and available resources. Some SI computation methods may tend to over-estimate job risk levels, while others may tend to under-estimate job risk levels, due to different ways used in obtaining the various SI parameters and computations. 相似文献
64.
Massimo Mecella Barbara Pernici 《The VLDB Journal The International Journal on Very Large Data Bases》2001,10(1):2-15
Component-based approaches are becoming more and more popular to support Internet-based application development. Different
component modeling approaches, however, can be adopted, obtaining different abstraction levels (either conceptual or operational).
In this paper we present a component-based architecture for the design of e-applications, and discuss the concept of wrapper
components as building blocks for the development of e-services, where these services are based on legacy systems. We discuss
their characteristics and their applicability in Internet-based application development.
Received: 30 October 2000 / Accepted: 9 January 2001 Published online: 28 June 2001 相似文献
65.
Barbara Gengler 《Network Security》2001,2001(3):6
An industry consortium focused on ensuring that all PCs are secure for electronic business transactions has announced the release of its first version specification. The Trusted Computing Platform Alliance (TCPA), backed by founding members Compaq, Microsoft, Hewlett-Packard, IBM and Intel, said that the specification will adopt the combination of a hardware and a software approach, which includes a security chip that encrypts data whether filed locally, or sent over the Internet by E-mail. 相似文献
66.
Matthew Arnold Michael Hsiao Ulrich Kremer Barbara G. Ryder 《International journal of parallel programming》2001,29(2):111-137
The frequent occurrence of implicitly thrown exceptions poses one of the challenges present in a Java compiler. Not only do these implicitly thrown exceptions directly affect the performance by requiring explicit checks, they also indirectly impact the performance by restricting code movement in order to satisfy the precise exception model in Java. In particular, instruction scheduling is one transformation that is restricted by implicitly thrown exceptions due to the heavy reliance on reordering instructions to exploit maximum hardware performance. The goal of this study is two-fold: first, investigate the degree to which implicitly thrown exceptions in Java hinder instruction scheduling, and second, find new techniques for allowing more efficient execution of Java programs containing implicitly thrown exceptions. Experimental results show that with aggressive scheduling techniques, such as superblock scheduling, the negative performance impact can be greatly reduced. 相似文献
67.
Two samples of naturally occurring pyrite were treated with acetyl acetone, silanes, humic acids, lignin-NaOH mixture, and oxalic acid. The corrosion rate of pyrite was observed to decrease significantly due to the surface treatment by the chemicals used in this study. Surface characterization methods indicate that phenyl triacetoxy silane forms a passive coating a few Angstroms thick on the pyrite, thus preventing its dissolution in 1M H2SO4. 相似文献
68.
Janwillem Liebrand Margreet Z. Zwarteveen Philippus Wester Barbara van Koppen 《国际水》2013,38(7):773-787
Through investigating the reactions of commercial farmers to land and water reforms in the Trichardtsdal-Ofcolaco area, Limpopo Province, Olifants Basin, South Africa, from 1997 to 2006, it is shown that water claims are key to land redistribution processes, and that commercial farmers make strategic use of arguments for nature conservation and ecological stewardship to defend their claims to water. Given these observations, caution is warranted with respect to the implementation of land and water reforms as separate policy packages; it may be more effective to design water and conservation policies as an integral part of land reform programmes. 相似文献
69.
This study examined the question, ‘What is the impact of a digital math intervention on secondary ELL students’ mathematical capabilities and perceptions of their future possibilities?’ The hypothesis was that through its direct effect on increasing students’ math ability and its indirect effect on increasing students’ perceived math self-efficacy, the digital intervention affects students’ perceptions of their functionings and future possibilities. A path analysis, with qualitative data nested into the design, was used to analyze the conceptualized relationships. The study was conducted with 50 ninth-and-10th-grade Hispanic students in a Colorado high school, over 6 months. The primary finding was that through its direct effect on increasing students’ math ability and its indirect effect on increasing students’ perceived math self-efficacy, the digital intervention improved students’ perceptions of their functionings and future possibilities. What this study specifically underscores is the importance of taking a coherent and purposeful approach toward the design of digital student-directed educational technology, especially for ELL students who may have specific learning needs. 相似文献
70.
Glenn Melissa J.; Lehmann Hugo; Mumby Dave G.; Woodside Barbara 《Canadian Metallurgical Quarterly》2005,119(3):806
The authors explored the possibility that there are different neural consequences, beyond the primary site of brain damage, following perirhinal cortex (PRh) lesions made in different ways. Fos expression was used as a marker for neuronal activation and compared across the forebrains of rats that underwent the different types of surgery. Electrolytic and excitotoxic PRh lesions produced dramatic increases in Fos expression in the cortex, and excitotoxic and aspiration PRh lesions increased Fos expression in the dentate gyrus. These data are consistent with the hypothesis that different lesion methods have separable effects on neural function in regions outside the lesion site that could account for inconsistencies in the literature regarding the behavioral effects of PRh lesions on tests of spatial memory. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献