全文获取类型
收费全文 | 2315篇 |
免费 | 76篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 20篇 |
综合类 | 2篇 |
化学工业 | 379篇 |
金属工艺 | 35篇 |
机械仪表 | 42篇 |
建筑科学 | 186篇 |
矿业工程 | 4篇 |
能源动力 | 50篇 |
轻工业 | 201篇 |
水利工程 | 38篇 |
石油天然气 | 8篇 |
武器工业 | 1篇 |
无线电 | 135篇 |
一般工业技术 | 424篇 |
冶金工业 | 475篇 |
原子能技术 | 31篇 |
自动化技术 | 361篇 |
出版年
2022年 | 13篇 |
2021年 | 40篇 |
2020年 | 30篇 |
2019年 | 38篇 |
2018年 | 35篇 |
2017年 | 44篇 |
2016年 | 53篇 |
2015年 | 47篇 |
2014年 | 68篇 |
2013年 | 160篇 |
2012年 | 121篇 |
2011年 | 135篇 |
2010年 | 115篇 |
2009年 | 104篇 |
2008年 | 142篇 |
2007年 | 111篇 |
2006年 | 91篇 |
2005年 | 85篇 |
2004年 | 61篇 |
2003年 | 63篇 |
2002年 | 59篇 |
2001年 | 36篇 |
2000年 | 38篇 |
1999年 | 38篇 |
1998年 | 66篇 |
1997年 | 47篇 |
1996年 | 32篇 |
1995年 | 36篇 |
1994年 | 37篇 |
1993年 | 28篇 |
1992年 | 17篇 |
1991年 | 14篇 |
1990年 | 18篇 |
1989年 | 23篇 |
1988年 | 25篇 |
1987年 | 14篇 |
1986年 | 16篇 |
1985年 | 20篇 |
1984年 | 33篇 |
1983年 | 21篇 |
1982年 | 24篇 |
1981年 | 16篇 |
1980年 | 18篇 |
1979年 | 11篇 |
1978年 | 19篇 |
1977年 | 14篇 |
1976年 | 22篇 |
1975年 | 16篇 |
1974年 | 19篇 |
1972年 | 10篇 |
排序方式: 共有2392条查询结果,搜索用时 15 毫秒
991.
OBJECTIVES: The goal of this study was to determine whether older adults are placed at a unique disadvantage in identifying emotions at small image sizes. BACKGROUND: Technologies relevant to older adults often display small images, though no studies have examined whether these systems are usable for this population. Given the importance of successful emotional processing, we draw on research showing age-related difficulties in processing negative emotions to examine older adults' performance on images with reduced sizes. METHODS: Sixty participants, 20 in each age group, were shown the names of emotions, followed by a facial expression, and were asked to indicate as rapidly as possible if they matched. RESULTS: For response time we found an interaction of age and window size, showing that older adults, unlike younger adults, are slower with small sizes than with large sizes. For accuracy, we found an interaction of age and emotion, indicating that older adults are less accurate in the perception of fearful, sad, and surprised stimuli. CONCLUSIONS: Only older adults are disadvantaged by smaller images. Also, interactions of age and emotion reflect older adults' difficulty processing negative emotions. APPLICATIONS: Our results have implications for the design of videoconferencing technology and mobile systems and extend previous research on aging and emotion. 相似文献
992.
Davis Leah McHenry Neil Carrera Manuel Brady Lauren Mayorga Kevin Balthazor Brock Gomez Israel Chamitoff Gregory Diaz-Artiles Ana 《Virtual Reality》2022,26(2):559-570
Virtual Reality - During extravehicular activities (EVAs), astronauts are heavily dependent on the Mission Center (MCC) and their Intra-Vehicular Astronaut (IVA) counterparts. Each procedure step... 相似文献
993.
994.
995.
Neil B. Harrison Author Vitae Paris Avgeriou Author Vitae 《Journal of Systems and Software》2010,83(10):1735-1758
Software architecture designers inevitably work with both architecture patterns and tactics. Architecture patterns describe the high-level structure and behavior of software systems as the solution to multiple system requirements, whereas tactics are design decisions that improve individual quality attribute concerns. Tactics that are implemented in existing architectures can have significant impact on the architecture patterns in the system. Similarly, tactics that are selected during initial architecture design significantly impact the architecture of the system to be designed: which patterns to use, and how they must be changed to accommodate the tactics. However, little is understood about how patterns and tactics interact. In this paper, we develop a model for the interaction of patterns and tactics that enables software architects to annotate architecture diagrams with information about the tactics used and their impact on the overall structure. This model is based on our in-depth analysis of the types of interactions involved, and we show several examples of how the model can be used to annotate different kinds of architecture diagrams. We illustrate the model and annotation by showing examples taken from real systems, and describe how the annotation was used in architecture reviews. Tactics and patterns are known architectural concepts; this work provides more specific and in-depth understanding of how they interact. Its other key contribution is that it explores the larger problem of understanding the relation between strategic decisions and how they need to be tailored in light of more tactical decisions. 相似文献
996.
Older Adults Talk Technology: Technology Usage and Attitudes 总被引:2,自引:0,他引:2
Mitzner TL Boron JB Fausset CB Adams AE Charness N Czaja SJ Dijkstra K Fisk AD Rogers WA Sharit J 《Computers in human behavior》2010,26(6):1710-1721
Older adults (n = 113) participated in focus groups discussing their use of and attitudes about technology in the context of their home, work, and healthcare. Participants reported using a wide variety of technology items, particularly in their homes. Positive attitudes (i.e., likes) outnumbered negative attitudes (i.e., dislikes), suggesting that older adults perceive the benefits of technology use to outweigh the costs of such use. Positive attitudes were most frequently related to how the technology supported activities, enhanced convenience, and contained useful features. Negative attitudes were most frequently associated with technology creating inconveniences, unhelpful features, as well as security and reliability concerns. Given that older adults reported more positive than negative attitudes about the technologies they use, these results contradict stereotypes that older adults are afraid or unwilling to use technology. These findings also highlight the importance of perceived benefits of use and ease of use for models of technology acceptance. Emphasizing the benefits of technology in education and training programs may increase future technology adoption. 相似文献
997.
Graph-based malware detection using dynamic analysis 总被引:1,自引:0,他引:1
Blake Anderson Daniel Quist Joshua Neil Curtis Storlie Terran Lane 《Journal in Computer Virology》2011,7(4):247-258
We introduce a novel malware detection algorithm based on the analysis of graphs constructed from dynamically collected instruction
traces of the target executable. These graphs represent Markov chains, where the vertices are the instructions and the transition
probabilities are estimated by the data contained in the trace. We use a combination of graph kernels to create a similarity
matrix between the instruction trace graphs. The resulting graph kernel measures similarity between graphs on both local and
global levels. Finally, the similarity matrix is sent to a support vector machine to perform classification. Our method is
particularly appealing because we do not base our classifications on the raw n-gram data, but rather use our data representation to perform classification in graph space. We demonstrate the performance
of our algorithm on two classification problems: benign software versus malware, and the Netbull virus with different packers
versus other classes of viruses. Our results show a statistically significant improvement over signature-based and other machine
learning-based detection methods. 相似文献
998.
Neil D. Jones Markus Müller-Olm 《International Journal on Software Tools for Technology Transfer (STTT)》2011,13(6):491-493
This special section features six papers concerned with state-of-the-art research in verification, model checking, and abstract
interpretation; three research areas that share the goal to provide mathematically well-founded techniques for sound semantic
analysis of computer systems. While each area takes a particular view on this problem, there is a growing awareness that a
closer collaboration is fruitful and in the last decade methods that combine ideas from different areas have been developed.
The papers in this special section are carefully revised and extended versions of articles that have first been presented
at the VMCAI 2009 conference. 相似文献
999.
Neil Hanley Michael Tunstall William P. Marnane 《International Journal of Information Security》2011,10(4):255-266
Since side channel analysis was introduced as a method to recover secret information from an otherwise secure cryptosystem,
many countermeasures have been proposed to prevent leakage from secure devices. Among these countermeasures is side channel
atomicity that makes operations indistinguishable using side channel analysis. In this paper, we present practical results
of an attack on RSA signature generation, protected in this manner, based on the expected difference in Hamming weight between
the result of a multiplication and a squaring operation. This work presents the first attack that we are aware of where template
analysis can be used without requiring an open device to characterize an implementation of a given cryptographic algorithm.
Moreover, an attacker does not need to know the plaintexts being operated on and, therefore, blinding and padding countermeasures
applied to the plaintext do not hinder the attack in anyway. 相似文献
1000.
This study examines the character of developing anabranched channel networks on the River Wear, north England, using metre‐scale aerial LiDAR. DSM‐DTM interpretation reveals a well‐developed vegetation structure and a locally diverse terrain, dominated by an interlinked channel network split by low‐elevation depositional areas with the gross morphology of the reach resembling that of a strongly active meandering/wandering channel suggesting that an anabranching network may develop within systems that were initially active meandering and wandering, evolving in line with floodplain vegetative succession. Utilization of the LiDAR DEM in the hydrological component of the CAESAR‐Lisflood (version 1.4) morphodynamic model has generated local hydraulic variable estimates through the anabranched reaches for a range of flows. These data clearly demonstrate how elevated flows are transferred out of the primary channel and distributed along the interconnected secondary channel network, creating a diverse set of hydraulic environments. Areas between the channels rapidly become inundated as flows increase, dissipating flow energy. Shear stress estimates throughout the study site reveal a generally reduced ability to mobilize sediments and erode channel margins, in comparison with a single‐thread reach immediately downstream. Anabranched secondary channels appear to operate in disequilibrium and act predominantly as aggradational zones, although with some evidence of scour at channel bifurcation and confluence points. It would appear that the topographic character of anabranching sites efficiently manages flood flow energy, activating secondary channels and low‐elevation areas to distribute flood flows. These findings contrast with the hydraulic data from an adjacent single‐thread reach, characterized by flood flows concentrated in‐channel creating a high erosive potential. We propose that anabranching rivers could play an important role in natural flood and sediment management in many U.K. river systems. 相似文献