全文获取类型
收费全文 | 2933篇 |
免费 | 66篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 38篇 |
综合类 | 1篇 |
化学工业 | 387篇 |
金属工艺 | 53篇 |
机械仪表 | 47篇 |
建筑科学 | 89篇 |
矿业工程 | 7篇 |
能源动力 | 39篇 |
轻工业 | 322篇 |
水利工程 | 16篇 |
石油天然气 | 6篇 |
无线电 | 200篇 |
一般工业技术 | 360篇 |
冶金工业 | 1022篇 |
原子能技术 | 17篇 |
自动化技术 | 398篇 |
出版年
2022年 | 18篇 |
2021年 | 31篇 |
2020年 | 32篇 |
2019年 | 35篇 |
2018年 | 37篇 |
2017年 | 36篇 |
2016年 | 33篇 |
2015年 | 32篇 |
2014年 | 47篇 |
2013年 | 122篇 |
2012年 | 79篇 |
2011年 | 111篇 |
2010年 | 88篇 |
2009年 | 77篇 |
2008年 | 102篇 |
2007年 | 110篇 |
2006年 | 94篇 |
2005年 | 66篇 |
2004年 | 67篇 |
2003年 | 67篇 |
2002年 | 68篇 |
2001年 | 45篇 |
2000年 | 54篇 |
1999年 | 70篇 |
1998年 | 243篇 |
1997年 | 156篇 |
1996年 | 107篇 |
1995年 | 71篇 |
1994年 | 67篇 |
1993年 | 74篇 |
1992年 | 38篇 |
1991年 | 30篇 |
1990年 | 29篇 |
1989年 | 37篇 |
1988年 | 27篇 |
1987年 | 25篇 |
1986年 | 28篇 |
1985年 | 39篇 |
1984年 | 26篇 |
1983年 | 30篇 |
1982年 | 39篇 |
1981年 | 30篇 |
1980年 | 36篇 |
1979年 | 25篇 |
1978年 | 22篇 |
1977年 | 24篇 |
1976年 | 46篇 |
1975年 | 23篇 |
1972年 | 12篇 |
1963年 | 13篇 |
排序方式: 共有3002条查询结果,搜索用时 15 毫秒
31.
Machine Learning - Mapping data from and/or onto a known family of distributions has become an important topic in machine learning and data analysis. Deep generative models (e.g., generative... 相似文献
32.
This paper examines the dynamics of entrepreneurial acquisitions undertaken by UK high growth small and medium enterprises (SMEs). While entrepreneurial acquisitions are increasingly deployed by SMEs, little is known about their antecedents, motivational drivers and organisational outcomes. Drawing on detailed case study evidence from Scotland, the key factor found to be driving these acquisitions was the desire to augment and exploit technological complementarities between the acquiring and acquired firms. Acquisition can therefore be conceptualised as an advanced stage of the outside-in ‘open innovation’ strategies proactively used within these innovative SMEs. Firms executing this strategy typically have an acute propensity for risk, a desire for close customer engagement, effective business models and strong external orientation. The work suggests that greater attention should be paid within M&A theory to the dynamics of these types of smaller scale entrepreneurial acquisitions. 相似文献
33.
Detecting Periods of Significant Increased Communication Levels for Subgroups of Targeted Individuals 下载免费PDF全文
Ross Sparks 《Quality and Reliability Engineering International》2016,32(5):1871-1888
This paper investigates detecting significant increases in communication patterns and levels between small groups of individuals within a moderate‐size targeted group. Potential applications range from trying to establish emerging thought leaders within an organisation to the detection of the planning stages of a crime. The scan statistic is a popular choice for monitoring and detecting spatio‐temporal outbreaks, but it is difficult to apply to large‐scale target groups because of the computational effort required. When monitoring communication levels between thousands of people, the number of combinations of people whose communication may have increased is very high, and to scan through all of these to find which combinations have increased communications significantly is an enormous task. A successful surveillance plan will have early communication outbreak detection properties and good diagnostic capabilities for identifying individuals contributing to this outbreak. This paper proposes a new computationally feasible approach for detecting communication outbreaks based on exponentially weighted moving average smoothed communication counts between individuals within the network. We apply a cumulative sum of ordered signal‐to‐noise (SN) ratios for communication counts to flag significant departures from their respective median values. This plan is demonstrated to be efficient at detecting changes in communication levels for a small part of the network and diagnosing who is involved in the outbreak. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
34.
D. A. Ross 《Virtual Reality》1998,3(3):212-221
People who are totally blind or who have vevere visual impairments (e.g. less than 20/200 acuity, central macular scotomas, or advanced diabetic retinopathy) see the environment in a fashion that may be completely foreign to those who operate in a very visual fashion. For this population, the visual complexity of the environment is not a concern. What is of concern are salient features found within the environment that relate to their ability to navigate successfully in, and/or interact with, the environment as needed. Toward the purpose of representing these salient features in comprehensive form, investigators at the Atlanta Veterans Affairs Research and Development Center are employing wearable computer technology to develop a virtual environment interface. The long-range goal is to create a simplistic virtual representation of the environment that includes only features related to the current navigational task and/or interactive needs of the person. In a completed study, the use of digital infrared transmitters as beacons representing salient features of the environment was explored. The purpose of a current study now in progress is to evaluate and compare various user interface structures that were suggested by subjects during the preliminary study. The problem of interest in the current study is street-crossing; however, the results of this research should be applicable to many other problems, including identifying and locating building entrances, and identifying, locating and interacting with electronic devices such as information kiosks, automated teller machines, and self-serve point-of-sale terminals. The long-range result desired is a wearable computer with which one can easily identify and interact with a wide variety of devices in the environment via one familiar, easy-to-use interface. 相似文献
35.
Essential role of beta-adrenergic receptor kinase 1 in cardiac development and function 总被引:1,自引:0,他引:1
36.
Maxine M. Denniston Nancy D. Brener Laura Kann Danice K. Eaton Timothy McManus Tonja M. Kyle Alice M. Roberts Katherine H. Flint James G. Ross 《Computers in human behavior》2010
The Youth Risk Behavior Surveillance System (YRBSS) monitors priority health-risk behaviors among US high school students. To better understand the ramifications of changing the YRBSS from paper-and-pencil to Web administration, in 2008 the Centers for Disease Control and Prevention conducted a study comparing these two modes of administration. Eighty-five schools in 15 states agreed to participate in the study. Within each participating school, four classrooms of students in grades 9 or 10 were randomly assigned to complete the Youth Risk Behavior Survey questionnaire in one of four conditions (in-class paper-and-pencil, in-class Web without programmed skip patterns, in-class Web with programmed skip patterns, and “on your own” Web without programmed skip patterns). Findings included less missing data for the paper-and-pencil condition (1.5% vs. 5.3%, 4.4%, 6.4%; p < .001), less perceived privacy and anonymity among respondents for the in-class Web conditions, and a lower response rate for the “on your own” Web condition than for in-class administration by either mode (28.0% vs. 91.2%, 90.1%, 91.4%; p < .001). Although Web administration might be useful for some surveys, these findings do not favor the use of a Web survey for the YRBSS. 相似文献
37.
Benson?L.?Joeris Min?Chih?LinEmail author Ross?M.?McConnell Jeremy?P.?Spinrad Jayme?L.?Szwarcfiter 《Algorithmica》2011,59(2):215-239
A circular-arc model ℳ is a circle C together with a collection
A\mathcal{A}
of arcs of C. If
A\mathcal{A}
satisfies the Helly Property then ℳ is a Helly circular-arc model. A (Helly) circular-arc graph is the intersection graph
of a (Helly) circular-arc model. Circular-arc graphs and their subclasses have been the object of a great deal of attention
in the literature. Linear-time recognition algorithms have been described both for the general class and for some of its subclasses.
However, for Helly circular-arc graphs, the best recognition algorithm is that by Gavril, whose complexity is O(n
3). In this article, we describe different characterizations for Helly circular-arc graphs, including a characterization by
forbidden induced subgraphs for the class. The characterizations lead to a linear-time recognition algorithm for recognizing
graphs of this class. The algorithm also produces certificates for a negative answer, by exhibiting a forbidden subgraph of
it, within this same bound. 相似文献
38.
Microprocessors continue on the relentless path to provide more performance. Every new innovation in computing-distributed computing on the Internet, data mining, Java programming, and multimedia data streams-requires more cycles and computing power. Even traditional applications such as databases and numerically intensive codes present increasing problem sizes that drive demand for higher performance. Design innovations, compiler technology, manufacturing process improvements, and integrated circuit advances have been driving exponential performance increases in microprocessors. To continue this growth in the future, Hewlett Packard and Intel architects examined barriers in contemporary designs and found that instruction-level parallelism (ILP) can be exploited for further performance increases. This article examines the motivation, operation, and benefits of the major features of IA-64. Intel's IA-64 manual provides a complete specification of the IA-64 architecture 相似文献
39.
Information uncertainty is inherent in many problems and is often subtle and complicated to understand. Although visualization is a powerful means for exploring and understanding information, information uncertainty visualization is ad hoc and not widespread. This paper identifies two main barriers to the uptake of information uncertainty visualization: firstly, the difficulty of modeling and propagating the uncertainty information; and secondly, the difficulty of mapping uncertainty to visual elements. To overcome these barriers, we extend the spreadsheet paradigm to encapsulate uncertainty details within cells. This creates an inherent awareness of the uncertainty associated with each variable. The spreadsheet can hide the uncertainty details, enabling the user to think simply in terms of variables. Furthermore, the system can aid with automated propagation of uncertainty information, since it is intrinsically aware of the uncertainty. The system also enables mapping the encapsulated uncertainty to visual elements via the formula language and a visualization sheet. Support for such low-level visual mapping provides flexibility to explore new techniques for information uncertainty visualization. 相似文献
40.
The aim of the present study was to investigate the effect of social networking sites (SNSs) engagement on cognitive and social skills. We investigated the use of Facebook, Twitter, and YouTube in a group of young adults and tested their working memory, attentional skills, and reported levels of social connectedness. Results showed that certain activities in Facebook (such as checking friends’ status updates) and YouTube (telling a friend to watch a video) predicted working memory test performance. The findings also indicated that Active and Passive SNS users had qualitatively different profiles of attentional control. The Active SNS users were more accurate and had fewer misses of the target stimuli in the first block of trials. They also did not discriminate their attentional resources exclusively to the target stimuli and were less likely to ignore distractor stimuli. Their engagement with SNS appeared to be exploratory and they assigned similar weight to incoming streams of information. With respect to social connectedness, participants’ self-reports were significantly related to Facebook use, but not Twitter or YouTube use, possibly as the result of greater opportunity to share personal content in the former SNS. 相似文献