全文获取类型
收费全文 | 1613篇 |
免费 | 54篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 38篇 |
综合类 | 1篇 |
化学工业 | 213篇 |
金属工艺 | 31篇 |
机械仪表 | 47篇 |
建筑科学 | 99篇 |
矿业工程 | 1篇 |
能源动力 | 52篇 |
轻工业 | 63篇 |
水利工程 | 2篇 |
石油天然气 | 2篇 |
无线电 | 303篇 |
一般工业技术 | 233篇 |
冶金工业 | 294篇 |
原子能技术 | 15篇 |
自动化技术 | 291篇 |
出版年
2023年 | 9篇 |
2022年 | 17篇 |
2021年 | 25篇 |
2020年 | 12篇 |
2019年 | 13篇 |
2018年 | 33篇 |
2017年 | 17篇 |
2016年 | 14篇 |
2015年 | 24篇 |
2014年 | 30篇 |
2013年 | 90篇 |
2012年 | 40篇 |
2011年 | 77篇 |
2010年 | 71篇 |
2009年 | 75篇 |
2008年 | 82篇 |
2007年 | 72篇 |
2006年 | 61篇 |
2005年 | 67篇 |
2004年 | 56篇 |
2003年 | 73篇 |
2002年 | 38篇 |
2001年 | 53篇 |
2000年 | 47篇 |
1999年 | 42篇 |
1998年 | 123篇 |
1997年 | 58篇 |
1996年 | 40篇 |
1995年 | 45篇 |
1994年 | 28篇 |
1993年 | 33篇 |
1992年 | 24篇 |
1991年 | 18篇 |
1990年 | 29篇 |
1989年 | 29篇 |
1988年 | 25篇 |
1987年 | 11篇 |
1986年 | 9篇 |
1985年 | 8篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 9篇 |
1981年 | 3篇 |
1980年 | 7篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 9篇 |
1976年 | 10篇 |
1974年 | 2篇 |
1973年 | 5篇 |
排序方式: 共有1685条查询结果,搜索用时 15 毫秒
101.
This study was initiated to examine the feasibility of providing multimedia mail, in particular video mail, on the existing World Wide Web platform. In this instance, the Web browser will act as the user agent of the mailing system. With this, users will be able to compose, send and read video mail directly on the Web. This paper examines a number of possible system architectures that can be employed for the development of video mail. Based on the following key issues: portability of system, flexibility of system, Internet standard support, security and authentication, and message compression and storage, a final architecture was selected to build video mail. The approach taken is that the system will be interfaced to the Web using a standard HyperText Transfer Protocol (HTTP) server and a standard Web browser. This is achieved through the use of Common Gateway Interface (CGI) programs and forms which reside in a standard HTTP server to provide the functionality of video mail, and a separate mail server for the storage and management of messages. This will cause the HTTP server to behave as if it is an electronic mail (E-mail) system. Video mail has been successfully implemented at the School of Applied Science, Nanyang Technological University, Singapore. The development work has been carried out on a Sun SPARC5 workstation and the Typhoon relational database system was used to construct the mail server. All software codes were written in C or C++. A video capturing application used in conjunction with a SunVideo card has been developed for video and audio recording. The paper also addresses implementation issues pertaining to the use of CGI programs, mail server development, and video and audio management. 相似文献
102.
Massively multiplayer online role‐playing game (MMORPG) addiction presents a serious issue worldwide and has attracted increasing attention from academic and other public communities. This article addresses this critical issue and fills research gaps by proposing and testing a research model of MMORPG addiction. Building on the conceptual foundation of the hedonic management model of addiction and the technology affordance perspective, we develop a research model explaining how MMORPG affordances (ie, achievement, social and immersion affordances) are associated with the duality of hedonic effects (ie, perceived positive mood enhancement and perceived negative mood reduction) and the extent of MMORPG addiction. Using structural equation modelling, we empirically test our research model with 406 MMORPG players. The results show that both perceived positive mood enhancement and perceived negative mood reduction positively correlate with the extent of MMORPG addiction. Furthermore, achievement and immersion affordances are positively associated with the duality of hedonic effects, whereas social affordance is not. Our study contributes to the growing body of technology addiction literature by revealing the relationships between the two hedonic effects and the extent of MMORPG addiction, and by offering a contextualised explanation of the role of MMORPG affordances in these relationships. We offer an alternative perspective on the far‐reaching, unintended relationships between technological affordances and addictive technology use. Our study provides game developers and policymakers with insights into preventing MMORPG addiction to create an entertaining, healthy virtual playground. 相似文献
103.
Ka Cheung Sia Junghoo Cho Hyun-Kyu Cho 《Knowledge and Data Engineering, IEEE Transactions on》2007,19(7):950-961
Recently, there has been a dramatic increase in the use of XML data to deliver information over the Web. Personal Weblogs, news Web sites, and discussion forums are now publishing RSS feeds for their subscribers to retrieve new postings. As the popularity of personal Weblogs and RSS feeds grows rapidly, RSS aggregation services and blog search engines have appeared, which try to provide a central access point for simpler access and discovery of new content from a large number of diverse RSS sources. In this paper, we study how the RSS aggregation services should monitor the data sources to retrieve new content quickly using minimal resources and to provide its subscribers with fast news alerts. We believe that the change characteristics of RSS sources and the general user access behavior pose distinct requirements that make this task significantly different from the traditional index refresh problem for Web search engines. Our studies on a collection of 10,000 RSS feeds reveal some general characteristics of the RSS feeds and show that, with proper resource allocation and scheduling, the RSS aggregator provides news alerts significantly faster than the best existing approach. 相似文献
104.
As a joint effort between the Chinese Academy of Sciences and the Hong Kong University of Science and Technology, the BLOSSOMS sensor network project aims to identify research issues at all levels from practical applications down to the design of sensor nodes. In this project, a heterogeneous sensor array including different types of application-dependent sensors as well as monitoring sensors and intruding sensors are being developed. Application-dependent power-aware communication protocols are also being studied for communications among sensor nodes. An ontology-based middleware is built to relieve the burden of application developers from collecting, classifying and processing messy sensing contexts. This project is also developing a set of tools allowing researchers to model, simulate/emulate, analyze, and monitor various functions of sensor networks. 相似文献
105.
This paper addresses the information-modeling issue for SAIL 1, an integrated shopfloor manufacturing system with flexible manufacturing and material-handling capabilities at the City University of Hong Kong. Based on analyses of the system configuration and information flow structure of SAIL 1, this paper presents a data-modeling strategy to model its information system from the system-physical configuration, system-operation control and system-operation monitoring, respectively. By using the IDEF1x methodology to abstract, classify and define the information objects and the interrelationships between them, three semantic data models were constructed in accordance with the system requirements and modeling strategy, from which the internal and external schemata of the SAIL 1 information system can be derived correspondingly. 相似文献
106.
Shing Chi Cheung Kramer J. 《IEEE transactions on pattern analysis and machine intelligence》1994,20(8):579-593
Automated behavior analysis is a valuable technique in the development and maintenance of distributed systems. In this paper, we present a tractable dataflow analysis technique for the detection of unreachable states and actions in distributed systems. The technique follows an approximate approach described by Reif and Smolka, but delivers a more accurate result in assessing unreachable states and actions. The higher accuracy is achieved by the use of two concepts: action dependency and history sets. Although the technique does not exhaustively detect all possible errors, it detects nontrivial errors with a worst-case complexity quadratic to the system size. It can be automated and applied to systems with arbitrary loops and nondeterministic structures. The technique thus provides practical and tractable behavior analysis for preliminary designs of distributed systems. This makes it an ideal candidate for an interactive checker in software development tools. The technique is illustrated with case studies of a pump control system and an erroneous distributed program. Results from a prototype implementation are presented 相似文献
107.
Automatic generation of artistic chinese calligraphy 总被引:1,自引:0,他引:1
Chinese calligraphy is among the finest and most important of all Chinese art forms and an inseparable part of Chinese history. Its delicate aesthetic effects are generally considered to be unique among all calligraphic arts. Its subtle power is integral to traditional Chinese painting. A novel intelligent system uses a constraint-based analogous-reasoning process to automatically generate original Chinese calligraphy that meets visually aesthetic requirements. We propose an intelligent system that can automatically create novel, aesthetically appealing Chinese calligraphy from a few training examples of existing calligraphic styles. To demonstrate the proposed methodology's feasibility, we have implemented a prototype system that automatically generates new Chinese calligraphic art from a small training set. 相似文献
108.
Area and test time are two major overheads encountered during data path high level synthesis for BIST.This paper presents an approach to behavioral synthesis for loop-based BIST.y taking into account the requirements of the BIST scheme during behavioral synthesis processes,an area optimal BIST solution can be obtained.This approach is based on the use of test resources reusability that results in a fewer number of registers being modified to be test registers.This is achieved by incorporating self-testability constraints during register assignment operations.Experimental results on benchmarks are presented to demonstrate the effectiveness of the approach. 相似文献
109.
Similarity search is a core module of many data analysis tasks, including search by example, classification, and clustering. For time series data, Dynamic Time Warping (DTW) has been proven a very effective similarity measure, since it minimizes the effects of shifting and distortion in time. However, the quadratic cost of DTW computation to the length of the matched sequences makes its direct application on databases of long time series very expensive. We propose a technique that decomposes the sequences into a number of segments and uses cheap approximations thereof to compute fast lower bounds for their warping distances. We present several, progressively tighter bounds, relying on the existence or not of warping constraints. Finally, we develop an index and a multi-step technique that uses the proposed bounds and performs two levels of filtering to efficiently process similarity queries. A thorough experimental study suggests that our method consistently outperforms state-of-the-art methods for DTW similarity search. 相似文献
110.
C.F. Cheung W.B. Lee W.M. Wang Y. Wang W.M. Yeung 《Expert systems with applications》2011,38(5):5245-5258
Management of unstructured information, such as emails, is vital for supporting knowledge work in professional services. However, the conventional way for managing unstructured information is inadequate as the knowledge work and associated tasks are becoming more complex, are dynamically changing with time and involve multiple concepts. This paper attempts to address the inadequacy, deficiency and limitations of the methods presently used to elicit knowledge from masses of unstructured information. These methods rely heavily on manpower, are time consuming and costly. With the development of a multi-faceted and automatic knowledge elicitation system (MAKES) manpower, time and cost can be dramatically reduced. The MAKES integrates the processes of collecting data, classifying unstructured information, modelling knowledge flow and social network analysis, and makes all of these actions into a connected process to audit unstructured information automatically. This audit is based on specific search criteria, search keywords, and the user behaviours of the knowledge workers. The unstructured information is automatically organized, classified and presented in a multi-facet taxonomy map. New concepts and knowledge are uncovered, analyzed and updated continuously from the incoming unstructured information, using a purpose-built knowledge elicitation algorithm named self-associated concept mapping (SACM). The capability and advantages of the MAKES are demonstrated through a successful trial implementation and a verification test conducted in an electronics trading company. Encouraging results have been achieved and a number of potential advantages have been realized. The area of application in this first deployment is based on an email-intensive organization and the proposed study will contribute to the advancement of methods and tools for managing other kinds of unstructured information. 相似文献