全文获取类型
收费全文 | 6855篇 |
免费 | 460篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 66篇 |
综合类 | 1篇 |
化学工业 | 1794篇 |
金属工艺 | 178篇 |
机械仪表 | 174篇 |
建筑科学 | 263篇 |
矿业工程 | 22篇 |
能源动力 | 266篇 |
轻工业 | 945篇 |
水利工程 | 41篇 |
石油天然气 | 42篇 |
无线电 | 496篇 |
一般工业技术 | 1508篇 |
冶金工业 | 245篇 |
原子能技术 | 58篇 |
自动化技术 | 1221篇 |
出版年
2024年 | 31篇 |
2023年 | 71篇 |
2022年 | 119篇 |
2021年 | 219篇 |
2020年 | 208篇 |
2019年 | 176篇 |
2018年 | 300篇 |
2017年 | 331篇 |
2016年 | 381篇 |
2015年 | 227篇 |
2014年 | 328篇 |
2013年 | 663篇 |
2012年 | 384篇 |
2011年 | 506篇 |
2010年 | 385篇 |
2009年 | 406篇 |
2008年 | 362篇 |
2007年 | 327篇 |
2006年 | 264篇 |
2005年 | 192篇 |
2004年 | 175篇 |
2003年 | 148篇 |
2002年 | 149篇 |
2001年 | 80篇 |
2000年 | 84篇 |
1999年 | 76篇 |
1998年 | 82篇 |
1997年 | 74篇 |
1996年 | 66篇 |
1995年 | 49篇 |
1994年 | 46篇 |
1993年 | 38篇 |
1992年 | 31篇 |
1991年 | 30篇 |
1990年 | 16篇 |
1989年 | 21篇 |
1988年 | 19篇 |
1987年 | 15篇 |
1986年 | 14篇 |
1985年 | 26篇 |
1984年 | 12篇 |
1983年 | 12篇 |
1982年 | 20篇 |
1981年 | 18篇 |
1980年 | 12篇 |
1979年 | 14篇 |
1978年 | 13篇 |
1977年 | 15篇 |
1976年 | 13篇 |
1974年 | 11篇 |
排序方式: 共有7320条查询结果,搜索用时 9 毫秒
71.
Jason M. Harley Cassia K. Carter Niki Papaionnou François Bouchet Ronald S. Landis Roger Azevedo Lana Karabachian 《User Modeling and User-Adapted Interaction》2016,26(2-3):177-219
The current study examined the relationships between learners’ (\(N = 123\)) personality traits, the emotions they typically experience while studying (trait studying emotions), and the emotions they reported experiencing as a result of interacting with four pedagogical agents (agent-directed emotions) in MetaTutor, an advanced multi-agent learning environment. Overall, significant relationships between a subset of trait emotions (trait anger, trait anxiety) and personality traits (agreeableness, conscientiousness, and neuroticism) were found for four agent-directed emotions (enjoyment, pride, boredom, and neutral) though the relationships differed between pedagogical agents. These results demonstrate that some trait emotions and personality traits can be used to predict learners’ emotions directed toward specific pedagogical agents (with different roles). Results provide suggestions for adapting pedagogical agents to support learners’ (with certain characteristics; e.g., high in neuroticism or agreeableness) experience of adaptive emotions (e.g., enjoyment) and minimize their experience on non-adaptive emotions (e.g., boredom). Such an approach presents a scalable and easily implementable method for creating emotionally-adaptive, agent-based learning environments, and improving learner-pedagogical agent interactions in order to support learning. 相似文献
72.
François Galasso Yves Ducq Matthieu Lauras Didier Gourc Mamadou Camara 《Journal of Intelligent Manufacturing》2016,27(1):217-229
Enterprise applications and software systems need to be interoperable in order to achieve seamless business across organizational boundaries and thus realize virtual networked organizations. Our proposition can be considered as an interoperability project selection approach and is based on three steps: (1) Modelling both collaborative business processes and potential related interoperability projects; (2) Evaluating the accessibility of each project regarding the current state of the organization; (3) Simulating each project and assessing the associated performance. These results are finally projected on a comparison matrix used as a decision support to select the most appropriate interoperability solution. An application case extracted from the French aerospace sector demonstrates the applicability and the benefits of the proposition. 相似文献
73.
Maria Eduarda Gonçalves 《Information & Communications Technology Law》2017,26(2):90-115
As the first broad reform of the EU data protection legislation is being achieved, and notwithstanding EU institutions’ confident discourse, scepticism remains about the reform’s ability to safeguard the fundamental right to data protection in the face of evolving data processing techniques underlying so-called big data. Yet, one might wonder whether the cause for this difficulty should be ascribed mainly to technological progresses that the law finds it hard to deal with or rather to the policy choices embedded in the legal reform itself. Indeed, a new data protection enforcement model is being adopted, which relies heavily on risk assessment and management by the data controllers themselves. Likewise, data protection authorities see their supervisory role significantly weakened. These developments and the underlying rationality are discussed. Given the limitations of the risk-based approach as currently devised, we suggest that it be reappraised in consideration of risk regulatory experiences in other domains. 相似文献
74.
Ahmad W. Bitar Rony Darazi Jean-François Couchot Raphaël Couturier 《Multimedia Tools and Applications》2017,76(1):143-161
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency. 相似文献
75.
Chaabouni Souad Benois-pineau Jenny Tison François Ben Amar Chokri Zemmari Akka 《Multimedia Tools and Applications》2017,76(21):22527-22546
Multimedia Tools and Applications - Studies of visual attention of patients with Dementia such as Parkinson’s Disease Dementia and Alzheimer Disease is a promising way for non-invasive... 相似文献
76.
Rui C. Gonçalves Don Batory João L. Sobral Taylor L. Riché 《Software and Systems Modeling》2017,16(4):929-947
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality. 相似文献
77.
This work introduces a new algorithm for surface reconstruction in ℝ3 from spatially arranged one-dimensional cross sections embedded in ℝ3. This is generally the case with acoustic signals that pierce an object non-destructively. Continuous deformations (homotopies)
that smoothly reconstruct information between any pair of successive cross sections are derived. The zero level set of the
resulting homotopy field generates the desired surface. Four types of homotopies are suggested that are well suited to generate
a smooth surface. We also provide derivation of necessary higher order homotopies that can generate a C
2 surface. An algorithm to generate surface from acoustic sonar signals is presented with results. Reconstruction accuracies
of the homotopies are compared by means of simulations performed on basic geometric primitives. 相似文献
78.
Since wavelets were introduced in the radiosity algorithm 5 , surprisingly little research has been devoted to higher order wavelets and their use in radiosity algorithms. A previous study 13 has shown that wavelet radiosity, and especially higher order wavelet radiosity was not bringing significant improvements over hierarchical radiosity and was having a very important extra memory cost, thus prohibiting any effective computation. In this paper, we present a new implementation of wavelets in the radiosity algorithm, that is substantially different from previous implementations in several key areas (refinement oracle, link storage, resolution algorithm). We show that, with this implementation, higher order wavelets are actually bringing an improvement over standard hierarchical radiosity and lower order wavelets. 相似文献
79.
Jean-François Monin 《Formal Methods in System Design》2000,17(3):221-243
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always fit with a well defined theoretical value. We present here the correctness proof of the algorithm standardized for the ATM transfer capability called ABR. The proof turned out to produce a key argument during the standardization process of ABR. 相似文献
80.
2 1/2 D Visual Servoing with Respect to Unknown Objects Through a New Estimation Scheme of Camera Displacement 总被引:9,自引:0,他引:9
Classical visual servoing techniques need a strong a priori knowledge of the shape and the dimensions of the observed objects. In this paper, we present how the 2 1/2 D visual servoing scheme we have recently developed, can be used with unknown objects characterized by a set of points. Our scheme is based on the estimation of the camera displacement from two views, given by the current and desired images. Since vision-based robotics tasks generally necessitate to be performed at video rate, we focus only on linear algorithms. Classical linear methods are based on the computation of the essential matrix. In this paper, we propose a different method, based on the estimation of the homography matrix related to a virtual plane attached to the object. We show that our method provides a more stable estimation when the epipolar geometry degenerates. This is particularly important in visual servoing to obtain a stable control law, especially near the convergence of the system. Finally, experimental results confirm the improvement in the stability, robustness, and behaviour of our scheme with respect to classical methods. 相似文献