全文获取类型
收费全文 | 2175篇 |
免费 | 176篇 |
国内免费 | 14篇 |
专业分类
电工技术 | 26篇 |
综合类 | 11篇 |
化学工业 | 507篇 |
金属工艺 | 57篇 |
机械仪表 | 55篇 |
建筑科学 | 35篇 |
矿业工程 | 3篇 |
能源动力 | 59篇 |
轻工业 | 160篇 |
水利工程 | 7篇 |
石油天然气 | 25篇 |
无线电 | 350篇 |
一般工业技术 | 434篇 |
冶金工业 | 235篇 |
原子能技术 | 4篇 |
自动化技术 | 397篇 |
出版年
2024年 | 9篇 |
2023年 | 17篇 |
2022年 | 32篇 |
2021年 | 52篇 |
2020年 | 46篇 |
2019年 | 62篇 |
2018年 | 41篇 |
2017年 | 62篇 |
2016年 | 73篇 |
2015年 | 60篇 |
2014年 | 97篇 |
2013年 | 196篇 |
2012年 | 114篇 |
2011年 | 128篇 |
2010年 | 114篇 |
2009年 | 122篇 |
2008年 | 92篇 |
2007年 | 112篇 |
2006年 | 89篇 |
2005年 | 62篇 |
2004年 | 60篇 |
2003年 | 41篇 |
2002年 | 52篇 |
2001年 | 41篇 |
2000年 | 35篇 |
1999年 | 47篇 |
1998年 | 79篇 |
1997年 | 55篇 |
1996年 | 55篇 |
1995年 | 26篇 |
1994年 | 30篇 |
1993年 | 32篇 |
1992年 | 20篇 |
1991年 | 38篇 |
1990年 | 22篇 |
1989年 | 19篇 |
1988年 | 17篇 |
1987年 | 9篇 |
1986年 | 6篇 |
1985年 | 13篇 |
1984年 | 4篇 |
1983年 | 11篇 |
1982年 | 8篇 |
1981年 | 10篇 |
1980年 | 6篇 |
1979年 | 6篇 |
1978年 | 6篇 |
1977年 | 5篇 |
1976年 | 11篇 |
1973年 | 6篇 |
排序方式: 共有2365条查询结果,搜索用时 15 毫秒
101.
Behavior‐based detection and signature‐based detection are two popular approaches to malware (malicious software) analysis. The security industry, such as the sector selling antivirus tools, has been using signature and heuristic‐based technologies for years. However, this approach has been proven to be inefficient in identifying unknown malware strains. On the other hand, the behavior‐based malware detection approach has a greater potential in identifying previously unknown instances of malicious software. The accuracy of this approach relies on techniques to profile and recognize accurate behavior models. Unfortunately, with the increasing complexity of malicious software and limitations of existing automatic tools, the current behavior‐based approach cannot discover many newer forms of malware either. In this paper, we implement ‘holography platform’, a behavior‐based profiler on top of a virtual machine emulator that intercepts the system processes and analyzes the CPU instructions, CPU registers, and memory. The captured information is stored in a relational database, and data mining techniques are used to extract information. We demonstrate the breadth of the ‘holography platform’ by conducting two experiments: a packed binary behavior analysis and a malvertising (malicious advertising) incident tracing. Both tasks are known to be very difficult to do efficiently using existing methods and tools. We demonstrate how the precise behavior information can be easily obtained using the ‘holography platform’ tool. With these two experiments, we show that the ‘holography platform’ can provide security researchers and automatic malware detection systems with an efficient malicious software behavior analysis solution. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
102.
Shaio Yan Huang Chi-Chen Lin An-An Chiu David C. Yen 《Information Systems Frontiers》2017,19(6):1343-1356
The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CVR (content validity ratio) values do not meet the criteria. Further, the remaining 32 factors are reviewed by experts to be the measurements suitable for the assessment of fraud detection. The Analytic Hierarchy Process (AHP) is utilized to determine the relative weights of the individual items. The result of AHP shows that the most important dimension is Pressure/Incentive and the least one is Attitude/rationalization. In addition, the top five important measurements are “Poor performance”, “The need for external financing”, “Financial distress”, “Insufficient board oversight”, and “Competition or market saturation”. The result provides a significant advantage to auditors and managers in enhancing the efficiency of fraud detection and critical evaluation. 相似文献
103.
A distributed admission control model for QoS assurance in large-scale media delivery systems 总被引:1,自引:0,他引:1
Xia Z. Hao W. Yen I.-L. Li P. 《Parallel and Distributed Systems, IEEE Transactions on》2005,16(12):1143-1153
Conventional admission control models incur some performance penalty. First, admission control computation can overload a server that is already heavily loaded. Also, in large-scale media systems with geographically distributed server clusters, performing admission control on each cluster can result in long response latency, if the client request is denied at one site and has to be forwarded to another site. Furthermore, in prefix caching, initial frames cached at the proxy are delivered to the client before the admission decisions are made. If the media server is heavily loaded and, finally, has to deny the client request, forwarding a large number of initial frames is a waste of critical network resources. In this paper, a novel distributed admission control model is presented. We make use of proxy servers to perform the admission control tasks. Each proxy hosts an agent to coordinate the effort. Agents reserve media server's disk bandwidth and make admission decisions autonomously based on the allocated disk bandwidth. We develop an effective game theoretic framework to achieve fairness in the bandwidth allocation among the agents. To improve the overall bandwidth utilization, we also consider an aggressive admission control policy where each agent may admit more requests than its allocated bandwidth allows. The distributed admission control approach provides the solution to the stated problems incurred in conventional admission control models. Experimental studies show that our algorithms significantly reduce the response latency and the media server load. 相似文献
104.
Resolution enhanced light field near eye display using e‐shifting method with birefringent plate 下载免费PDF全文
Jui‐Yi Wu Ping‐Yen Chou Kuei‐En Peng Yi‐Pai Huang Hsin‐Hsiang Lo Chuan‐Chung Chang Fu‐Ming Chuang 《Journal of the Society for Information Display》2018,26(5):269-279
Light field near eye displays (LFNED) can produce lightweight devices and address the accommodation–convergence conflict. However, low spatial resolution creates a poor immersive experience in LFNED. In addition, although many e‐shifting devices have been proposed to enhance resolution in projection system, yet those devices are too bulky to be applied in an LFNED to keep it lightweight. In this paper, a compact e‐shifting component is proposed to enhance image resolution in an LFNED by using a birefringent plate and twisted nematic switch cell. The proposed e‐shifting device is a flat and thin component with only 2.6 mm of thickness, which could be placed in the gap of an LFNED without increasing the thickness. The results show that the proposed components could be easily integrated in an LFNED with the result of resolution enhancement. 相似文献
105.
The purpose of mining frequent itemsets is to identify the items in groups that always appear together and exceed the user-specified threshold of a transaction database. However, numerous frequent itemsets may exist in a transaction database, hindering decision making. Recently, the mining of frequent closed itemsets has become a major research issue because sets of frequent closed itemsets are condensed yet complete representations of frequent itemsets. Therefore, all frequent itemsets can be derived from a group of frequent closed itemsets. Nonetheless, the number of transactions in a transaction database can increase rapidly in a short time period, and a number of the transactions may be outdated. Thus, frequent closed itemsets may be changed with the addition of new transactions or the deletion of old transactions from the transaction database. Updating previously closed itemsets when transactions are added or removed from the transaction database is challenging. This study proposes an efficient algorithm for incrementally mining frequent closed itemsets without scanning the original database. The proposed algorithm updates closed itemsets by performing several operations on the previously closed itemsets and added/deleted transactions without searching the previously closed itemsets. The experimental results show that the proposed algorithm significantly outperforms previous methods, which require a substantial length of time to search previously closed itemsets. 相似文献
106.
C.-H. Lin H. Yang F.-Y. Chang S.-H. Chang M.-T. Yen 《Microsystem Technologies》2008,14(9-11):1263-1267
The presented paper describes a novel process using inkjet printing to pattern a conformal (built-on) mask onto photoresist for further microstructure formation. The advantages of using the inkjet printing conformal mask include no Cr photomask required, suitable for non-planar substrate, scalable for large area, and extreme low cost. The ink is ejected from the inkjet print-head controlled by the inkjet system. A CAD pattern from the designer can use this process to place the pattern ink onto the photoresist substrate. A conformal mask (made of ink) was directly built-on the photoresist substrate. The dried ink thickness has to be more than 1.8 μm thick as UV absorber. Following UV exposure, development, and ink removal, the designed microstructure patterns can be realized in photoresist such as microchannels and micro-columns. 相似文献
107.
We adapted a model in organizational theory to determine whether organizational citizenship behaviors (OCBs) of system implementation teams influenced that organization's integration climate and improved their project management, resulting in successful system implementation. Surveys were elicited from 254 system users in various business organizations that had implemented large-scale IS in the previous year; the analysis of their responses provided support for our model, suggesting that the OCB of the implementation team created a higher level of integration climate and more effective project management, and that these in turn influenced information system success. Implications for researchers and managers are discussed and limitations are identified. 相似文献
108.
Bilateral teleoperation systems provide a platform for human operators to remotely manipulate slave robots in engaging various tasks in remote environments. Most of the previous studies in bilateral teleoperation were developed under continuous transmission or periodic communication with fixed data exchanging rates. This paper presents control schemes for bilateral teleoperation systems using nonperiodic event‐driven communication. By using P‐like and PD‐like controllers, this study proposes triggering conditions for teleoperators to reduce network access frequency so that robots only transmit output signals when necessary. Stability and position tracking of the control system are studied, and nonzero minimum interevent time is guaranteed. The proposed event‐driven teleoperation is studied with a velocity estimator to avoid the requirement of velocity information in the controller and triggering condition. Without velocity measurements, the boundedness of tracking errors and stability are ensured for teleoperation systems under event‐driven communication. Simulations and experiments are illustrated to validate the performance of the proposed event‐driven teleoperation systems. 相似文献
109.
A hybrid approach to modeling metabolic systems using a geneticalgorithm and simplex method 总被引:13,自引:0,他引:13
Yen J. Liao J.C. Bogju Lee Randolph D. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》1998,28(2):173-191
One of the main obstacles in applying genetic algorithms (GA's) to complex problems has been the high computational cost due to their slow convergence rate. We encountered such a difficulty in our attempt to use the classical GA for estimating parameters of a metabolic model. To alleviate this difficulty, we developed a hybrid approach that combines a GA with a stochastic variant of the simplex method in function optimization. Our motivation for developing the stochastic simplex method is to introduce a cost-effective exploration component into the conventional simplex method. In an attempt to make effective use of the simplex operation in a hybrid GA framework, we used an elite-based hybrid architecture that applies one simplex step to a top portion of the ranked population. We compared our approach with five alternative optimization techniques including a simplex-GA hybrid independently developed by Renders-Bersini (R-B) and adaptive simulated annealing (ASA). Our empirical evaluations showed that our hybrid approach for the metabolic modeling problem outperformed all other techniques in terms of accuracy and convergence rate. We used two additional function optimization problems to compare our approach with the five alternative methods. 相似文献
110.
Jack J. Domet III T.M. Rajkumar Domet III David Yen 《Information Systems Management》1994,11(4):39-45
The realization of digital multimedia's full business potential requires networking. This article discusses the value-added benefits to the corporation of networked multimedia as well as the choice of architectures and technologies needed to deliver multimedia networking solutions. 相似文献