全文获取类型
收费全文 | 3201篇 |
免费 | 77篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 27篇 |
综合类 | 2篇 |
化学工业 | 568篇 |
金属工艺 | 84篇 |
机械仪表 | 67篇 |
建筑科学 | 188篇 |
矿业工程 | 5篇 |
能源动力 | 92篇 |
轻工业 | 296篇 |
水利工程 | 15篇 |
石油天然气 | 11篇 |
无线电 | 150篇 |
一般工业技术 | 481篇 |
冶金工业 | 825篇 |
原子能技术 | 21篇 |
自动化技术 | 451篇 |
出版年
2021年 | 41篇 |
2020年 | 15篇 |
2019年 | 28篇 |
2018年 | 25篇 |
2017年 | 36篇 |
2016年 | 45篇 |
2015年 | 40篇 |
2014年 | 72篇 |
2013年 | 184篇 |
2012年 | 93篇 |
2011年 | 145篇 |
2010年 | 101篇 |
2009年 | 97篇 |
2008年 | 130篇 |
2007年 | 135篇 |
2006年 | 121篇 |
2005年 | 130篇 |
2004年 | 82篇 |
2003年 | 91篇 |
2002年 | 100篇 |
2001年 | 55篇 |
2000年 | 48篇 |
1999年 | 74篇 |
1998年 | 217篇 |
1997年 | 138篇 |
1996年 | 111篇 |
1995年 | 71篇 |
1994年 | 78篇 |
1993年 | 58篇 |
1992年 | 44篇 |
1991年 | 32篇 |
1990年 | 35篇 |
1989年 | 46篇 |
1988年 | 35篇 |
1987年 | 23篇 |
1986年 | 34篇 |
1985年 | 41篇 |
1984年 | 25篇 |
1983年 | 25篇 |
1982年 | 38篇 |
1981年 | 30篇 |
1980年 | 23篇 |
1979年 | 30篇 |
1978年 | 24篇 |
1977年 | 37篇 |
1976年 | 47篇 |
1975年 | 20篇 |
1974年 | 14篇 |
1973年 | 19篇 |
1971年 | 14篇 |
排序方式: 共有3283条查询结果,搜索用时 15 毫秒
51.
Previous research has identified user concerns about biometric authentication technology, but most of this research has been
conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in
other cultures. To address this issue, data from India, South Africa and the United Kingdom were collected and compared. Cross-cultural
attitudinal differences were seen, with Indian respondents viewing biometrics most positively while respondents from the United
Kingdom were the least likely to have a positive opinion about biometrics. Multiple barriers to the acceptance of biometric
technology were identified with data security and health and safety fears having the greatest overall impact on respondents’
attitudes towards biometrics. The results of this investigation are discussed with reference to Hofstede’s cultural dimensions
and theories of technology acceptance. It is argued that contextual issues specific to each country provide a better explanation
of the results than existing theories based on Hofstede’s model. We conclude that cultural differences have an impact on the
way biometric systems will be used and argue that these factors should be taken into account during the design and implementation
of biometric systems. 相似文献
52.
The personal lift-assist device and lifting technique: a principal component analysis 总被引:1,自引:0,他引:1
The personal lift-assist device (PLAD) is a non-motorised, on-body device that acts as an external force generator using the concept of stored elastic energy. In this study, the effect of the PLAD on the lifting kinematics of male and female lifters was investigated using principal component analysis. Joint kinematic data of 15 males and 15 females were collected using an opto-electronic system during a freestyle, symmetrical-lifting protocol with and without wearing the PLAD. Of the 31 Principal Components (PCs) retained in the models, eight scores were significantly different between the PLAD and no-PLAD conditions. There were no main effects for gender and no significant interactions. Results indicated that the PLAD similarly affected the lifting kinematics of males and females; demonstrating significantly less lumbar and thoracic flexion and significantly greater hip and ankle flexion when wearing the PLAD. These findings add to the body of work that suggest the PLAD may be a safe and effective ergonomic aid. STATEMENT OF RELEVANCE: The PLAD is an ergonomic aid that has been shown to be effective at reducing low back demands during manual materials handling tasks. This body of work establishes that the PLAD encourages safe lifting practices without adversely affecting lifting technique. 相似文献
53.
Jeong Eun Min Matthew D. WhitesideFiona S.L. Brinkman Brad McNeneyJinko Graham 《Computational statistics & data analysis》2011,55(1):935-943
Orthologs are genes in different species that have diverged from a common ancestral gene after speciation. In contrast, paralogs are genes that have diverged after a gene duplication event. For many comparative analyses, it is of interest to identify orthologs with similar functions. Such orthologs tend to support species divergence (ssd-orthologs) in the sense that they have diverged only due to speciation, to the same relative degree as their species. However, due to incomplete sequencing or gene loss in a species, predicted orthologs can sometimes be paralogs or other non-ssd-orthologs. To increase the specificity of ssd-ortholog prediction, Fulton et al. [Fulton, D., Li, Y., Laird, M., Horsman, B., Roche, F., Brinkman, F., 2006. Improving the specificity of high-throughput ortholog prediction. BMC Bioinformatics 7 (1), 270] developed Ortholuge, a bioinformatics tool that identifies predicted orthologs with atypical genetic divergence. However, when the initial list of putative orthologs contains a non-negligible number of non-ssd-orthologs, the cut-off values that Ortholuge generates for orthology classification are difficult to interpret and can be too high, leading to decreased specificity of ssd-ortholog prediction. Therefore, we propose a complementary statistical approach to determining cut-off values. A benefit of the proposed approach is that it gives the user an estimated conditional probability that a predicted ortholog pair is unusually diverged. This enables the interpretation and selection of cut-off values based on a direct measure of the relative composition of ssd-orthologs versus non-ssd-orthologs. In a simulation comparison of the two approaches, we find that the statistical approach provides more stable cut-off values and improves the specificity of ssd-ortholog prediction for low-quality data sets of predicted orthologs. 相似文献
54.
There are now a variety of Web bots or spiders available to scour the Web to automatically gather information. Bots, sometimes called agents when they are instructed to perform particular searches, are useful in performing the time-consuming and repetitive searches required to gather comparison data or to find an elusive item. In some cases, agents can not only find information but can make a purchase or take another action based on the data they collect. Although bots are great for consumers, some Internet retailers hate them. Just as a brick and mortar store wants potential customers to walk in the door, Web retailers want potential customers to personally view their sites. Once there, consumers might purchase the initial products they were seeking and then see advertisements or buy accessories, upgrades, or unrelated additional items as well. Because bots can reduce or eliminate these possibilities, some Internet retailers are trying to stop them. It's one thing to be upset about bots, spiders, agents, and data miners, but it is quite another to put an end to the practice. It should come as no surprise that federal and state laws in the US do not expressly mention bots. Those seeking to challenge their use must resort to a variety of more generic laws, none of which fit very well 相似文献
55.
N. A. Stanton C. Baber G. H. Walker R. J. Houghton R. McMaster R. Stewart D. Harris D. Jenkins M. S. Young P. M. Salmon 《Cognition, Technology & Work》2008,10(3):209-220
This paper reports on five different models of command and control. Four different models are reviewed: a process model, a
contextual control model, a decision ladder model and a functional model. Further to this, command and control activities
are analysed in three distinct domains: armed forces, emergency services and civilian services. From this analysis, taxonomies
of command and control activities are developed that give rise to an activities model of command and control. This model will
be used to guide further research into technological support of command and control activities. 相似文献
56.
David-A. Mendels Emmelyn M. Graham Steven W. Magennis Anita C. Jones François Mendels 《Microfluidics and nanofluidics》2008,5(5):603-617
The development and adoption of lab-on-a-chip and micro-TAS (total analysis system) techniques requires not only the solving
of design and manufacturing issues, but also the introduction of reliable and quantitative methods of analysis. In this work,
two complementary tools are applied to the study of thermal and solutal transport in liquids. The experimental determination
of the concentration of water in a water–methanol mixture and of the temperature of water in a microfluidic T-mixer are achieved
by means of fluorescence lifetime imaging microscopy (FLIM). The results are compared to those of finite volume simulations
based on tabulated properties and well-established correlations for the fluid properties. The good correlation between experimental
and modelled results demonstrate without ambiguity that (1) the T-mixer is an adiabatic system within the conditions, fluids
and flow rates used in this study, (2) buoyancy effects influence the mixing of liquids of different densities at moderate
flow rates (Reynolds number Re ≪ 10−2), and (3) the combination of FLIM and computational fluid dynamics has the potential to be used to measure the thermal and
solutal diffusion coefficients of fluids for a range of temperatures and concentrations in one single experiment. As such,
it represents a first step towards the full-field monitoring of both the extent and the kinetics of a chemical reaction.
相似文献
David-A. MendelsEmail: |
57.
On the removal of shadows from images 总被引:3,自引:0,他引:3
Finlayson GD Hordley SD Lu C Drew MS 《IEEE transactions on pattern analysis and machine intelligence》2006,28(1):59-68
This paper is concerned with the derivation of a progression of shadow-free image representations. First, we show that adopting certain assumptions about lights and cameras leads to a 1D, gray-scale image representation which is illuminant invariant at each image pixel. We show that as a consequence, images represented in this form are shadow-free. We then extend this 1D representation to an equivalent 2D, chromaticity representation. We show that in this 2D representation, it is possible to relight all the image pixels in the same way, effectively deriving a 2D image representation which is additionally shadow-free. Finally, we show how to recover a 3D, full color shadow-free image representation by first (with the help of the 2D representation) identifying shadow edges. We then remove shadow edges from the edge-map of the original image by edge in-painting and we propose a method to reintegrate this thresholded edge map, thus deriving the sought-after 3D shadow-free image. 相似文献
58.
Benjamin S. Kirk John W. Peterson Roy H. Stogner Graham F. Carey 《Engineering with Computers》2006,22(3-4):237-254
In this paper we describe the libMesh (http://libmesh.sourceforge.net) framework for parallel adaptive finite element applications. libMesh is an open-source software library that has been developed to facilitate serial and parallel simulation of multiscale, multiphysics applications using adaptive mesh refinement and coarsening strategies. The main software development is being carried out in the CFDLab (http://cfdlab.ae.utexas.edu) at the University of Texas, but as with other open-source software projects; contributions are being made elsewhere in the US and abroad. The main goals of this article are: (1) to provide a basic reference source that describes libMesh and the underlying philosophy and software design approach; (2) to give sufficient detail and references on the adaptive mesh refinement and coarsening (AMR/C) scheme for applications analysts and developers; and (3) to describe the parallel implementation and data structures with supporting discussion of domain decomposition, message passing, and details related to dynamic repartitioning for parallel AMR/C. Other aspects related to C++ programming paradigms, reusability for diverse applications, adaptive modeling, physics-independent error indicators, and similar concepts are briefly discussed. Finally, results from some applications using the library are presented and areas of future research are discussed. 相似文献
59.
Intelligent agents can play a pivotal role in providing both software systems and augmented interfaces, to individual users from all walks of life, to utilise the Internet 24 h a day, 7 days a week (24×7), including interaction with other users, over both wireless and broadband infrastructures. However, traditional approaches to user modelling are not adequate for this purpose, as they mainly account for a generic, approximate, idealised user. New user models are therefore required to be adaptable for each individual and flexible enough to represent the diversity of all users using information technology. Such models should be able to cover all aspects of an individual’s life—those aspects of most interest to the individual user themselves. This paper describes a novel intelligent agent architecture and methodology both called ShadowBoard, based on a complex user model drawn from analytical psychology. An equally novel software tool, called the DigitalFriend based on ShadowBoard, is also introduced. This paper illustrates how aspects of user cognition can be outsourced, using, for example, an internationalised book price quoting agent. The Locales Framework from Computer Supported Co-operative Work is then used to understand the problematic aspects of interaction involved in complex social spaces, identifying specific needs for technology intervention in such social spaces, and to understand how interactions amongst mobile users with different abilities might be technically assisted in such spaces. In this context, the single user-centred multi-agent technology demonstrated in the DigitalFriend is adapted to a multi-user system dubbed ShadowPlaces. The aim of ShadowPlaces is to outsource some of the interaction necessary, for a group of mobile individuals with different abilities to interact cooperatively and effectively in a social world, supported by wireless networks and backed by broadband Internet services. An overview of the user model, the architecture and methodology (ShadowBoard) and the resulting software tool (the DigitalFriend) is presented, and progress on ShadowPlaces—the multi-user version—is outlined.
相似文献
Connor GrahamEmail: |
60.
Graham Wheeler 《Network Security》2000,2000(8):6
Denial-of-service (DoS) attacks have been around for a long time. In the computer network arena, DoS attacks usually take one of two forms: 1) exploiting bugs in network clients or server applications, in an attempt to crash the application (and possibly the host on which it is running) or 2) flooding a network server with fake traffic, making it difficult or impossible for the server to receive and process legitimate traffic. The former are typically carried out by using ‘buffer overrun attacks’ in which a network application is sent a large amount of data which it fails to handle properly, instead overwriting critical information with the excess data. 相似文献