全文获取类型
收费全文 | 3261篇 |
免费 | 183篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 23篇 |
综合类 | 4篇 |
化学工业 | 851篇 |
金属工艺 | 29篇 |
机械仪表 | 55篇 |
建筑科学 | 122篇 |
矿业工程 | 10篇 |
能源动力 | 131篇 |
轻工业 | 522篇 |
水利工程 | 35篇 |
石油天然气 | 9篇 |
无线电 | 278篇 |
一般工业技术 | 462篇 |
冶金工业 | 80篇 |
原子能技术 | 34篇 |
自动化技术 | 802篇 |
出版年
2024年 | 4篇 |
2023年 | 40篇 |
2022年 | 128篇 |
2021年 | 159篇 |
2020年 | 91篇 |
2019年 | 108篇 |
2018年 | 117篇 |
2017年 | 121篇 |
2016年 | 153篇 |
2015年 | 103篇 |
2014年 | 192篇 |
2013年 | 279篇 |
2012年 | 263篇 |
2011年 | 263篇 |
2010年 | 200篇 |
2009年 | 202篇 |
2008年 | 181篇 |
2007年 | 167篇 |
2006年 | 96篇 |
2005年 | 93篇 |
2004年 | 72篇 |
2003年 | 80篇 |
2002年 | 57篇 |
2001年 | 27篇 |
2000年 | 26篇 |
1999年 | 34篇 |
1998年 | 30篇 |
1997年 | 23篇 |
1996年 | 27篇 |
1995年 | 21篇 |
1994年 | 17篇 |
1993年 | 14篇 |
1992年 | 11篇 |
1991年 | 5篇 |
1990年 | 10篇 |
1989年 | 10篇 |
1988年 | 3篇 |
1987年 | 5篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1978年 | 4篇 |
排序方式: 共有3447条查询结果,搜索用时 0 毫秒
31.
Unai Diaz-Orueta Aitziber Etxaniz Mari Feli Gonzalez Cristina Buiza Elena Urdaneta Javier Yanguas 《Universal Access in the Information Society》2014,13(1):89-97
The complexity of new information technologies (IT) may limit the access of elderly people to the information society, exacerbating what is known as “the digital divide,” as they appear to be too challenging for elderly citizens regardless of the integrity of their cognitive status. This study is an attempt to clarify how some cognitive functions (such as attention or verbal memory) may determine the interaction of cognitively impaired elderly people with technology. Twenty participants ranging from mild cognitive impairment to moderate Alzheimer’s disease were assessed by means of a neuropsychological and functional battery and were asked to follow simple commands from an avatar appearing on a TV by means of a remote control, such as asking the participant to confirm their presence or to respond Yes/No to a proposal to see a TV program. The number of correct answers and command repetitions required for the user to respond were registered. The results show that participants with a better cognitive and functional state in specific tests show a significantly better performance in the TV task. The derived conclusion is that neuropsychological assessment may be used as a useful complementary tool for assistive technology developers in the adaptation of IT to the elderly with different cognitive and functional profiles. Further studies with larger samples are required to determine to what extent cognitive functions can actually predict older users’ interaction with technology. 相似文献
32.
Cristina Manresa-Yee Javier Varona Francisco J. Perales Iosune Salinas 《Universal Access in the Information Society》2014,13(4):471-482
This work focuses on camera-based systems that are designed for mouse replacement. Usually, these interfaces are based on computer vision techniques that capture the user’s face or head movements and are specifically designed for users with disabilities. The work identifies and reviews the key factors of these interfaces based on the lessons learnt by the authors’ experience and by a comprehensive analysis of the literature to describe the specific points to consider in their design. These factors are as follows: user features to track, initial user detection (calibration), position mapping, feedback, error recovery, event execution, profiles and ergonomics of the system. The work compiles the solutions offered by different systems to help new designers avoid problems already discussed by the others. 相似文献
33.
Andres T Aguayo Ana G Gayubo Ana M Tarrío Alaitz Atutxa Javier Bilbao 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》2002,77(2):211-216
With the aim of determining the possibilities of directly upgrading the liquid obtained from carbohydrate fermentation, the effect of operating conditions (temperature, space time, water content in the feed) has been studied in the catalytic transformation of aqueous ethanol into hydrocarbons on an HZSM‐5 zeolite in an isothermal fixed bed reactor. Special attention has been paid to the effect of water content on the yield, product distribution and catalyst deactivation. Although deactivation by coke decreases as the water content is increased, this content must be limited at 450 °C and higher temperatures in order to avoid irreversible deactivation of the catalyst by dealumination. © 2002 Society of Chemical Industry 相似文献
34.
Javier Prez-Ramírez 《Applied catalysis. B, Environmental》2007,70(1-4):31-35
European authorities consider that N2O emissions from nitric acid plants can be reduced to a large extent at a relatively low cost. Two regulation approaches can have major implications for the fertilizer industry in Europe. The EU integrated pollution prevention and control (IPPC) directive will be effective from October 2007 for existing plants. In this, emission permits will be based on best available techniques (BAT). Additionally, the EU commission will shortly consider whether the emission trading directive should be applicable to cover other greenhouse gases besides CO2. This paper discusses advantages and drawbacks of these approaches, with emphasis on how emission trading with N2O can be turned into a win–win situation both for European governments and for the fertilizer industry. 相似文献
35.
36.
Beatriz Pariente-Martinez Martin Gonzalez-Rodriguez Daniel Fernandez-Lanvin Javier De Andres-Suarez 《Universal Access in the Information Society》2016,15(2):237-247
The influence of aging on computer interaction has been widely analyzed in human–computer interaction research literature. Despite this, there are no age-based user maps that could support the user-interface customization. Studying the specific needs and constraints of these groups is crucial in order to adapt a user interface to the user’s interaction requirements. This work studies the performance of a sample of participants on three different basic tasks (pointing, dragging and dropping, and text selection) and the influence of age for each of them. It is concluded that this influence differs between specific activities. A group profile map that can support automatic classification in the future has been obtained. 相似文献
37.
Xavier Suau Javier Ruiz-Hidalgo Josep R. Casas 《Computer Vision and Image Understanding》2013,117(3):281-288
End-effectors are usually related to the location of limbs, and their reliable detection enables robust body tracking as well as accurate pose estimation. Recent innovation in depth cameras has re-stated the pose estimation problem. We focus on the information provided by these sensors, for which we borrow the name 2.5D data from the Graphics community. In this paper we propose a human pose estimation algorithm based on topological propagation. Geometric Deformable Models are used to carry out such propagation, implemented according to the Narrow Band Level Set approach. A variant of the latter method is proposed, including a density restriction which helps preserving the topological properties of the object under analysis. Principal end-effectors are extracted from a directed graph weighted with geodesic distances, also providing a skeletal-like structure describing human pose. An evaluation against reference methods is performed with promising results. The proposed solution allows a frame-wise end-effector detection, with no temporal tracking involved, which may be generalized to the tracking of other objects beyond human body. 相似文献
38.
Recent vehicular routing proposals use real-time road traffic density estimates to dynamically select forwarding paths. Estimating the traffic density in vehicular ad hoc networks requires the transmission of additional dedicated messages increasing the communications load. These proposals are generally based on unicast sender-based forwarding schemes. The greedy nature of sender-based forwarding can result in the selection of forwarders with weak radio links that might compromise the end-to-end performance. To overcome these limitations, this paper presents TOPOCBF, a novel contention-based broadcast forwarding protocol that dynamically selects forwarding paths based on their capability to route packets between anchor points. Such capability is estimated by means of a multi-hop connectivity metric. The obtained results demonstrate that TOPOCBF can provide good packet delivery ratios while reducing the communications load compared to unicast sender-based forwarding schemes using road traffic density estimates. 相似文献
39.
Basil Mohammed Al-Hadithi Antonio Javier Barragán José Manuel Andújar Agustín Jiménez 《Applied Soft Computing》2013,13(12):4802-4812
In this paper, a fuzzy based Variable Structure Control (VSC) with guaranteed stability is presented. The main objective is to obtain an improved performance of highly non-linear unstable systems. The main contribution of this work is that, firstly, new functions for chattering reduction and error convergence without sacrificing invariant properties are proposed, which is considered the main drawback of the VSC control. Secondly, the global stability of the controlled system is guaranteed.The well known weighting parameters approach, is used in this paper to optimize local and global approximation and modeling capability of T-S fuzzy model.A one link robot is chosen as a nonlinear unstable system to evaluate the robustness, effectiveness and remarkable performance of optimization approach and the high accuracy obtained in approximating nonlinear systems in comparison with the original T-S model. Simulation results indicate the potential and generality of the algorithm. The application of the proposed FLC-VSC shows that both alleviation of chattering and robust performance are achieved with the proposed FLC-VSC controller. The effectiveness of the proposed controller is proven infront of disturbances and noise effects. 相似文献
40.
In public key encryption schemes with a double decryption mechanism (DD-PKE), decryption can be done in either of two ways: by the user owning the secret/public key pair corresponding to the ciphertext, or by a trusted party holding a sort of master secret-key. In this note we argue that the classical security notion for standard public key encryption schemes does not suffice for DD-PKE schemes, and propose a new natural definition. Additionally, we illustrate the usefulness of the new security definition by showing that a DD-PKE scheme presented in the workshop Selected Areas in Cryptography 2005 is insecure under this augmented security notion. 相似文献