全文获取类型
收费全文 | 5011篇 |
免费 | 118篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 128篇 |
综合类 | 8篇 |
化学工业 | 1234篇 |
金属工艺 | 148篇 |
机械仪表 | 97篇 |
建筑科学 | 283篇 |
矿业工程 | 28篇 |
能源动力 | 107篇 |
轻工业 | 481篇 |
水利工程 | 57篇 |
石油天然气 | 11篇 |
无线电 | 339篇 |
一般工业技术 | 644篇 |
冶金工业 | 960篇 |
原子能技术 | 79篇 |
自动化技术 | 531篇 |
出版年
2021年 | 71篇 |
2019年 | 57篇 |
2018年 | 47篇 |
2017年 | 57篇 |
2016年 | 69篇 |
2015年 | 73篇 |
2014年 | 104篇 |
2013年 | 209篇 |
2012年 | 138篇 |
2011年 | 214篇 |
2010年 | 137篇 |
2009年 | 144篇 |
2008年 | 178篇 |
2007年 | 148篇 |
2006年 | 153篇 |
2005年 | 120篇 |
2004年 | 107篇 |
2003年 | 104篇 |
2002年 | 119篇 |
2001年 | 72篇 |
2000年 | 76篇 |
1999年 | 85篇 |
1998年 | 172篇 |
1997年 | 138篇 |
1996年 | 107篇 |
1995年 | 95篇 |
1994年 | 80篇 |
1993年 | 75篇 |
1992年 | 56篇 |
1991年 | 55篇 |
1990年 | 70篇 |
1989年 | 66篇 |
1988年 | 56篇 |
1987年 | 64篇 |
1986年 | 60篇 |
1985年 | 71篇 |
1984年 | 68篇 |
1983年 | 66篇 |
1982年 | 60篇 |
1981年 | 50篇 |
1980年 | 50篇 |
1979年 | 53篇 |
1978年 | 69篇 |
1977年 | 76篇 |
1976年 | 93篇 |
1975年 | 69篇 |
1974年 | 69篇 |
1973年 | 80篇 |
1972年 | 58篇 |
1971年 | 54篇 |
排序方式: 共有5135条查询结果,搜索用时 15 毫秒
101.
102.
The smart car seat: personalized monitoring of vital signs in automotive applications 总被引:1,自引:1,他引:0
Marian Walter Benjamin Eilebrecht Tobias Wartzek Steffen Leonhardt 《Personal and Ubiquitous Computing》2011,15(7):707-715
Embedded wireless sensors are important components of mobile distributed computing networks, and one of the target applications
areas is health care. The preservation of mobility for senior citizens is one of the key issues in maintaining an independent
lifestyle. Thus health technologies inside a car can contribute both to safety issues (supervision of driver fitness) as well
as healthcare issues by monitoring vitals signs imperceptibly. In this paper, three embedded measurement techniques for non-contact
monitoring of vital signals have been investigated. Specifically, capacitive electrocardiogram (cECG) monitoring, mechanical
movement analysis (ballistocardiogram, BCG) using piezo-foils and inductive impedance monitoring were examined regarding their
potential for integration into car seats. All three sensing techniques omit the need for electroconductive contact to the
human body, but require defined mechanical boundary conditions (stable distances or, in the case of BCG, frictional connection).
The physical principles of operation, the specific boundary conditions regarding automotive integration and the results during
wireless operation in a running car are presented. All three sensors were equipped with local intelligence by incorporating
a microcontroller. To eliminate the need for additional cabling, a wireless Bluetooth communication module was added and used
to transmit data to a measurement PC. Finally, preliminary results obtained during test drives on German city roads and highways
are discussed. 相似文献
103.
Yves Younan Pieter Philippaerts Frank Piessens Wouter Joosen Sven Lachmund Thomas Walter 《Journal in Computer Virology》2011,7(3):173-188
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacker then triggers a bug in the application to divert the control flow to this injected machine code. A typical action of the injected code is to launch a command interpreter shell, and hence the malicious input is often called shellcode. Attacks are usually performed against network facing applications, and such applications often perform validations or encodings on input. Hence, a typical hurdle for attackers, is that the shellcode has to pass one or more filtering methods before it is stored in the vulnerable application??s memory space. Clearly, for a code injection attack to succeed, the malicious input must survive such validations and transformations. Alphanumeric input (consisting only of letters and digits) is typically very robust for this purpose: it passes most filters and is untouched by most transformations. This paper studies the power of alphanumeric shellcode on the ARM architecture. It shows that the subset of ARM machine code programs that (when interpreted as data) consist only of alphanumerical characters is a Turing complete subset. This is a non-trivial result, as the number of instructions that consist only of alphanumeric characters is very limited. To craft useful exploit code (and to achieve Turing completeness), several tricks are needed, including the use of self-modifying code. 相似文献
104.
Andreas Holzinger Markus Baernthaler Walter Pammer Herman Katz Vesna Bjelic-Radisic Martina Ziefle 《International journal of human-computer studies》2011,69(9):563-570
IntroductionAll hospitals in the province of Styria (Austria) are well equipped with sophisticated Information Technology, which provides all-encompassing on-screen patient information. Previous research made on the theoretical properties, advantages and disadvantages, of reading from paper vs. reading from a screen has resulted in the assumption that reading from a screen is slower, less accurate and more tiring. However, recent flat screen technology, especially on the basis of LCD, is of such high quality that obviously this assumption should now be challenged. As the electronic storage and presentation of information has many advantages in addition to a faster transfer and processing of the information, the usage of electronic screens in clinics should outperform the traditional hardcopy in both execution and preference ratings.This study took part in a County hospital Styria, Austria, with 111 medical professionals, working in a real-life setting. They were each asked to read original and authentic diagnosis reports, a gynecological report and an internal medical document, on both screen and paper in a randomly assigned order. Reading comprehension was measured by the Chunked Reading Test, and speed and accuracy of reading performance was quantified. In order to get a full understanding of the clinicians' preferences, subjective ratings were also collected.ResultsWilcoxon Signed Rank Tests showed no significant differences on reading performance between paper vs. screen. However, medical professionals showed a significant (90%) preference for reading from paper. Despite the high quality and the benefits of electronic media, paper still has some qualities which cannot provided electronically do date. 相似文献
105.
Walter Lang Frank Jakobs Elena Tolstosheeva Hannes Sturm Azat Ibragimov Antonia Kesel Dirk Lehmhus Ursula DickeAuthor vitae 《Sensors and actuators. A, Physical》2011,171(1):3-11
Ubiquitous computing is about to become part of our everyday lives by integrating hundreds of “invisible” to us computing devices in our environment, so that they can unobtrusively and constantly assist us. This will imply more and smaller “invisible” sensors, homogeneously distributed and at the same time densely packed in host materials, responding to various stimuli and immediately delivering information. In order to reach this aim, the embedded sensors should be integrated within the host material, heading towards sensorial materials. The first step is to omit all parts that are not needed for the sensorial task and to find new solutions for a gentle integration. This is what we call function scale integration. The paper discusses sensor embedding in the human hand as an example of integration in nature, new technological applications and main challenges associated with this approach. 相似文献
106.
Walter Chen 《电子技术应用》2009,35(11)
目前,所有顶尖视频显示板生产商都在使用不同色彩像素尺寸的LED视频显示模块,结构相似但又各具特色。将Maxim独特的LED视频显示技术应用于这一领域,推出了MAX6974 LED驱动器,并结合低成本、中等规模的FPGA芯片提供了一个基于LED视频显示板的参考设计。 相似文献
107.
Virtual execution environments, such as the Java virtual machine, promote platform‐independent software development. However, when it comes to analyzing algorithm complexity and performance bottlenecks, available tools focus on platform‐specific metrics, such as the CPU time consumption on a particular system. Other drawbacks of many prevailing profiling tools are high overhead, significant measurement perturbation, as well as reduced portability of profiling tools, which are often implemented in platform‐dependent native code. This article presents a novel profiling approach, which is entirely based on program transformation techniques, in order to build a profiling data structure that provides calling‐context‐sensitive program execution statistics. We explore the use of platform‐independent profiling metrics in order to make the instrumentation entirely portable and to generate reproducible profiles. We implemented these ideas within a Java‐based profiling tool called JP. A significant novelty is that this tool achieves complete bytecode coverage by statically instrumenting the core runtime libraries and dynamically instrumenting the rest of the code. JP provides a small and flexible API to write customized profiling agents in pure Java, which are periodically activated to process the collected profiling information. Performance measurements point out that, despite the presence of dynamic instrumentation, JP causes significantly less overhead than a prevailing tool for the profiling of Java code. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
108.
Ahmed Fadl Zongqin Zhang Sebastian Geller Jonas Tölke Manfred Krafczyk Donna Meyer 《Microsystem Technologies》2009,15(9):1379-1387
The efficiency of the valve-less rectification micropump depends primarily on the microfluidic diodicity (the ratio of the
backward pressure drop to the forward pressure drop). In this study, different rectifying structures, including the conventional
structures (nozzle/diffuser and Tesla structures), were investigated at very low Reynolds numbers (between 0.2 and 60). The
rectifying structures were characterized with respect to their design, and a numerical approach was illustrated to calculate
the diodicity for the rectifying structures. In this study, the microfluidic diodicity was evaluated numerically for different
rectifying structures including half circle, semicircle, heart, triangle, bifurcation, nozzle/diffuser, and Tesla structures.
The Lattice Boltzmann Method (LBM) was utilized as a numerical method to simulate the fluid flow in the microscale. The results
suggest that at very low Reynolds number flow, rectification and multifunction micropumping may be achievable by using a number
of the presented structures. The results for the conventional structures agree with the reported results. 相似文献
109.
Bytecode instrumentation is a widely used technique to implement aspect weaving and dynamic analyses in virtual machines such as the Java virtual machine. Aspect weavers and other instrumentations are usually developed independently and combining them often requires significant engineering effort, if at all possible. In this article, we present polymorphic bytecode instrumentation(PBI), a simple but effective technique that allows dynamic dispatch amongst several, possibly independent instrumentations. PBI enables complete bytecode coverage, that is, any method with a bytecode representation can be instrumented. We illustrate further benefits of PBI with three case studies. First, we describe how PBI can be used to implement a comprehensive profiler of inter‐procedural and intra‐procedural control flow. Second, we provide an implementation of execution levels for AspectJ, which avoids infinite regression and unwanted interference between aspects. Third, we present a framework for adaptive dynamic analysis, where the analysis to be performed can be changed at runtime by the user. We assess the overhead introduced by PBI and provide thorough performance evaluations of PBI in all three case studies. We show that pure Java profilers like JP2 can, thanks to PBI, produce accurate execution profiles by covering all code, including the core Java libraries. We then demonstrate that PBI‐based execution levels are much faster than control flow pointcuts to avoid interference between aspects and that their efficient integration in a practical aspect language is possible. Finally, we report that PBI enables adaptive dynamic analysis tools that are more reactive to user inputs than existing tools that rely on dynamic aspect‐oriented programming with runtime weaving. These experiments position PBI as a widely applicable and practical approach for combining bytecode instrumentations. © 2015 The Authors. Software: Practice and Experience Published by John Wiley & Sons Ltd. 相似文献
110.
Aibek Sarimbekov Lukas Stadler Lubomír Bulej Andreas Sewe Andrej Podzimek Yudi Zheng Walter Binder 《Software》2016,46(8):1053-1089
Originally developed with a single language in mind, the JVM is now targeted by numerous programming languages—its automatic memory management, just‐in‐time compilation, and adaptive optimizations—making it an attractive execution platform. However, the garbage collector, the just‐in‐time compiler, and other optimizations and heuristics were designed primarily with the performance of Java programs in mind. Consequently, many of the languages targeting the JVM, and especially the dynamically typed languages, are suffering from performance problems that cannot be simply solved at the JVM side. In this article, we aim to contribute to the understanding of the character of the workloads imposed on the JVM by both dynamically typed and statically typed JVM languages. To this end, we introduce a new set of dynamic metrics for workload characterization, along with an easy‐to‐use toolchain to collect the metrics. We apply the toolchain to applications written in six JVM languages (Java, Scala, Clojure, Jython, JRuby, and JavaScript) and discuss the findings. Given the recently identified importance of inlining for the performance of Scala programs, we also analyze the inlining behavior of the HotSpot JVM when executing bytecode originating from different JVM languages. As a result, we identify several traits in the non‐Java workloads that represent potential opportunities for optimization. © 2015 The Authors. Software: Practice and Experience Published by John Wiley & Sons Ltd. 相似文献