全文获取类型
收费全文 | 188篇 |
免费 | 8篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 57篇 |
金属工艺 | 2篇 |
机械仪表 | 15篇 |
建筑科学 | 5篇 |
能源动力 | 4篇 |
轻工业 | 21篇 |
石油天然气 | 1篇 |
无线电 | 7篇 |
一般工业技术 | 21篇 |
冶金工业 | 20篇 |
自动化技术 | 40篇 |
出版年
2022年 | 4篇 |
2021年 | 8篇 |
2020年 | 6篇 |
2019年 | 2篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2015年 | 5篇 |
2014年 | 6篇 |
2013年 | 14篇 |
2012年 | 7篇 |
2011年 | 19篇 |
2010年 | 10篇 |
2009年 | 17篇 |
2008年 | 9篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 2篇 |
2004年 | 9篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 1篇 |
2000年 | 5篇 |
1999年 | 6篇 |
1998年 | 11篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1983年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有197条查询结果,搜索用时 10 毫秒
41.
Query rewriting using views is a technique that allows a query to be answered efficiently by using pre-computed materialized views. It has many applications, such as data caching, query optimization, schema integration, etc. This issue has been studied extensively for relational databases and, as a result, the technology is maturing. For XML data, however, the work is inadequate. Recently, several frameworks have been proposed for query rewriting using views for XPath queries, with the requirement that a rewriting must be complete. In this paper, we study the problem of query rewriting using views for XPath queries without requiring that the rewriting be complete. This will increase its applicability since in many cases, complete rewritings using views do not exist. We give formal definitions for various concepts to formulate the problem, and then propose solutions. Our solutions are built under the framework for query containment. We look into the problem from both theoretic perspectives, and algorithmic approaches. Two methods to generate rewritings using views are proposed, with different characteristics in terms of generalities and efficiencies. The maximality properties of the rewritings generated by these methods are discussed. 相似文献
42.
The authors examined the hypothesis that the interaction between the need for cognitive structure (NCS) and the ability to achieve cognitive structure (AACS) moderates the effect of stress on information processing. NCS is the preference for using cognitive structuring, as opposed to piecemeal processes, as a means to achieve certainty. AACS is the extent to which individuals are able to apply information processes that are consistent with their levels of NCS. The hypothesis was validated in 4 studies, which showed that stress increased high-AACS participants' use of cognitive structuring if they had high NCS and reduced it if they had low NCS. An opposite effect was found for low-AACS participants. The implications of these results for the understanding of the mechanisms responsible for the effect of stress on information processing are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
43.
Kevin Stephenson Rachel Amthor Sally Mallowa Rhoda Nungo Busie Maziya-Dixon Simon Gichuki Ada Mbanaso Mark Manary 《Nutrition journal》2010,9(1):9
Background
Inadequate protein intake is known to be deleterious in animals. Using WHO consensus documents for human nutrient requirements, the protein:energy ratio (P:E) of an adequate diet is > 5%. Cassava has a very low protein content. This study tested the hypothesis that Nigerian and Kenyan children consuming cassava as their staple food are at greater risk for inadequate dietary protein intake than those children who consume less cassava. 相似文献44.
Raymond Wong Jiuyong Li Ada Fu Ke Wang 《Journal of Intelligent Information Systems》2009,33(2):209-234
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated
model is necessary to protect the association of individuals to sensitive information. In this paper, we propose an (α, k)-anonymity model to protect both identifications and relationships to sensitive information in data. We discuss the properties
of (α, k)-anonymity model. We prove that the optimal (α, k)-anonymity problem is NP-hard. We first present an optimal global-recoding method for the (α, k)-anonymity problem. Next we propose two scalable local-recoding algorithms which are both more scalable and result in less
data distortion. The effectiveness and efficiency are shown by experiments. We also describe how the model can be extended
to more general cases. 相似文献
45.
The purpose of this study was to investigate the difference in the level of fatigue induced by high-speed maritime craft operation between the day- and night-shift officers. The demographic and work-related factors that contribute to fatigue were also explored. A total of 93 high-speed maritime craft officers participated in the survey, of whom 35 worked a day shift (Mean age=48.3 years) and 58 worked a night shift (Mean age=45.8 years). Fatigue experience was measured with the Chinese version of the Swedish Occupational Fatigue Inventory (SOFI-C) at the beginning, in the middle and at the end of the work shift. Information on age, work experience, perceived voyage difficulty and duty schedule was obtained. The study found that the night-shift officers seemed to manifest an overall higher level of perceived fatigue than the day-shift officers, while the day-shift officers demonstrated a fatigue carry-over effect across the two workdays. Besides the shift pattern, age, experience in operating high-speed maritime craft and perceived voyage difficulty were the significant factors contributing to the officers' fatigue experience. The finding that the fatigue experience associated with high-speed maritime craft operation has a rapid and accumulative nature suggests that different occupational safety and health guidelines should be devised for these two groups of officers. 相似文献
46.
Ming Hua Jian Pei Ada W. C. Fu Xuemin Lin Ho-Fung Leung 《The VLDB Journal The International Journal on Very Large Data Bases》2009,18(3):809-835
Finding typical instances is an effective approach to understand and analyze large data sets. In this paper, we apply the idea of typicality analysis from psychology and cognitive science to database query answering, and study the novel problem of answering top-k typicality queries. We model typicality in large data sets systematically. Three types of top-k typicality queries are formulated. To answer questions like “Who are the top-k most typical NBA players?”, the measure of simple typicality is developed. To answer questions like “Who are the top-k most typical guards distinguishing guards from other players?”, the notion of discriminative typicality is proposed. Moreover, to answer questions like “Who are the best k typical guards in whole representing different types of guards?”, the notion of representative typicality is used. Computing the exact answer to a top-k typicality query requires quadratic time which is often too costly for online query answering on large databases. We develop a series of approximation methods for various situations: (1) the randomized tournament algorithm has linear complexity though it does not provide a theoretical guarantee on the quality of the answers; (2) the direct local typicality approximation using VP-trees provides an approximation quality guarantee; (3) a local typicality tree data structure can be exploited to index a large set of objects. Then, typicality queries can be answered efficiently with quality guarantees by a tournament method based on a Local Typicality Tree. An extensive performance study using two real data sets and a series of synthetic data sets clearly shows that top-k typicality queries are meaningful and our methods are practical. 相似文献
47.
David W. Cheung H.Y. Hwang Ada W. Fu Jiawei Han 《Journal of Intelligent Information Systems》2000,15(2):175-200
Data mining has become an important technique which has tremendous potential in many commercial and industrial applications. Attribute-oriented induction is a powerful mining technique and has been successfully implemented in the data mining system DBMiner (Han et al. Proc. 1996 Int'l Conf. on Data Mining and Knowledge Discovery (KDD'96), Portland, Oregon, 1996). However, its induction capability is limited by the unconditional concept generalization. In this paper, we extend the concept generalization to rule-based concept hierarchy, which enhances greatly its induction power. When previously proposed induction algorithm is applied to the more general rule-based case, a problem of induction anomaly occurs which impacts its efficiency. We have developed an efficient algorithm to facilitate induction on the rule-based case which can avoid the anomaly. Performance studies have shown that the algorithm is superior than a previously proposed algorithm based on backtracking. 相似文献
48.
产品设计中获取用户需求的研究及软件系统的开发 总被引:8,自引:0,他引:8
用户需求被定义为产品使用用户用自己的语言表达的对产品的要求。它是企业正确制定产品设计战略的基础,是企业进行产品设计的依据和源头。本文介绍了产品设计中用户需求获取的关键技术和实现策略及相应的软件系统的开发。 相似文献
49.
50.
Leung Ada W. S.; Jolicoeur Pierre; Vachon Fran?ois; Alain Claude 《Canadian Metallurgical Quarterly》2011,37(3):727
Since the introduction of the concept of auditory scene analysis, there has been a paucity of work focusing on the theoretical explanation of how attention is allocated within a complex auditory scene. Here we examined signal detection in situations that promote either the fusion of tonal elements into a single sound object or the segregation of a mistuned element (i.e., harmonic) that “popped out” as a separate individuated auditory object and yielded the perception of concurrent sound objects. On each trial, participants indicated whether the incoming complex sound contained a brief gap or not. The gap (i.e., signal) was always inserted in the middle of one of the tonal elements. Our findings were consistent with an object-based account in which perception of two simultaneous auditory objects interfered with signal detection. This effect was observed for a wide range of gap durations and was greater when the mistuned harmonic was perceived as a separate object. These results suggest that attention may be initially shared among concurrent sound objects thereby reducing listeners' ability to process acoustic details belonging to a particular sound object. These findings provide new theoretical insight for our understanding of auditory attention and auditory scene analysis. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献