全文获取类型
收费全文 | 2041篇 |
免费 | 39篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 14篇 |
综合类 | 26篇 |
化学工业 | 153篇 |
金属工艺 | 10篇 |
机械仪表 | 21篇 |
建筑科学 | 39篇 |
矿业工程 | 4篇 |
能源动力 | 28篇 |
轻工业 | 71篇 |
水利工程 | 5篇 |
石油天然气 | 5篇 |
无线电 | 118篇 |
一般工业技术 | 124篇 |
冶金工业 | 1331篇 |
原子能技术 | 7篇 |
自动化技术 | 131篇 |
出版年
2023年 | 3篇 |
2022年 | 10篇 |
2021年 | 17篇 |
2020年 | 12篇 |
2019年 | 14篇 |
2018年 | 17篇 |
2017年 | 15篇 |
2016年 | 25篇 |
2015年 | 13篇 |
2014年 | 27篇 |
2013年 | 45篇 |
2012年 | 37篇 |
2011年 | 46篇 |
2010年 | 36篇 |
2009年 | 38篇 |
2008年 | 32篇 |
2007年 | 29篇 |
2006年 | 42篇 |
2005年 | 18篇 |
2004年 | 29篇 |
2003年 | 23篇 |
2002年 | 24篇 |
2001年 | 11篇 |
2000年 | 26篇 |
1999年 | 70篇 |
1998年 | 360篇 |
1997年 | 220篇 |
1996年 | 165篇 |
1995年 | 105篇 |
1994年 | 84篇 |
1993年 | 93篇 |
1992年 | 15篇 |
1991年 | 27篇 |
1990年 | 28篇 |
1989年 | 21篇 |
1988年 | 34篇 |
1987年 | 33篇 |
1986年 | 16篇 |
1985年 | 23篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 9篇 |
1981年 | 16篇 |
1980年 | 11篇 |
1978年 | 6篇 |
1977年 | 46篇 |
1976年 | 83篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1972年 | 3篇 |
排序方式: 共有2087条查询结果,搜索用时 21 毫秒
21.
Project-based learning is a student-centered comprehensive instructional approach where students collectively engage themselves in complex learning tasks. Recent advances in educational technologies have made student-centered learning in a technology rich environment both possible and feasible. This paper will report part of a larger study carried out at a school in the United States of America on the use ofconstructivism and technology in project-based learning. Data collection techniques included those typically associated with qualitative field research. In this paper, the technological infrastructure of the school and how technology is used in one of the project-based learning classes will be provided. Based on this study, some suggestions are also provided on how technology can be used in the context of other countries including in Malaysia. 相似文献
22.
Single channel currents were activated by GABA (0.5 to 5 microM) in cell-attached and inside-out patches from cells in the dentate gyrus of rat hippocampal slices. The currents reversed at the chloride equilibrium potential and were blocked by bicuculline (100 microM). Several different kinds of channel were seen: high conductance and low conductance, rectifying and "nonrectifying." Channels had multiple conductance states. The open probability (Po) of channels was greater at depolarized than at hyperpolarized potentials and the relationship between Po and potential could be fitted with a Boltzmann equation with equivalent valency (z) of 1. The combination of outward rectification and potential-dependent open probability gave very little chloride current at hyperpolarized potentials but steeply increasing current with depolarization, useful properties for a tonic inhibitory mechanism. 相似文献
23.
This paper aims to derive stability conditions and an output‐feedback stabilization method for discrete‐time systems with a time‐varying state delay and nonlinear perturbation. With a new way of handling the Lyapunov stability criterion, linear matrix inequality conditions are obtained for estimating bounds on delay to ensure the asymptotic stability. Based on the conditions, a synthesis procedure is developed for finding stabilizing output‐feedback gains, which are formulated as direct design variables. Three numerical examples are employed to demonstrate the effectiveness and advantages of the proposed method. Copyright © 2010 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
24.
Given a hypergraph and a set of embedded functional dependencies, we investigate the problem of determining the conditions under which we can efficiently generate redundancy-free XML storage structures with as few scheme trees as possible. Redundancy-free XML structures guarantee both economy in storage space and the absence of update anomalies, and having the least number of scheme trees requires the fewest number of joins to navigate among the data elements. We know that the general problem is intractable. The problem may still be intractable even when the hypergraph is acyclic and each hyperedge is in Boyce–Codd normal form (BCNF). As we show here, however, given an acyclic hypergraph with each hyperedge in BCNF, a polynomial-time algorithm exists that generates a largest possible redundancy-free XML storage structure. Successively generating largest possible scheme trees from among hyperedges not already included in generated scheme trees constitutes a reasonable heuristic for finding the fewest possible scheme trees. For many practical cases, this heuristic finds the set of redundancy-free XML storage structures with the fewest number of scheme trees. In addition to a correctness proof and a complexity analysis showing that the algorithm is polynomial, we also give experimental results over randomly generated but appropriately constrained hypergraphs showing empirically that the algorithm is indeed polynomial. 相似文献
25.
E. Tarameshloo M. Hosseinkhani Loorak P. W.L. Fong S. Carpendale 《Computer Graphics Forum》2016,35(3):291-300
We present GSUVis, a visualization tool designed to provide better understanding of location‐based social network (LBSN) data. LBSN data is one of the most important sources of information for transportation, marketing, health, and public safety. LBSN data consumers are interested in accessing and analysing data that is as complete and as accurate as possible. However, LBSN data contains sensitive information about individuals. Consequently, data anonymization is of critical importance if this data is to be made available to consumers. However, anonymization commonly reduces the utility of information available. Working with privacy experts, we designed GSUVis a visual analytic tool to help experts better understand the effects of anonymization techniques on LBSN data utility. One of GSUVis's primary goals is to make it possible for people to use LBSN data, without requiring them to gain deep knowledge about data anonymization. To inform the design of GSUVis, we interviewed privacy experts, and collected their tasks and system requirements. Based on this understanding, we designed and implemented GSUVis. It applies two anonymization algorithms for social and location trajectory data to a real‐world LBSN dataset and visualizes the data both before and after anonymization. Through feedback from domain experts, we reflect on the effectiveness of GSUVis and the impact of anonymization using visualization. 相似文献
26.
Yunji Jung Yulong Xi Seoungjae Cho Wei Song Simon Fong Kyungeun Cho 《Multimedia Tools and Applications》2017,76(9):11429-11447
The objective of this study is to solve the problem of user data not being precisely received from sensors because of sensing region limitations in invoked reality (IR) space, distortion of colors or patterns by lighting, and blocking or overlapping of a user by other users. The sensing scope range is thus expanded using multiple sensors in the IR space. Moreover, user feature data are accurately identified by user sensing. Specifically, multiple sensors are employed when not all of user data are sensed because they overlap with data of other users. In the proposed approach, all clients share the user feature data from multiple sensors. Accordingly, each client recognizes that the user is the same individual on the basis of the shared data. Furthermore, the identification accuracy is improved by identifying the user features based on colors and patterns that are less affected by lighting. Therefore, accurate identification of the user feature data is enabled, even under lighting changes. The proposed system was implemented based on system performance analysis standards. The practicality and system performance in identifying the same person using the proposed method were verified through an experiment. 相似文献
27.
Vehicle Teleoperation Interfaces 总被引:1,自引:1,他引:0
Despite advances in autonomy, there will always be a need for human involvement in vehicle teleoperation. In particular, tasks such as exploration, reconnaissance and surveillance will continue to require human supervision, if not guidance and direct control. Thus, it is critical that the operator interface be as efficient and as capable as possible. In this paper, we provide an overview of vehicle teleoperation and present a summary of interfaces currently in use. 相似文献
28.
Wireless video sensor networks (WVSNs) have drawn significant attention in recent years due to the advent of low-cost miniaturized cameras, which makes it feasible to realize large-scale WVSNs for a variety of applications including security surveillance, environmental tracking, and health monitoring. However, the conventional video coding paradigms are not suitable for WVSNs due to resource constraints such as limited computation power, battery energy, and network bandwidth. In this paper, we evaluated and analyzed the performance of video codecs based on emerging video coding paradigms such as distributed video coding and distributed compressive video sensing for multihop WVSNs. The main objective of this work was to provide an insight into the computational (encoding/decoding) complexity, energy consumption, node and network lifetime, processing and memory requirements, and the quality of reconstruction of these video codecs. Based on the findings, this paper also provides some guidelines for the selection of appropriate video codecs for a given WVSN application. 相似文献
29.
The dynamic capabilities view (DCV) focuses on renewal of firms’ strategic knowledge resources so as to sustain competitive advantage within turbulent markets. Within the context of the DCV, the focus of knowledge management (KM) is to develop the KMC through deploying knowledge governance mechanisms that are conducive to facilitating knowledge processes so as to produce superior business performance over time. The essence of KM performance evaluation is to assess how well the KMC is configured with knowledge governance mechanisms and processes that enable a firm to achieve superior performance through matching its knowledge base with market needs. However, little research has been undertaken to evaluate KM performance from the DCV perspective. This study employed a survey study design and adopted hypothesis-testing approaches to develop a capability-based KM evaluation framework (CKMEF) that upholds the basic assertions of the DCV. Under the governance of the framework, a KM index (KMI) and a KM maturity model (KMMM) were derived not only to indicate the extent to which a firm’s KM implementations fulfill its strategic objectives, and to identify the evolutionary phase of its KMC, but also to bench-mark the KMC in the research population. The research design ensured that the evaluation framework and instruments have statistical significance and good generalizabilty to be applied in the research population, namely construction firms operating in the dynamic Hong Kong construction market. The study demonstrated the feasibility of quantitatively evaluating the development of the KMC and revealing the performance heterogeneity associated with the development. 相似文献
30.
War is a complex social situation due to the interplay of multiple factors. Economical and political ones are of utmost importance, but human attitudes and motivations must be also taken into account. Being desirable to modify human transactions in such a way that they do not interfere with the basic right of everyone to a condition of physical and mental well-being, war must be abolished. The author contends that an understanding of behaviour through Psychology can be helpful in that aim. Aggression is considered the principal psychological cause of war. It is worth while to differentiate between aggression as an instrument for attaining a special end, and as pure hostility. Only in the first form, it is held here, does it play an important role in war. Psychogists must deal also with a wide range of states of mind that can be "served" by aggression: feelings of inferiority or insecurity, fear, greed, projections, compensations, rationalizations, etc. Scientific approach is not the only one Physiology brings to war prevention. It is equally important the wide dissemination of its conclusions among the general public. Information on the dynamics that prompt people to decide war would make it easier to control. This applies not only to political or military leaders, but also to civil populations. Concerning those two possible contributions of psychologists, scientific and educative, it is suggested the extensive use of psychodramatic techniques. Their richness lie in the lifelike experiences they convey to the participants, and particular aptitude to promote changes of attitudes. Investigation and information on the psychological processes related to war should be undertaken by international organizations of social scientists, acting simultaneously in several countries. Some of the initial steps they could further: 1) that prevention of war be a current subject matter in psychological courses; 2) that the World Health Organization take interest in this subject; 3) that psychologists participate in international political and economical bodies in order to clarify the psychological factors leading to war. 相似文献