全文获取类型
收费全文 | 4069篇 |
免费 | 216篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 35篇 |
综合类 | 4篇 |
化学工业 | 1017篇 |
金属工艺 | 42篇 |
机械仪表 | 69篇 |
建筑科学 | 133篇 |
矿业工程 | 10篇 |
能源动力 | 149篇 |
轻工业 | 712篇 |
水利工程 | 39篇 |
石油天然气 | 17篇 |
无线电 | 342篇 |
一般工业技术 | 547篇 |
冶金工业 | 270篇 |
原子能技术 | 37篇 |
自动化技术 | 868篇 |
出版年
2024年 | 4篇 |
2023年 | 47篇 |
2022年 | 140篇 |
2021年 | 169篇 |
2020年 | 103篇 |
2019年 | 129篇 |
2018年 | 136篇 |
2017年 | 142篇 |
2016年 | 181篇 |
2015年 | 123篇 |
2014年 | 231篇 |
2013年 | 326篇 |
2012年 | 307篇 |
2011年 | 301篇 |
2010年 | 234篇 |
2009年 | 234篇 |
2008年 | 214篇 |
2007年 | 202篇 |
2006年 | 129篇 |
2005年 | 111篇 |
2004年 | 94篇 |
2003年 | 95篇 |
2002年 | 76篇 |
2001年 | 50篇 |
2000年 | 40篇 |
1999年 | 48篇 |
1998年 | 106篇 |
1997年 | 63篇 |
1996年 | 45篇 |
1995年 | 31篇 |
1994年 | 27篇 |
1993年 | 27篇 |
1992年 | 22篇 |
1991年 | 9篇 |
1990年 | 14篇 |
1989年 | 18篇 |
1988年 | 9篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 7篇 |
1977年 | 3篇 |
1976年 | 13篇 |
1974年 | 1篇 |
排序方式: 共有4291条查询结果,搜索用时 0 毫秒
31.
Miguel Martínez-Espronceda Jesús D. Trigo Santiago Led H. Gilberto Barrón-González Javier Redondo Alfonso Baquero Luis Serrano 《Computer methods and programs in biomedicine》2014
Experiences applying standards in personal health devices (PHDs) show an inherent trade-off between interoperability and costs (in terms of processing load and development time). Therefore, reducing hardware and software costs as well as time-to-market is crucial for standards adoption. The ISO/IEEE11073 PHD family of standards (also referred to as X73PHD) provides interoperable communication between PHDs and aggregators. Nevertheless, the responsibility of achieving inexpensive implementations of X73PHD in limited resource microcontrollers falls directly on the developer. Hence, the authors previously presented a methodology based on patterns to implement X73-compliant PHDs into devices with low-voltage low-power constraints. That version was based on multitasking, which required additional features and resources. This paper therefore presents an event-driven evolution of the patterns-based methodology for cost-effective development of standardized PHDs. The results of comparing between the two versions showed that the mean values of decrease in memory consumption and cycles of latency are 11.59% and 45.95%, respectively. In addition, several enhancements in terms of cost-effectiveness and development time can be derived from the new version of the methodology. Therefore, the new approach could help in producing cost-effective X73-compliant PHDs, which in turn could foster the adoption of standards. 相似文献
32.
The aim of this research is to analyse the effectiveness of the Chicago Board Options Exchange Market Volatility Index (VIX) when used with Support Vector Machines (SVMs) in order to forecast the weekly change in the S&P 500 index. The data provided cover the period between 3 January 2000 and 30 December 2011. A trading simulation is implemented so that statistical efficiency is complemented by measures of economic performance. The inputs retained are traditional technical trading rules commonly used in the analysis of equity markets such as Relative Strength Index, Moving Average Convergence Divergence, VIX and the daily return of the S&P 500. The SVM identifies the best situations in which to buy or sell in the market. The two outputs of the SVM are the movement of the market and the degree of set membership. The obtained results show that SVM using VIX produce better results than the Buy and Hold strategy or SVM without VIX. The influence of VIX in the trading system is particularly significant when bearish periods appear. Moreover, the SVM allows the reduction in the Maximum Drawdown and the annualised standard deviation. 相似文献
33.
Unai Diaz-Orueta Aitziber Etxaniz Mari Feli Gonzalez Cristina Buiza Elena Urdaneta Javier Yanguas 《Universal Access in the Information Society》2014,13(1):89-97
The complexity of new information technologies (IT) may limit the access of elderly people to the information society, exacerbating what is known as “the digital divide,” as they appear to be too challenging for elderly citizens regardless of the integrity of their cognitive status. This study is an attempt to clarify how some cognitive functions (such as attention or verbal memory) may determine the interaction of cognitively impaired elderly people with technology. Twenty participants ranging from mild cognitive impairment to moderate Alzheimer’s disease were assessed by means of a neuropsychological and functional battery and were asked to follow simple commands from an avatar appearing on a TV by means of a remote control, such as asking the participant to confirm their presence or to respond Yes/No to a proposal to see a TV program. The number of correct answers and command repetitions required for the user to respond were registered. The results show that participants with a better cognitive and functional state in specific tests show a significantly better performance in the TV task. The derived conclusion is that neuropsychological assessment may be used as a useful complementary tool for assistive technology developers in the adaptation of IT to the elderly with different cognitive and functional profiles. Further studies with larger samples are required to determine to what extent cognitive functions can actually predict older users’ interaction with technology. 相似文献
34.
Cristina Manresa-Yee Javier Varona Francisco J. Perales Iosune Salinas 《Universal Access in the Information Society》2014,13(4):471-482
This work focuses on camera-based systems that are designed for mouse replacement. Usually, these interfaces are based on computer vision techniques that capture the user’s face or head movements and are specifically designed for users with disabilities. The work identifies and reviews the key factors of these interfaces based on the lessons learnt by the authors’ experience and by a comprehensive analysis of the literature to describe the specific points to consider in their design. These factors are as follows: user features to track, initial user detection (calibration), position mapping, feedback, error recovery, event execution, profiles and ergonomics of the system. The work compiles the solutions offered by different systems to help new designers avoid problems already discussed by the others. 相似文献
35.
36.
Beatriz Pariente-Martinez Martin Gonzalez-Rodriguez Daniel Fernandez-Lanvin Javier De Andres-Suarez 《Universal Access in the Information Society》2016,15(2):237-247
The influence of aging on computer interaction has been widely analyzed in human–computer interaction research literature. Despite this, there are no age-based user maps that could support the user-interface customization. Studying the specific needs and constraints of these groups is crucial in order to adapt a user interface to the user’s interaction requirements. This work studies the performance of a sample of participants on three different basic tasks (pointing, dragging and dropping, and text selection) and the influence of age for each of them. It is concluded that this influence differs between specific activities. A group profile map that can support automatic classification in the future has been obtained. 相似文献
37.
Xavier Suau Javier Ruiz-Hidalgo Josep R. Casas 《Computer Vision and Image Understanding》2013,117(3):281-288
End-effectors are usually related to the location of limbs, and their reliable detection enables robust body tracking as well as accurate pose estimation. Recent innovation in depth cameras has re-stated the pose estimation problem. We focus on the information provided by these sensors, for which we borrow the name 2.5D data from the Graphics community. In this paper we propose a human pose estimation algorithm based on topological propagation. Geometric Deformable Models are used to carry out such propagation, implemented according to the Narrow Band Level Set approach. A variant of the latter method is proposed, including a density restriction which helps preserving the topological properties of the object under analysis. Principal end-effectors are extracted from a directed graph weighted with geodesic distances, also providing a skeletal-like structure describing human pose. An evaluation against reference methods is performed with promising results. The proposed solution allows a frame-wise end-effector detection, with no temporal tracking involved, which may be generalized to the tracking of other objects beyond human body. 相似文献
38.
Recent vehicular routing proposals use real-time road traffic density estimates to dynamically select forwarding paths. Estimating the traffic density in vehicular ad hoc networks requires the transmission of additional dedicated messages increasing the communications load. These proposals are generally based on unicast sender-based forwarding schemes. The greedy nature of sender-based forwarding can result in the selection of forwarders with weak radio links that might compromise the end-to-end performance. To overcome these limitations, this paper presents TOPOCBF, a novel contention-based broadcast forwarding protocol that dynamically selects forwarding paths based on their capability to route packets between anchor points. Such capability is estimated by means of a multi-hop connectivity metric. The obtained results demonstrate that TOPOCBF can provide good packet delivery ratios while reducing the communications load compared to unicast sender-based forwarding schemes using road traffic density estimates. 相似文献
39.
Basil Mohammed Al-Hadithi Antonio Javier Barragán José Manuel Andújar Agustín Jiménez 《Applied Soft Computing》2013,13(12):4802-4812
In this paper, a fuzzy based Variable Structure Control (VSC) with guaranteed stability is presented. The main objective is to obtain an improved performance of highly non-linear unstable systems. The main contribution of this work is that, firstly, new functions for chattering reduction and error convergence without sacrificing invariant properties are proposed, which is considered the main drawback of the VSC control. Secondly, the global stability of the controlled system is guaranteed.The well known weighting parameters approach, is used in this paper to optimize local and global approximation and modeling capability of T-S fuzzy model.A one link robot is chosen as a nonlinear unstable system to evaluate the robustness, effectiveness and remarkable performance of optimization approach and the high accuracy obtained in approximating nonlinear systems in comparison with the original T-S model. Simulation results indicate the potential and generality of the algorithm. The application of the proposed FLC-VSC shows that both alleviation of chattering and robust performance are achieved with the proposed FLC-VSC controller. The effectiveness of the proposed controller is proven infront of disturbances and noise effects. 相似文献
40.
In public key encryption schemes with a double decryption mechanism (DD-PKE), decryption can be done in either of two ways: by the user owning the secret/public key pair corresponding to the ciphertext, or by a trusted party holding a sort of master secret-key. In this note we argue that the classical security notion for standard public key encryption schemes does not suffice for DD-PKE schemes, and propose a new natural definition. Additionally, we illustrate the usefulness of the new security definition by showing that a DD-PKE scheme presented in the workshop Selected Areas in Cryptography 2005 is insecure under this augmented security notion. 相似文献