全文获取类型
收费全文 | 24627篇 |
免费 | 2921篇 |
国内免费 | 1654篇 |
专业分类
电工技术 | 2036篇 |
技术理论 | 6篇 |
综合类 | 3100篇 |
化学工业 | 892篇 |
金属工艺 | 397篇 |
机械仪表 | 536篇 |
建筑科学 | 3787篇 |
矿业工程 | 1006篇 |
能源动力 | 918篇 |
轻工业 | 1569篇 |
水利工程 | 4995篇 |
石油天然气 | 847篇 |
武器工业 | 133篇 |
无线电 | 1287篇 |
一般工业技术 | 1541篇 |
冶金工业 | 1223篇 |
原子能技术 | 189篇 |
自动化技术 | 4740篇 |
出版年
2024年 | 168篇 |
2023年 | 439篇 |
2022年 | 896篇 |
2021年 | 1019篇 |
2020年 | 1034篇 |
2019年 | 897篇 |
2018年 | 892篇 |
2017年 | 914篇 |
2016年 | 1078篇 |
2015年 | 1076篇 |
2014年 | 1782篇 |
2013年 | 1793篇 |
2012年 | 1934篇 |
2011年 | 1907篇 |
2010年 | 1475篇 |
2009年 | 1531篇 |
2008年 | 1475篇 |
2007年 | 1583篇 |
2006年 | 1470篇 |
2005年 | 1105篇 |
2004年 | 977篇 |
2003年 | 759篇 |
2002年 | 614篇 |
2001年 | 499篇 |
2000年 | 408篇 |
1999年 | 320篇 |
1998年 | 233篇 |
1997年 | 193篇 |
1996年 | 133篇 |
1995年 | 122篇 |
1994年 | 98篇 |
1993年 | 78篇 |
1992年 | 54篇 |
1991年 | 40篇 |
1990年 | 46篇 |
1989年 | 38篇 |
1988年 | 28篇 |
1987年 | 15篇 |
1986年 | 12篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1979年 | 5篇 |
1974年 | 2篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1961年 | 3篇 |
1959年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
41.
42.
Kirwan B 《Applied ergonomics》1992,23(6):371-381
This is the second part of a two-part review of human error identification (HEI) approaches in human reliability assessment (HRA). Part 1 reviewed the probabilistic risk assessment (PRA) context in which HRA occurs, and then detailed 12 HEI techniques which have evolved in the field of HRA. Part 2 attempts to compare the way these techniques perform against a range of criteria relevant to HEI theoretical and empirical validity, and practical usefulness in applied HRA. It is hoped that these comparisons will help assessors in the selection of techniques for practical applications. The comparisons also point to research and development needs in the area of applied HEI. 相似文献
43.
《Expert systems with applications》2014,41(2):644-654
This study aims to improve the general flood vulnerability approach using fuzzy TOPSIS based on α-cut level sets which can reduce the uncertainty inherent in even fuzzy multi-criteria decision making process. Since fuzzy TOPSIS leads to a crisp closeness for each alternative, it is frequently argued that fuzzy weights and fuzzy ratings should be in fuzzy relative closeness. Therefore, this study used a modified α-cut level set based fuzzy TOPSIS to develop a spatial flood vulnerability approach for Han River in Korea, considering various uncertainties in weights derivation and crisp data aggregation. Two results from fuzzy TOPSIS and modified fuzzy TOPSIS were compared. Some regions which showed no or small ranking changes have their centro-symmetric distributions, while other regions whose rankings varied dynamically, have biased (anti-symmetric) distributions. It can be concluded that α-cut level set based fuzzy TOPSIS produce more robust prioritization since more uncertainties can be considered. This method can be applied to robust spatial vulnerability or decision making in water resources management. 相似文献
44.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献
45.
46.
针对学校等大型科研平台拥有的精密器材种类繁多、安置位置分散、操作流程特异、操作人员流动性大的现象,基于监测的思想设计了此仪器管理系统,旨在督促实验人员按稳妥的使用流程操作仪器,并为器材的更迭维修提供参考。系统分为终端、服务端两部分,终端通过检测电流来判断仪器状态,使用者使用需用有效IC卡辨别身份,终端相应给予声光提示,并且拍照留据。相应的状态情况可以通过网络传输到服务器,例如使用者有效卡号、报警照片等且客户端可以从服务端获取人员信息更新等资料。通过对本工程中心内部分仪器的监管测试表明,较好的提高了操作人员使用素质,提高了仪器管理水平。 相似文献
47.
The paper studies a 3D fingerprint reconstruction technique based on multi-view touchless fingerprint images. This technique offers a solution for 3D fingerprint image generation and application when only multi-view 2D images are available. However, the difficulties and stresses of 3D fingerprint reconstruction are the establishment of feature correspondences based on 2D touchless fingerprint images and the estimation of the finger shape model. In this paper, several popular used features, such as scale invariant feature transformation (SIFT) feature, ridge feature and minutiae, are employed for correspondences establishment. To extract these fingerprint features accurately, an improved fingerprint enhancement method has been proposed by polishing orientation and ridge frequency maps according to the characteristics of 2D touchless fingerprint images. Therefore, correspondences can be established by adopting hierarchical fingerprint matching approaches. Through an analysis of 440 3D point cloud finger data (220 fingers, 2 pictures each) collected by a 3D scanning technique, i.e., the structured light illumination (SLI) method, the finger shape model is estimated. It is found that the binary quadratic function is more suitable for the finger shape model than the other mixed model tested in this paper. In our experiments, the reconstruction accuracy is illustrated by constructing a cylinder. Furthermore, results obtained from different fingerprint feature correspondences are analyzed and compared to show which features are more suitable for 3D fingerprint images generation. 相似文献
48.
《Pattern recognition》2014,47(2):535-543
Robust face recognition (FR) is an active topic in computer vision and biometrics, while face occlusion is one of the most challenging problems for robust FR. Recently, the representation (or coding) based FR schemes with sparse coding coefficients and coding residual have demonstrated good robustness to face occlusion; however, the high complexity of l1-minimization makes them less useful in practical applications. In this paper we propose a novel coding residual map learning scheme for fast and robust FR based on the fact that occluded pixels usually have higher coding residuals when representing an occluded face image over the non-occluded training samples. A dictionary is learned to code the training samples, and the distribution of coding residuals is computed. Consequently, a residual map is learned to detect the occlusions by adaptive thresholding. Finally the face image is identified by masking the detected occlusion pixels from face representation. Experiments on benchmark databases show that the proposed scheme has much lower time complexity but comparable FR accuracy with other popular approaches. 相似文献
49.
Kim-Choy Chung 《Behaviour & Information Technology》2014,33(7):743-756
This study investigates perceived risk and trust in relationship to the Diffusion of Innovation Theory [Rogers, E.M., 1962. Diffusion of innovations. Glencoe, IL: The Free Press; 1983. Diffusion of innovations. 3rd ed. New York: The Free Press] from a cultural perspective to understand the determinants of behavioural intent to adopt mobile commerce among the Y Generation in Kazakhstan. Surveys from 345 university-level students and subsequent structural equation modelling revealed perceived risk, trustworthiness and Rogers’ five innovation characteristics are important determinants. Perceived risk and trustworthiness are important determinants because of the high uncertainty avoidance characteristics of the Kazakh society. This study advances theory regarding culture- and generation-based characteristics to transition economies by verifying theoretical proposition regarding the behavioural intent towards mobile commerce adoption, resulting in a greater understanding of mobile commerce adoption among the Y Generation in transition economies. Marketing implications are discussed. 相似文献
50.
《Computer Aided Geometric Design》2014,31(7-8):475-485
In this paper, we introduce triangular subdivision operators which are composed of a refinement operator and several averaging operators, where the refinement operator splits each triangle uniformly into four congruent triangles and in each averaging operation, every vertex will be replaced by a convex combination of itself and its neighboring vertices. These operators form an infinite class of triangular subdivision schemes including Loop's algorithm with a restricted parameter range and the midpoint schemes for triangular meshes. We analyze the smoothness of the resulting subdivision surfaces at their regular and extraordinary points by generalizing an established technique for analyzing midpoint subdivision on quadrilateral meshes. General triangular midpoint subdivision surfaces are smooth at all regular points and they are also smooth at extraordinary points under certain conditions. We show some general triangular subdivision surfaces and compare them with Loop subdivision surfaces. 相似文献