全文获取类型
收费全文 | 30707篇 |
免费 | 3356篇 |
国内免费 | 2670篇 |
专业分类
电工技术 | 987篇 |
技术理论 | 3篇 |
综合类 | 3024篇 |
化学工业 | 4466篇 |
金属工艺 | 2333篇 |
机械仪表 | 977篇 |
建筑科学 | 4083篇 |
矿业工程 | 756篇 |
能源动力 | 504篇 |
轻工业 | 1029篇 |
水利工程 | 408篇 |
石油天然气 | 608篇 |
武器工业 | 210篇 |
无线电 | 2233篇 |
一般工业技术 | 3993篇 |
冶金工业 | 3180篇 |
原子能技术 | 219篇 |
自动化技术 | 7720篇 |
出版年
2024年 | 143篇 |
2023年 | 616篇 |
2022年 | 1108篇 |
2021年 | 1284篇 |
2020年 | 1292篇 |
2019年 | 1191篇 |
2018年 | 1110篇 |
2017年 | 1292篇 |
2016年 | 1237篇 |
2015年 | 1330篇 |
2014年 | 1779篇 |
2013年 | 1864篇 |
2012年 | 2021篇 |
2011年 | 2333篇 |
2010年 | 1819篇 |
2009年 | 1851篇 |
2008年 | 1815篇 |
2007年 | 1876篇 |
2006年 | 1646篇 |
2005年 | 1494篇 |
2004年 | 1277篇 |
2003年 | 1142篇 |
2002年 | 914篇 |
2001年 | 737篇 |
2000年 | 533篇 |
1999年 | 442篇 |
1998年 | 348篇 |
1997年 | 304篇 |
1996年 | 227篇 |
1995年 | 204篇 |
1994年 | 172篇 |
1993年 | 140篇 |
1992年 | 106篇 |
1991年 | 86篇 |
1990年 | 101篇 |
1989年 | 58篇 |
1988年 | 43篇 |
1987年 | 40篇 |
1986年 | 43篇 |
1985年 | 29篇 |
1984年 | 32篇 |
1980年 | 33篇 |
1979年 | 28篇 |
1966年 | 28篇 |
1965年 | 31篇 |
1964年 | 49篇 |
1963年 | 39篇 |
1959年 | 29篇 |
1958年 | 30篇 |
1955年 | 46篇 |
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
991.
Juan D. Velásquez Luis E. Dujovne Gaston L’Huillier 《Engineering Applications of Artificial Intelligence》2011,24(8):1532-1541
Web mining has been traditionally used in different application domains in order to enhance the content that Web users are accessing. Likewise, Website administrators are interested in finding new approaches to improve their Website content according to their users' preferences. Furthermore, the Semantic Web has been considered as an alternative to represent Web content in a way which can be used by intelligent techniques to provide the organization, meaning, and definition of Web content. In this work, we define the Website Key Object Extraction problem, whose solution is based on a Semantic Web mining approach to extract from a given Website core ontology, new relations between objects according to their Web user interests. This methodology was applied to a real Website, whose results showed that the automatic extraction of Key Objects is highly competitive against traditional surveys applied to Web users. 相似文献
992.
Sari Kujala Virpi RotoKaisa Väänänen-Vainio-Mattila Evangelos KarapanosArto Sinnelä 《Interacting with computers》2011,23(5):473-483
The goal of user experience design in industry is to improve customer satisfaction and loyalty through the utility, ease of use, and pleasure provided in the interaction with a product. So far, user experience studies have mostly focused on short-term evaluations and consequently on aspects relating to the initial adoption of new product designs. Nevertheless, the relationship between the user and the product evolves over long periods of time and the relevance of prolonged use for market success has been recently highlighted. In this paper, we argue for the cost-effective elicitation of longitudinal user experience data. We propose a method called the “UX Curve” which aims at assisting users in retrospectively reporting how and why their experience with a product has changed over time. The usefulness of the UX Curve method was assessed in a qualitative study with 20 mobile phone users. In particular, we investigated how users’ specific memories of their experiences with their mobile phones guide their behavior and their willingness to recommend the product to others. The results suggest that the UX Curve method enables users and researchers to determine the quality of long-term user experience and the influences that improve user experience over time or cause it to deteriorate. The method provided rich qualitative data and we found that an improving trend of perceived attractiveness of mobile phones was related to user satisfaction and willingness to recommend their phone to friends. This highlights that sustaining perceived attractiveness can be a differentiating factor in the user acceptance of personal interactive products such as mobile phones. The study suggests that the proposed method can be used as a straightforward tool for understanding the reasons why user experience improves or worsens in long-term product use and how these reasons relate to customer loyalty. 相似文献
993.
一种可信软件设计方法及可信性评价 总被引:2,自引:0,他引:2
针对可信计算组织TCG(Trusted Computing Group)的信任链无法保障软件运行时动态可信的问题,对该信任链进行扩充,引入对软件运行时动态可信性的检测,提出了可信引擎驱动的可信软件信任链模型,并在此基础上提出了一种可信软件设计方法及可信性评价策略.通过引入描述软件可信行为轨迹的可信视图,在可信软件检查点处植入检查点传感器,将软件可信性融入软件设计中.通过对软件的完整性度量以及运行过程中软件行为轨迹的监测,实现软件的可信性保障.实验分析表明:采用该方法设计的软件能够有效地检测软件异常,并且成功检测软件异常的能力明显优于基于TCG信任链的软件. 相似文献
994.
针对目前加密工具存在加密算法单一、密钥管理不方便、密文文件共享不安全、文件重要性未区分等问题,设计了一个支持多种安全级别的文件加密工具。该工具的密钥随机生成,按用户分组组织,保存于密钥文件中,并按照文件的重要性,把它分成一般、中等和高3个安全级别。一般和中等安全级别文件加解密时,自动从密钥文件中查找密钥,而后者解密时需要进行用户认证,高安全级别文件的密钥不在密钥文件中,加密时随机生成,用投票者的公钥加密后保存到服务器,解密时需要所有投票者同意才能解密。该工具加密时随机选择加密算法,密钥无需用户记忆,通过密钥管理保证不同级别密文文件共享的安全,既具有操作的方便性,又具有较高的安全性。 相似文献
995.
访问控制和资源授权是网格系统中资源与用户的关系策略的集合,分析了访问控制与资源授权的设计原则,提出了一种基于禁止表和允许表的网格用户访问控制层次式AB4L访问控制模型.给出了该模型的形式化定义,叙述了基于Postgres数据库的资源访问控制模型和授权的实现方法,并从完备性、可扩展性、自主控制和安全性方面对该模型进行了性... 相似文献
996.
建立有效的用户行为预测模型,准确地预测用户的上网行为,是当前网络主动管理地关键,传统的Markov模型是一种简单而有效的预测模型,但它存在测准确率低、预测覆盖率低以及存储复杂度高等缺点.提出了基于加权马尔可夫链模型,通过分析用户行为特征和最优状态分类的方法,预测网络用户行为.最后通过实验结果表明了该模型的可行性和实用性... 相似文献
997.
协作过滤是一种有效的个性化推荐技术,针对该技术随着用户和资源的增多,数据的高维稀疏特性严重导致推荐质量的下降和计算速度减慢的问题,研究并实现了一种基于极速神经网络的协作过滤方法。采用主成分分析解决数据高维稀疏性问题,采用极速神经网络技术解决计算速度慢的问题。实验结果表明,该方法具有良好的泛化性能和学习速度,能很好的满足个性化资源推荐的需求。 相似文献
998.
通过在立方非线性Hartley模型中引入交变的电流源,并选定适当的参数和激励频率,建立了具有快慢行为的两时间尺度周期激励电路系统.由Hopf分岔的产生条件,推导了对应自治系统Hopf分岔的第一Lyapunov系数解析表达式,并在数值计算中得到了验证.结合该系数,重点分析了系统中的快慢行为,给出了典型的周期簇发现象及其相应的分岔模式,并利用自治系统和转换相图从分岔角度指出了该种簇发现象的产生机理. 相似文献
999.
1000.
Past research has extensively investigated the effect of media, especially focusing on how anonymity increases risk-related behaviors of groups when using computer-mediated communication (CMC). This study extends prior research by examining the differences in group risk-taking behaviors between face-to-face groups and completely non-anonymous CMC groups (i.e., groups working in a fully identified, synchronous CMC environment similar to popular instant messaging systems utilized widely within organizations). Drawing on the “decision analysis” perspective, a key framework for understanding organizational decision-making, the study also examines the effects of the firm's risk preferences as well as the type of information distribution among group members (i.e., full information known to all group members versus partial information know by only some of the members) on the groups' risk-taking behaviors. Results from a laboratory experiment using student subjects found no differences in risk-taking behaviors between CMC and face-to-face groups; additionally, no differences were found related to how information was distributed among group members. A significant effect was found, however, for the risk preference of the firm, showing that risk-neutral firms influenced groups to make riskier decisions than groups from risk-averse firms. Finally, groups within risk-neutral firms receiving partial information made riskier decisions than groups receiving full information. The implications of these results for future research and practice are examined. 相似文献