全文获取类型
收费全文 | 92篇 |
免费 | 5篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 4篇 |
综合类 | 12篇 |
化学工业 | 3篇 |
金属工艺 | 2篇 |
机械仪表 | 12篇 |
建筑科学 | 13篇 |
矿业工程 | 1篇 |
能源动力 | 2篇 |
水利工程 | 1篇 |
石油天然气 | 4篇 |
一般工业技术 | 3篇 |
自动化技术 | 44篇 |
出版年
2023年 | 2篇 |
2021年 | 1篇 |
2017年 | 1篇 |
2015年 | 3篇 |
2014年 | 1篇 |
2013年 | 7篇 |
2012年 | 7篇 |
2011年 | 10篇 |
2010年 | 4篇 |
2009年 | 9篇 |
2008年 | 5篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 7篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 5篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
排序方式: 共有101条查询结果,搜索用时 15 毫秒
1.
《Information Security Journal: A Global Perspective》2013,22(6):343-350
ABSTRACT Today's businesses being IT enabled, the complexity of risks affecting the business has increased manifold and the need to gauge the Information Technology risks acting on the business operations has become paramount. The business managers who run business operations need to operate securely and seamlessly leveraging Information Technology and ability to recover and resume the business without any loss of confidentiality, integrity and availability of business information/data in any event of a security incident. There is a need to quantify the impact of the IT security risk on the critical business processes, and provide the business-level insight at the management level. It is critical to classifying the Risk Ratings as per the impact on the business operations. This approach allows the organizations to understand and prioritize the security risk management activities that make the most sense for their organization to secure the business operations instead of trying to protect against every conceivable threat. 相似文献
2.
本文利用Visual Basic6.0语言,结合GPS通信技术,设计开发了一个接收和处理GPS通信信号的计算机应用程序。 相似文献
3.
网站建设中的核心技术是数据库技术,掌握数据库连接方法是掌握数据库操作的重要内容。对ASP.NET中的数据库的连接进行研究,并针对常用数据库给出相应的连接实例,使用该方法能较好地解决ASP.NET中数据库连接建立的问题 相似文献
4.
5.
介绍了在PB中利用静态文本条来实现窗口中的控件调整大小的基本原理,并通过自定义用户对象和用户事件结合实例给出了实现方法。 相似文献
6.
7.
《Ergonomics》2012,55(5):694-705
The scientific basis for ergonomics recommendations for controls has usually not been related to active goal-directed use. The present experiment tests how different knob sizes and torques affect operator performance. The task employed is to control a pointer by the use of a control knob, and is as such an experimentally defined goal-directed task relevant to machine systems in general. Duration of use, error associated with use (overshooting of the goal area) and movement reproduction were used as performance measures. Significant differences between knob sizes were found for movement reproduction. High torques led to less overshooting as opposed to low torques. The results from duration of use showed a tendency that the differences between knob sizes were reduced from the first iteration to the second iteration. The present results indicate that the ergonomically recommended ranges of knob sizes might differently affect operator performance. 相似文献
8.
9.
摘要:文章从实用角度出发,以ActiveX技术特征、ActiveX控件应用途径作为理论铺垫,在AcdveX控件的用法、环境安全性、非编辑环境下可靠运行三个层面,对AcdveX技术支持的OfficePowerpoint多媒体演示作品的制作进行了探究,以期为读者提供参考。文章认为:AcdveX技术不仅使Powerpoint针对flash动画、数字视频等动态媒体控制更加有效,而且还能实现动态文本输入、虚拟现实模型和全景电影的控制等功能。尽管基于该技术的作品在演示时,还不能完全脱离Office Powerpoint软件环境,但终究是增强和拓展了Office Powerpoint媒体集成功能。 相似文献
10.
Janet Coveney 《Urban Policy and Research》2013,31(4):208-216
Threats to national parks from development outside their boundaries are increasing especially on the urban fringe. This article examines the threats in Victoria and the USA. It looks at what has been done so far by town planners in Victoria to combat these threats. Various measures such as the use of siting and design guidelines, conservation covenants and agreements, zoning controls and the role of state and local government legislation are discussed. The article goes on to suggest what could be done. It discusses the importance of having buffer zones around parks in which the Department of Conservation and Natural Resources would become a statutory referral authority. The problems of defining the buffer zone and administering it are also discussed. The author calls for more co-operation between state and local government authorities to reduce these threats. How America handles these threats is also mentioned. 相似文献