全文获取类型
收费全文 | 2977篇 |
免费 | 274篇 |
国内免费 | 22篇 |
专业分类
电工技术 | 75篇 |
综合类 | 10篇 |
化学工业 | 832篇 |
金属工艺 | 92篇 |
机械仪表 | 164篇 |
建筑科学 | 133篇 |
矿业工程 | 6篇 |
能源动力 | 218篇 |
轻工业 | 338篇 |
水利工程 | 37篇 |
石油天然气 | 36篇 |
无线电 | 248篇 |
一般工业技术 | 506篇 |
冶金工业 | 97篇 |
原子能技术 | 19篇 |
自动化技术 | 462篇 |
出版年
2024年 | 13篇 |
2023年 | 61篇 |
2022年 | 92篇 |
2021年 | 210篇 |
2020年 | 187篇 |
2019年 | 235篇 |
2018年 | 270篇 |
2017年 | 268篇 |
2016年 | 251篇 |
2015年 | 157篇 |
2014年 | 227篇 |
2013年 | 333篇 |
2012年 | 208篇 |
2011年 | 207篇 |
2010年 | 145篇 |
2009年 | 123篇 |
2008年 | 67篇 |
2007年 | 38篇 |
2006年 | 33篇 |
2005年 | 23篇 |
2004年 | 21篇 |
2003年 | 16篇 |
2002年 | 13篇 |
2001年 | 10篇 |
2000年 | 7篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 5篇 |
1995年 | 7篇 |
1994年 | 5篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1976年 | 2篇 |
1974年 | 1篇 |
排序方式: 共有3273条查询结果,搜索用时 31 毫秒
21.
Mehdi Dehghan Masoud Hajarian 《International Journal of Control, Automation and Systems》2012,10(5):905-912
In this paper, an iterative algorithm is established for finding the generalized bisymmetric solution group to the coupled matrix equations (including the generalized (coupled) Lyapunov and Sylvester matrix equations as special cases). It is proved that proposed algorithm consistently converges to the generalized bisymmetric solution group for any initial generalized bisymmetric matrix group. Finally a numerical example indicates that proposed algorithm works quite effectively in practice. 相似文献
22.
Azizli Mohammad Javad Barghamadi Mohammad Rezaeeparto Katayoon Mokhtary Masoud Parham Somayeh Darabi Mehdi Joker 《Iranian Polymer Journal》2021,30(10):1001-1018
Iranian Polymer Journal - Effects of graphene oxide (GO) on various properties of rubber hybrid nanocomposites based on PVMQ/XNBR-g-GMA/XNBR (phenyl-vinyl-methyl-polysiloxane/carboxylated nitrile... 相似文献
23.
Ghorbani-Choghamarani Arash Aghavandi Hamid Mohammadi Masoud 《Journal of Porous Materials》2021,28(4):1167-1186
Journal of Porous Materials - In this work, tris(hydroxymethyl)aminomethane-Zirconium complex supported on modified SBA-15 (SBA-15@n-Pr-THMAM-ZrO) prepared as a novel mesoporous catalyst. The... 相似文献
24.
Rouhollah Jalili Mohammad Morshed Seyed Abdolkarim Hosseini Ravandi 《应用聚合物科学杂志》2006,101(6):4350-4357
Electrospinning with a collector consisting of two pieces of electrically conductive substrates separated by a gap has been used to prepare uniaxially aligned PAN nanofibers. Solution of 15 wt % of PAN/DMF was used tentatively for electrospinning. The effects of width of the gap and applied voltage on degree of alignment were investigated using image‐processing technique by Fourier power spectrum method. The electrospinning conditions that gave the best alignment of nanofibers for 10–15 wt % solution concentrations were experimentally obtained. Bundles like multifilament yarns of uniaxially aligned nanofibers were prepared using a new simple method. After‐treatments of these bundles were carried out in boiling water under tension. A comparison was made between the crystallinity and mechanical behavior of posttreated and untreated bundles. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 101: 4350–4357, 2006 相似文献
25.
Ali Rezaee Amir Masoud Rahmani Ali Movaghar Mohammad Teshnehlab 《The Journal of supercomputing》2014,67(2):345-383
In cloud computing, services play key roles. Services are well defined and autonomous components. Nowadays, the demand of using Fuzzy inference as a service is increasing in the domain of complex and critical systems. In such systems, along with the development of the software, the cost of detecting and fixing software defects increases. Therefore, using formal methods, which provide clear, concise, and mathematical interpretation of the system, is crucial for the design of these Fuzzy systems. To obtain this goal, we introduce the Fuzzy Inference Cloud Service (FICS) and propose a novel discipline for formal modeling of the FICS. The FICS provides the service of Fuzzy inference to the consumers. We also introduce four novel formal verification tests, which allow strict analysis of certain behavioral disciplines in the FICS as follows: (1) Internal consistency, which analyzes the service in a strict and delicate manner; (2) Deadlock freeness; (3) Divergence freeness; and (4) Goal reach ability. The four tests are discussed and the FICS is verified to ensure that it can pass all these tests. 相似文献
26.
The increasing demand on execution of large-scale Cloud workflow applications which need a robust and elastic computing infrastructure usually lead to the use of high-performance Grid computing clusters. As the owners of Cloud applications expect to fulfill the requested Quality of Services (QoS) by the Grid environment, an adaptive scheduling mechanism is needed which enables to distribute a large number of related tasks with different computational and communication demands on multi-cluster Grid computing environments. Addressing the problem of scheduling large-scale Cloud workflow applications onto multi-cluster Grid environment regarding the QoS constraints declared by application’s owner is the main contribution of this paper. Heterogeneity of resource types (service type) is one of the most important issues which significantly affect workflow scheduling in Grid environment. On the other hand, a Cloud application workflow is usually consisting of different tasks with the need for different resource types to complete which we call it heterogeneity in workflow. The main idea which forms the soul of all the algorithms and techniques introduced in this paper is to match the heterogeneity in Cloud application’s workflow to the heterogeneity in Grid clusters. To obtain this objective a new bi-level advanced reservation strategy is introduced, which is based upon the idea of first performing global scheduling and then conducting local scheduling. Global-scheduling is responsible to dynamically partition the received DAG into multiple sub-workflows that is realized by two collaborating algorithms: (1) The Critical Path Extraction algorithm (CPE) which proposes a new dynamic task overall critically value strategy based on DAG’s specification and requested resource type QoS status to determine the criticality of each task; and (2) The DAG Partitioning algorithm (DAGP) which introduces a novel dynamic score-based approach to extract sub-workflows based on critical paths by using a new Fuzzy Qualitative Value Calculation System to evaluate the environment. Local-scheduling is responsible for scheduling tasks on suitable resources by utilizing a new Multi-Criteria Advance Reservation algorithm (MCAR) which simultaneously meets high reliability and QoS expectations for scheduling distributed Cloud-base applications. We used the simulation to evaluate the performance of the proposed mechanism in comparison with four well-known approaches. The results show that the proposed algorithm outperforms other approaches in different QoS related terms. 相似文献
27.
Benyamin Norouzi Seyed Mohammad Seyedzadeh Sattar Mirzakuchaki Mohammad Reza Mosavi 《Multimedia Systems》2014,20(1):45-64
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms. 相似文献
28.
Although leather has a number of desirable properties such as thermal stability and fire retardancey, in addition to high toughness, it has a few drawbacks such as weight, high water absorption, poor soil and rot resistance, and nonuniformity. If these defects are overcome, leather's usefulness would be further enhanced and its competitive position with respect to synthetics would increase. This study reports the physical and mechanical properties of buffalo leather after chemical graft copolymerization with ethyl acrylate, butyl acrylate, and 2‐ethyl hexyl acrylate using benzoyl peroxide as an initiator. The optimum conditions for grafting (e.g., monomer and initiator concentrations, temperature and time of grafting, and solvent leather ratio) were extensively investigated. The study achieved outstanding properties for buffalo leather in reduction of water uptake after grafting, especially on using 2‐ethyl hexyl acrylate and butyl acrylate monomers. FT‐IR and solid 13C‐NMR for leather before and after grafting confirmed the grafting process.© 2003 Wiley Periodicals, Inc. J Appl Polym Sci 89: 1478–1483, 2003 相似文献
29.
E brahim Mahdipour Amir Masoud Rahmani Saeed Setayeshi 《International journal of systems science》2014,45(3):373-383
Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network settings. Estimating probabilities associated with rare events has been a topic of great importance in queueing theory, and in applied probability at large. In this article, we analyse the performance of an importance sampling estimator for a rare event probability in a Jackson network. This article carries out strict deadlines to a two-node Jackson network with feedback whose arrival and service rates are modulated by an exogenous finite state Markov process. We have estimated the probability of network blocking for various sets of parameters, and also the probability of missing the deadline of customers for different loads and deadlines. We have finally shown that the probability of total population overflow may be affected by various deadline values, service rates and arrival rates. 相似文献
30.
Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar Kevin Butler 《International Journal of Information Security》2014,13(2):171-189
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud. 相似文献