全文获取类型
收费全文 | 730篇 |
免费 | 56篇 |
专业分类
电工技术 | 11篇 |
化学工业 | 134篇 |
金属工艺 | 2篇 |
机械仪表 | 7篇 |
建筑科学 | 28篇 |
矿业工程 | 1篇 |
能源动力 | 3篇 |
轻工业 | 108篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 67篇 |
一般工业技术 | 137篇 |
冶金工业 | 39篇 |
原子能技术 | 1篇 |
自动化技术 | 246篇 |
出版年
2024年 | 2篇 |
2023年 | 6篇 |
2022年 | 3篇 |
2021年 | 24篇 |
2020年 | 10篇 |
2019年 | 24篇 |
2018年 | 20篇 |
2017年 | 26篇 |
2016年 | 31篇 |
2015年 | 26篇 |
2014年 | 41篇 |
2013年 | 63篇 |
2012年 | 57篇 |
2011年 | 66篇 |
2010年 | 51篇 |
2009年 | 62篇 |
2008年 | 47篇 |
2007年 | 42篇 |
2006年 | 33篇 |
2005年 | 23篇 |
2004年 | 31篇 |
2003年 | 26篇 |
2002年 | 18篇 |
2001年 | 11篇 |
2000年 | 6篇 |
1999年 | 3篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 5篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有786条查询结果,搜索用时 15 毫秒
21.
Parallel operation of distributed generation is an important topic for microgrids,which can provide a highly reliable electric supply service and good power quality to end customers when the utility is unavailable.However,there is a well-known limitation:the power sharing accuracy between distributed generators in a parallel operation.Frequency and voltage droop is a well-established control method for improving power sharing performance.In this method,the active and reactive power calculations are used to adjust the frequency and amplitude of the output voltage.This paper describes the digital implementation of a droop method,and analyzes the influence of power calculation on droop method performance.According to the analysis,the performance of droop control in a digital control system is limited by the accuracy and speed of the power calculation method.We propose an improved power calculation method based on p-q theory to improve the performance of the droop control method,and we compare our new method with two traditional power calculation methods.Finally,simulation results and experimental results from a three single-phase 1-kW-inverter system are presented,which validate the performance of our proposed method. 相似文献
22.
Josep Díaz Maria Serna Dimitrios M. Thilikos 《Journal of Computer and System Sciences》2008,74(5):919-937
We study the fixed parameter tractability of the counting version of a parameterization of the restrictive list H-coloring problem. The parameterization is defined by fixing the number of preimages of a subset C of the vertices in H through a weight assignment K on C. We show the fixed parameter tractability of counting the number of list (H,C,K)-colorings, for the case in which (H,C,K) is simple. We introduce the concept of compactor and a new algorithmic technique, compactor enumeration, that allow us to design fixed parameter algorithms for parameterized counting problems. 相似文献
23.
This research introduces a new optimality criterion for motion planning of wheeled mobile robots based on a cost index that assesses the nearness to singularity of forward and
inverse kinematic models. Slip motions, infinite estimation error and impossible control actions are avoided escaping from singularities. In addition, high amplification of wheel velocity errors and high wheel velocity values are
also avoided by moving far from the singularity. The proposed cost index can be used directly to complement path-planning and motion-planning techniques (e.g. tree graphs, roadmaps, etc.) in order to select the optimal collision-free path or trajectory among several possible solutions. To illustrate the applications of the proposed
approach, an industrial forklift, equivalent to a tricycle-like mobile robot, is considered in a simulated environment. In particular, several results are
validated for the proposed optimality criterion, which are extensively compared to those obtained with other classical optimality criteria, such as shortest-path, time-optimal and minimum-energy. 相似文献
24.
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some
of these systems present privacy problems that may discourage potential users. Hence, high confidence and effient privacy
protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they
have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed
protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove
the system secure, and even forward secure is also provided.
This work is supported by the Generalitat de Catalunya under Grant No. FIC 2007FIC 00880, and the projects of the Spanish
MCyT MTM2007-66842-C02-02 and TIN2006-15662-C02-02. 相似文献
25.
Pere Barlet-Ros Gianluca Iannaccone Josep Sanjuàs-Cuxart Josep Solé-Pareta 《Computer Networks》2009,53(3):310-321
We present the design of a predictive load shedding scheme for a network monitoring platform that supports multiple and competing traffic queries. The proposed scheme can anticipate overload situations and minimize their impact on the accuracy of the traffic queries. The main novelty of our approach is that it considers queries as black boxes, with arbitrary (and highly variable) input traffic and processing cost. Our system only requires a high-level specification of the accuracy requirements of each query to guide the load shedding procedure and assures a fair allocation of computing resources to queries in a non-cooperative environment. We present an implementation of our load shedding scheme in an existing network monitoring system and evaluate it with a diverse set of traffic queries. Our results show that, with the load shedding mechanism in place, the monitoring system can preserve the accuracy of the queries within predefined error bounds even during extreme overload conditions. 相似文献
26.
Nicolas Poggi Toni Moreno Josep Lluis Berral Ricard Gavaldà Jordi Torres 《Computer Networks》2009,53(10):1712-1721
In the Internet, where millions of users are a click away from your site, being able to dynamically classify the workload in real time, and predict its short term behavior, is crucial for proper self-management and business efficiency. As workloads vary significantly according to current time of day, season, promotions and linking, it becomes impractical for some ecommerce sites to keep over-dimensioned infrastructures to accommodate the whole load. When server resources are exceeded, session-based admission control systems allow maintaining a high throughput in terms of properly finished sessions and QoS for a limited number of sessions; however, by denying access to excess users, the website looses potential customers.In the present study we describe the architecture of AUGURES, a system that learns to predict Web user’s intentions for visiting the site as well its resource usage. Predictions are made from information known at the time of their first request and later from navigational clicks. For this purpose we use machine learning techniques and Markov-chain models. The system uses these predictions to automatically shape QoS for the most profitable sessions, predict short-term resource needs, and dynamically provision servers according to the expected revenue and the cost to serve it. We test the AUGURES prototype on access logs from a high-traffic, online travel agency, obtaining promising results. 相似文献
27.
Enric Menéndez Hiwa Modarresi Claire Petermann Josep Nogués Neus Domingo Haoliang Liu Brian J. Kirby Amir Syed Mohd Zahir Salhi Earl Babcock Stefan Mattauch Chris Van Haesendonck André Vantomme Kristiaan Temst 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(11)
The combination of lithography and ion implantation is demonstrated to be a suitable method to prepare lateral multilayers. A laterally, compositionally, and magnetically modulated microscale pattern consisting of alternating Co (1.6 µm wide) and Co‐CoO (2.4 µm wide) lines has been obtained by oxygen ion implantation into a lithographically masked Au‐sandwiched Co thin film. Magnetoresistance along the lines (i.e., current and applied magnetic field are parallel to the lines) reveals an effective positive giant magnetoresistance (GMR) behavior at room temperature. Conversely, anisotropic magnetoresistance and GMR contributions are distinguished at low temperature (i.e., 10 K) since the O‐implanted areas become exchange coupled. This planar GMR is principally ascribed to the spatial modulation of coercivity in a spring‐magnet‐type configuration, which results in 180° Néel extrinsic domain walls at the Co/Co‐CoO interfaces. The versatility, in terms of pattern size, morphology, and composition adjustment, of this method offers a unique route to fabricate planar systems for, among others, spintronic research and applications. 相似文献
28.
Velocity‐based formulations for standard and quasi‐incompressible hypoelastic‐plastic solids 下载免费PDF全文
Alessandro Franci Eugenio Oñate Josep Maria Carbonell 《International journal for numerical methods in engineering》2016,107(11):970-990
We present three velocity‐based updated Lagrangian formulations for standard and quasi‐incompressible hypoelastic‐plastic solids. Three low‐order finite elements are derived and tested for non‐linear solid mechanics problems. The so‐called V‐element is based on a standard velocity approach, while a mixed velocity–pressure formulation is used for the VP and the VPS elements. The two‐field problem is solved via a two‐step Gauss–Seidel partitioned iterative scheme. First, the momentum equations are solved in terms of velocity increments, as for the V‐element. Then, the constitutive relation for the pressure is solved using the updated velocities obtained at the previous step. For the VPS‐element, the formulation is stabilized using the finite calculus method in order to solve problems involving quasi‐incompressible materials. All the solid elements are validated by solving two‐dimensional and three‐dimensional benchmark problems in statics as in dynamics. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
29.
30.
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the so-called key escrow problem. Recently, certificateless cryptography was introduced to mitigate these limitations. In this paper, we first propose a security model for AKA protocols using certificateless cryptography. Following this model, we then propose a simulatable certificateless two-party AKA protocol. Security is proven under the standard computational Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions. Our protocol is efficient and practical, because it requires only one pairing operation and five multiplications by each party. 相似文献