首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4095篇
  免费   305篇
  国内免费   8篇
电工技术   48篇
综合类   4篇
化学工业   1191篇
金属工艺   48篇
机械仪表   106篇
建筑科学   118篇
矿业工程   11篇
能源动力   174篇
轻工业   591篇
水利工程   31篇
石油天然气   27篇
无线电   310篇
一般工业技术   679篇
冶金工业   203篇
原子能技术   26篇
自动化技术   841篇
  2024年   8篇
  2023年   64篇
  2022年   75篇
  2021年   211篇
  2020年   111篇
  2019年   154篇
  2018年   174篇
  2017年   162篇
  2016年   185篇
  2015年   152篇
  2014年   237篇
  2013年   381篇
  2012年   312篇
  2011年   355篇
  2010年   209篇
  2009年   226篇
  2008年   170篇
  2007年   184篇
  2006年   134篇
  2005年   103篇
  2004年   98篇
  2003年   74篇
  2002年   86篇
  2001年   40篇
  2000年   46篇
  1999年   41篇
  1998年   50篇
  1997年   40篇
  1996年   33篇
  1995年   25篇
  1994年   24篇
  1993年   28篇
  1992年   19篇
  1991年   19篇
  1990年   17篇
  1989年   29篇
  1988年   13篇
  1987年   19篇
  1986年   17篇
  1985年   13篇
  1984年   17篇
  1983年   5篇
  1982年   9篇
  1981年   8篇
  1980年   10篇
  1977年   3篇
  1976年   2篇
  1975年   3篇
  1974年   2篇
  1973年   2篇
排序方式: 共有4408条查询结果,搜索用时 78 毫秒
81.
Monitoring of cloud computing infrastructures is an imperative necessity for cloud providers and administrators to analyze, optimize and discover what is happening in their own infrastructures. Current monitoring solutions do not fit well for this purpose mainly due to the incredible set of new requirements imposed by the particular requirements associated to cloud infrastructures. This paper describes in detail the main reasons why current monitoring solutions do not work well. Also, it provides an innovative monitoring architecture that enables the monitoring of the physical and virtual machines available within a cloud infrastructure in a non-invasive and transparent way making it suitable not only for private cloud computing but also for public cloud computing infrastructures. This architecture has been validated by means of a prototype integrating an existing enterprise-class monitoring solution, Nagios, with the control and data planes of OpenStack, a well-known stack for cloud infrastructures. As a result, our new monitoring architecture is able to extend the exiting Nagios functionalities to fit in the monitoring of cloud infrastructures. The proposed architecture has been designed, implemented and released as open source to the scientific community. The proposal has also been empirically validated in a production-level cloud computing infrastructure running a test bed with up to 128 VMs where overhead and responsiveness has been carefully analyzed.  相似文献   
82.
This study examines the development of an automated particle tracking algorithm to predict the hindered Brownian movement of fluorescent nanoparticles within an evanescent wave field created using total internal reflection fluorescent microscopy. The two-dimensional motion of the fluorescent nanoparticles was tracked, with sub-pixel resolution, by fitting the intensity distribution of the particles to a known Gaussian distribution, thus providing the particle center within a single pixel. Spherical yellow-green polystyrene nanoparticles (200, 500, and 1000 nm in diameter) were suspended in deionized water (control), 10 wt% d-glucose, and 10 wt% glycerol solutions, with 1 mM of NaCl added to each. The motion of tracked nanoparticles was compared with the theoretical tangential hindered Brownian motion to estimate particle diameters and fluid viscosity using a nonlinear regression technique. The automatic tracking algorithm was initially validated by comparing the automated results with manually tracked particles, 1 µm in size. Our results showed that both particle size and solution viscosity were accurately predicted from the experimental mean square displacement. Specifically, the results show that the error of particle size prediction is below 10 % and the error of solution viscosity prediction is less than 1 %. The proposed automatic analysis tool could prove to be useful in bio-application fields for examination of single protein tracking, drug delivery, and cytotoxicity. Furthermore, the proposed tool could be useful in microfluidic areas such as particle tracking velocimetry and noninvasive viscosimetry.  相似文献   
83.
A solution to the stabilization problem of a compact set by means of the Interconnection and Damping Assignment Passivity‐Based Control methodology, for an affine nonlinear system, was introduced. To this end, we expressed the closed‐loop system as a Port Hamiltonian system, having the property of almost all their trajectories asymptotically converge to a convenient limit set, except for a set of measure zero. It was carried out by solving a partial differential equation (PDE) or single matching condition, which allows the desired energy level or limit set E to be shaped explicitly. The control strategy was tested using the magnetic beam balance system and the pendulum actuated by a direct current motor (DC‐motor), having obtained satisfactory results. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
84.
This work describes a neural network based architecture that represents and estimates object motion in videos. This architecture addresses multiple computer vision tasks such as image segmentation, object representation or characterization, motion analysis and tracking. The use of a neural network architecture allows for the simultaneous estimation of global and local motion and the representation of deformable objects. This architecture also avoids the problem of finding corresponding features while tracking moving objects. Due to the parallel nature of neural networks, the architecture has been implemented on GPUs that allows the system to meet a set of requirements such as: time constraints management, robustness, high processing speed and re-configurability. Experiments are presented that demonstrate the validity of our architecture to solve problems of mobile agents tracking and motion analysis.  相似文献   
85.
The mobile health (mHealth) and electronic health (eHealth) systems are useful to maintain a correct administration of health information and services. However, it is mandatory to ensure a secure data transmission and in case of a node failure, the system should not fall down. This fact is important because several vital systems could depend on this infrastructure. On the other hand, a cloud does not have infinite computational and storage resources in its infrastructure or would not provide all type of services. For this reason, it is important to establish an interrelation between clouds using communication protocols in order to provide scalability, efficiency, higher service availability and flexibility which allow the use of services, computing and storage resources of other clouds. In this paper, we propose the architecture and its secure protocol that allows exchanging information, data, services, computing and storage resources between all interconnected mHealth clouds. The system is based on a hierarchic architecture of two layers composed by nodes with different roles. The routing algorithm used to establish the connectivity between the nodes is the shortest path first (SPF), but it can be easily changed by any other one. Our architecture is highly scalable and allows adding new nodes and mHealth clouds easily, while it tries to maintain the load of the cloud balanced. Our protocol design includes node discovery, authentication and fault tolerance. We show the protocol operation and the secure system design. Finally we provide the performance results in a controlled test bench.  相似文献   
86.
The evaluation of the emergent behaviour in complex systems requires an analytical framework which allows the observation of different phenomena that take place at different levels. In order to observe the dynamics of complex systems, it is necessary to perform simulations so that both local and the emergent behaviour can be observed. To this end, the way in which complex system simulators are built must be examined so that it will be feasible to model large scale scenarios. In this paper, the use of Model Driven Engineering methodology is proposed to deal with this issue. Among other benefits, it is shown that this methodology allows the representation and simulation of a complex system providing support for the analysis. This analysis is supported by a metamodel which describes the system components that are under study. The application of this methodology to the development of large scale simulators is explored through a case study. This case study analyses a complex socio-technical system: a power grid.  相似文献   
87.
88.
Social networking services (SNSs) such as Facebook and Twitter have experienced explosive growth during the few past years. Millions of users have created their profiles on these services because they experience great benefits in terms of friendship. SNSs can help people to maintain their friendships, organize their social lives, start new friendships, and meet others who share their hobbies and interests. However, all these benefits can be eclipsed by the privacy hazards that affect people in SNSs. People expose intimate information about their lives on SNSs, and this information affects the way others think about them. It is crucial that users be able to control how their information is distributed through the SNSs and decide who can access it. This article presents a list of privacy threats that can affect SNS users and what requirements privacy mechanisms should fulfill to prevent this threats. Then the article reviews current approaches and analyzes to what extent they cover the requirements.  相似文献   
89.
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable.  相似文献   
90.
This paper presents a contingent valuation study concerning landscape impacts generated by the construction of one dam (Baker 1) of the HIDROAYSEN hydropower project located in the Chilean Patagonia. A survey was used to collect information about citizens’ opinions towards the hydropower project in four major cities in Chile. Specifically, a One-and-One-Half-Bound (OOHB) willingness to pay eliciting format was applied to capture citizens’ WTP. The economic loss, associated to the landscape impacts for people living in urban areas of the country, is found to be approximately US$ 205 million, which is nearly 28% of the total investment. Our results also show that the cities’ distance from the dam affects citizens’ willingness to pay.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号