全文获取类型
收费全文 | 3132篇 |
免费 | 204篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 40篇 |
化学工业 | 728篇 |
金属工艺 | 40篇 |
机械仪表 | 84篇 |
建筑科学 | 128篇 |
矿业工程 | 5篇 |
能源动力 | 114篇 |
轻工业 | 565篇 |
水利工程 | 29篇 |
石油天然气 | 18篇 |
无线电 | 204篇 |
一般工业技术 | 473篇 |
冶金工业 | 116篇 |
原子能技术 | 13篇 |
自动化技术 | 786篇 |
出版年
2024年 | 5篇 |
2023年 | 39篇 |
2022年 | 46篇 |
2021年 | 142篇 |
2020年 | 115篇 |
2019年 | 132篇 |
2018年 | 121篇 |
2017年 | 109篇 |
2016年 | 142篇 |
2015年 | 112篇 |
2014年 | 147篇 |
2013年 | 286篇 |
2012年 | 236篇 |
2011年 | 264篇 |
2010年 | 210篇 |
2009年 | 192篇 |
2008年 | 179篇 |
2007年 | 152篇 |
2006年 | 124篇 |
2005年 | 96篇 |
2004年 | 77篇 |
2003年 | 64篇 |
2002年 | 69篇 |
2001年 | 35篇 |
2000年 | 33篇 |
1999年 | 27篇 |
1998年 | 29篇 |
1997年 | 20篇 |
1996年 | 13篇 |
1995年 | 20篇 |
1994年 | 12篇 |
1993年 | 18篇 |
1992年 | 8篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1977年 | 5篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1973年 | 5篇 |
1967年 | 1篇 |
1945年 | 1篇 |
排序方式: 共有3343条查询结果,搜索用时 156 毫秒
991.
Pedro Lara Fábio Borges Renato Portugal Nadia Nedjah 《Journal of Computer and System Sciences》2012,78(2):575-582
The modular exponentiation operation of the current algorithms for asymmetric cryptography is the most expensive part in terms of computational cost. The RSA algorithm, for example, uses the modular exponentiation algorithm in encryption and decryption procedure. Thus, the overall performance of those asymmetric cryptosystems depends heavily on the performance of the specific algorithm used for modular exponentiation. This work proposes new parallel algorithms to perform this arithmetical operation and determines the optimal number of processors that yields the greatest speedup. The optimal number is obtained by balancing the processing load evenly among the processors. Practical implementations are also performed to evaluate the theoretical proposals. 相似文献
992.
The phenomenon of birefringence may be observed when light arrives at an anisotropic crystal surface and refracts through
it, causing the incident light ray to split into two rays; these become polarized in mutually orthogonal directions, and two
images are formed. The principal goal of this paper is the study of the directional issues involved in the behavior of light
when refracting through a homogeneous, non-participating medium, including both isotropic and anisotropic media (uniaxial
and, for the first time, biaxial). The paper focuses on formulating and solving the non-linear algebraic system that is obtained
when the refraction process is simulated using the geometric model of Huygens. The main contribution focuses on the case of
biaxial media. In the case of uniaxial media, we rely on symbolic calculus techniques to formulate and solve the problem. 相似文献
993.
994.
This paper proposes a new method to perform real-time face pose estimation for ± 90° yaw rotations and under low light conditions. The algorithm works on the basis of a completely automatic and run-time incremental 3D face modelling. The model is initially made up upon a set of 3D points derived from stereo grey-scale images. As new areas of the subject face appear to the cameras, new 3D points are automatically added to complete the model. In this way, we can estimate the pose for a wide range of rotation angles, where typically 3D frontal points are occluded. 相似文献
995.
Pilar Manzanares-Lopez Josemaria Malgosa-Sanahuja Juan Pedro Muñoz-Gea 《Journal of Parallel and Distributed Computing》2012
In peer-to-peer (P2P) networks, trust management is a key tool to minimize the impact of malicious nodes. EigenTrust is claimed to be one of the most powerful distributed reputation management systems focused on P2P file-sharing applications. It is the theoretical base of other systems, and it has also been directly modified in an attempt to improve its performance. However, none of them give appropriate importance to all the information about transactions. This paper proposes an enhancement of EigenTrust, which considers unsatisfactory transactions in greater depth. Pos&Neg EigenTrust is able to obtain a blacklist of the identities of the malicious nodes. Therefore, it is able to significantly reduce the number of unsatisfactory transactions in the network. 相似文献
996.
Developing fraud management policies and fraud detection systems is a vital capability for financial institutions towards minimising the effect of fraud upon customer service delivery, bottom line financial losses and the adverse impact on the organisation’s brand image reputation. Rapidly changing attacks in real-time financial service platforms continue to demonstrate fraudster’s ability to actively re-engineer their methods in response to ad hoc security protocol deployments, and highlights the distinct gap between the speed of transaction execution within streaming financial data and corresponding fraud technology frameworks that safeguard the platform. This paper presents the design of FFML, a rule-based policy modelling language and encompassing architecture for facilitating the conceptual level expression and implementation of proactive fraud controls within multi-channel financial service platforms. It is demonstrated how a domain specific language can be used to abstract the financial platform into a data stream based information model to reduce policy modelling complexity and deployment latencies through an innovative policy mapping language usable by both expert and non-expert users. FFML is part of a comprehensive suite of assistive tools and knowledge-based systems developed to support fraud analysts’ daily work of designing new high level fraud management policies, mapping into executable code of the underpinning application programming interface and deployment of active monitoring and compliance functionality within the financial platform. 相似文献
997.
Julio E. Normey-Rico Pedro Garcia Antonio Gonzalez 《Journal of Process Control》2012,22(10):1975-1984
This paper focuses on the robust stability analysis of the filtered Smith predictor (FSP) dead-time compensator for uncertain processes with time-varying delays. For this purpose, a delay-dependent LMI-based condition is used to compute a maximum delay interval and tolerance to model uncertainties such that the closed-loop system remains stable. Some simulation results illustrate that the proposed controller gives larger delays intervals or better performance than similar approaches proposed in literature applied both to stable and unstable processes. 相似文献
998.
This paper presents the design, analysis, and performance evaluation of a novel cascade observer for attitude estimation. A sensor-based observer, which resorts to rate gyro readings and a set of vector observations, estimates the rate gyro bias. Afterwards, a cascaded observer explicitly estimates the attitude in the form of a rotation matrix based on the rate gyro measurements, the vector observations, and the estimated gyro bias. The overall error dynamics are globally exponentially stable and the proposed system is computationally efficient. Finally, the resulting estimator is successfully evaluated, in simulation and experimentally, with ground truth data in both cases. 相似文献
999.
Rodolfo Carneiro Cavalcante Alan Pedro da Silva 《Expert systems with applications》2012,39(5):4835-4846
Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security issues may endanger the success of the application. The goal of this research is to identify the security issues faced by MAS and to survey the current state of the art of this field of knowledge. In order to do it, this paper examines the basic concepts of security in computing, and some characteristics of agents and multi-agent systems that introduce new threats and ways to attack. After this, some models and architectures proposed in the literature are presented and analyzed. 相似文献
1000.
Luis Pérez Luis Velasco Juan Rodríguez Pedro Capelastegui Guillem Hernández-Sola Lorena Calavia Antonio Marqués Borja Iribarne Amador Pozo Antoine De Poorter 《Computer Networks》2012,56(4):1183-1199
The emerging use of real-time 3D-based multimedia applications imposes strict quality of service (QoS) requirements on both access and core networks. These requirements and their impact to provide end-to-end 3D videoconferencing services have been studied within the Spanish-funded VISION project, where different scenarios were implemented showing an agile stereoscopic video call that might be offered to the general public in the near future. In view of the requirements, we designed an integrated access and core converged network architecture which provides the requested QoS to end-to-end IP sessions. Novel functional blocks are proposed to control core optical networks, the functionality of the standard ones is redefined, and the signaling improved to better meet the requirements of future multimedia services. An experimental test-bed to assess the feasibility of the solution was also deployed. In such test-bed, set-up and release of end-to-end sessions meeting specific QoS requirements are shown and the impact of QoS degradation in terms of the user perceived quality degradation is quantified. In addition, scalability results show that the proposed signaling architecture is able to cope with large number of requests introducing almost negligible delay. 相似文献