全文获取类型
收费全文 | 898篇 |
免费 | 21篇 |
国内免费 | 26篇 |
专业分类
电工技术 | 13篇 |
综合类 | 18篇 |
化学工业 | 19篇 |
金属工艺 | 16篇 |
机械仪表 | 53篇 |
建筑科学 | 22篇 |
矿业工程 | 8篇 |
能源动力 | 13篇 |
轻工业 | 4篇 |
水利工程 | 2篇 |
石油天然气 | 7篇 |
武器工业 | 6篇 |
无线电 | 90篇 |
一般工业技术 | 83篇 |
冶金工业 | 16篇 |
原子能技术 | 37篇 |
自动化技术 | 538篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 8篇 |
2021年 | 14篇 |
2020年 | 10篇 |
2019年 | 6篇 |
2018年 | 1篇 |
2017年 | 22篇 |
2016年 | 19篇 |
2015年 | 24篇 |
2014年 | 47篇 |
2013年 | 33篇 |
2012年 | 34篇 |
2011年 | 66篇 |
2010年 | 50篇 |
2009年 | 43篇 |
2008年 | 56篇 |
2007年 | 87篇 |
2006年 | 84篇 |
2005年 | 57篇 |
2004年 | 42篇 |
2003年 | 39篇 |
2002年 | 27篇 |
2001年 | 22篇 |
2000年 | 33篇 |
1999年 | 19篇 |
1998年 | 20篇 |
1997年 | 20篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 11篇 |
1993年 | 3篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有945条查询结果,搜索用时 31 毫秒
1.
Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities, which led to the availability of prototypes demonstrating new capabilities as well as the introduction of such systems to the market within different domains. Manufacturers need to make sure that the systems function in the intended way and according to specifications. This is not a trivial task as system complexity rises dramatically the more integrated and interconnected these systems become with the addition of automated functionality and features to them. This effort translates into an overhead on the V&V (verification and validation) process making it time-consuming and costly. In this paper, we present VALU3S, an ECSEL JU (joint undertaking) project that aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process. The main expected benefit of the framework is to reduce time and cost needed to verify and validate automated systems with respect to safety, cyber-security, and privacy requirements. This is done through identification and classification of evaluation methods, tools, environments and concepts for V&V of automated systems with respect to the mentioned requirements. VALU3S will provide guidelines to the V&V community including engineers and researchers on how the V&V of automated systems could be improved considering the cost, time and effort of conducting V&V processes. To this end, VALU3S brings together a consortium with partners from 10 different countries, amounting to a mix of 25 industrial partners, 6 leading research institutes, and 10 universities to reach the project goal. 相似文献
2.
This paper introduces a novel approach for identity authentication system based on metacarpophalangeal joint patterns (MJPs). A discriminative common vector (DCV) based method is utilized for feature selection. In the literature, there is no study using whole MJP for identity authentication, exceptionally a work (Ferrer et al., 2005) using the hand knuckle pattern which is some part of the MJP draws the attention as a similar study. The originality of this approach is that: whole MJP is firstly used as a biometric identifier and DCV method is firstly applied for extracting the feature set of MJP. The developed system performs some basic tasks like image acquisition, image pre-processing, feature extraction, matching, and performance evaluation. The feasibility and effectiveness of this approach is rigorously evaluated using the k-fold cross validation technique on two different databases: a publicly available database and a specially established database. The experimental results indicate that the MJPs are very distinctive biometric identifiers and can be securely used in biometric identification and verification systems, DCV method is successfully employed for obtaining the feature set of MJPs and proposed MJP based authentication approach is very successful according to state of the art techniques with a recognition rate of between 95.33% and 100.00%. 相似文献
3.
《Microelectronics Reliability》2015,55(5):722-732
Thermo-electric modules (TEMs) can be used to convert heat into electricity by utilizing the Seeback effect. It is now possible to buy BiTe thermo-electric modules that can operate up to temperatures of around 300 °C. However, many applications, such as the harvesting of excess gas turbine heat, may occur at higher temperatures. Therefore, new materials and manufacturing processes need to be developed to produce packaged TEMs that can operate at a maximum operating temperature of 650 °C. Two critical areas in the manufacture of a SiGe TEM are the choice and strength of materials used to both sintered joint the TE material to the rest of the module and the metal used for the interconnects. The interconnection material needs to be sufficiently strong to withstand large temperature fluctuations while maintaining a low contact resistance, as well as being compatible with the nano-Ag sintered joint. Shear force tests of the sintered thermo electrical leg material showed that the joints are brittle when sintered to W metallized AlN substrates are used and ductile fracture behavior when sintered to Cu metallized AlN substrates using the NanoTach K nano silver paste. Almost all of the joints were found to be brittle when using the NachTach X nano silver paste. Shear testing of the sintered joints showed that the X paste joints were variable in strength and stiffness, having a typical Young’s modulus between 10 and 100 MPa at room temperature. The K paste joints were stiffer, but had a similar strength as compared to the X paste joints. 相似文献
4.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up. 相似文献
5.
As the SARS-CoV-2 (COVID-19) pandemic has run rampant worldwide, the dissemination of misinformation has sown confusion on a global scale. Thus, understanding the propagation of fake news and implementing countermeasures has become exceedingly important to the well-being of society. To assist this cause, we produce a valuable dataset called FibVID (Fake news information-broadcasting dataset of COVID-19), which addresses COVID-19 and non-COVID news from three key angles. First, we provide truth and falsehood (T/F) indicators of news items, as labeled and validated by several fact-checking platforms (e.g., Snopes and Politifact). Second, we collect spurious-claim-related tweets and retweets from Twitter, one of the world’s largest social networks. Third, we provide basic user information, including the terms and characteristics of “heavy fake news” user to present a better understanding of T/F claims in consideration of COVID-19. FibVID provides several significant contributions. It helps to uncover propagation patterns of news items and themes related to identifying their authenticity. It further helps catalog and identify the traits of users who engage in fake news diffusion. We also provide suggestions for future applications of FibVID with a few exploratory analyses to examine the effectiveness of the approaches used. 相似文献
6.
As blockchain technology is gaining popularity in industry and society, solutions for Verification and Validation (V&V) of blockchain-based software applications (BC-Apps) have started gaining equal attention. To ensure that BC-Apps are properly developed before deployment, it is paramount to apply systematic V&V to verify their functional and non-functional requirements. While existing research aims at addressing the challenges of engineering BC-Apps by providing testing techniques and tools, blockchain-based software development is still an emerging research discipline, and therefore, best practices and tools for the V&V of BC-Apps are not yet sufficiently developed. In this paper, we provide a comprehensive survey on V&V solutions for BC-Apps. Specifically, using a layered approach, we synthesize V&V tools and techniques addressing different components at various layers of the BC-App stack, as well as across the whole stack. Next, we provide a discussion on the challenges associated with BC-App V&V, and summarize a set of future research directions based on the challenges and gaps identified in existing research work. Our study aims to highlight the importance of BC-App V&V and pave the way for a disciplined, testable, and verifiable BC development. 相似文献
7.
8.
在互联网数据中心(IDC)交付使用前,对IDC的基础设施运行环境质量开展全面的第三方验证测试,通过多层级测试、模拟多种场景、模拟故障来发现系统可能存在的问题,并针对薄弱环节进行整改,可有效减少实际运行的故障隐患,提高系统可靠性,保证项目前期投资。对IDC第三方验证测试的主要内容、步骤、方案进行了较为详细的介绍,并罗列了验证测试中出现的常见问题和整改建议。 相似文献
9.
运用有限元技术模拟了两辊斜轧穿孔法制备Ti80合金无缝管坯的三维热力耦合过程。仿真结果能动态显示坯料从咬入到稳定穿孔再到穿出3个阶段复杂的塑性成形过程,并能辅助分析中心孔腔的形成机理以及坯料在穿孔阶段各物理场量的分布。结果表明:坯料刚接触顶头时,中心金属存在明显塑性变形,结合轧制中心线上不同方向的正应力状态为(+,-,+),判断中心孔腔的形成为拉应力作用下的塑性开裂。在穿孔过程中,坯料的应变分布沿轴向呈U1+W+2U2形态,沿径向为片层状,最终穿制毛管等效应变可达5~11;坯料的外表面与导盘接触区应变速率为0.71~3.6s~(-1),而与轧辊接触区高达4.6~26s~(-1),大的应变速率有助于毛管的塑性成形过程;顶头前坯料的温度最高,与穿孔工具接触的区域温度略有降低,但绝大部分变形区温度都处于单相区。模拟所得全流程顶头轴向力与轧制力的变化呈现典型的3阶段分布,其中稳定穿孔阶段力能参数的均值接近试验所得,从而验证了模型的准确性。基于有限元模拟的工艺条件,在实验轧机上一火次顺利穿制出Ti80合金无缝管坯,其显微组织展现为单一的魏氏组织形态,且由于变形剧烈,从外表面到中间层再到内表面均为等轴细小的β动态再结晶晶粒;力学性能测试表明该组织状态下的毛管的强度和塑性均满足指标要求。 相似文献
10.
Verification recently has become a challenging topic for business process languages. Verification techniques like model checking allow to ensure that a process complies with domain-specific requirements, prior to the execution. To execute full-state verification techniques like model checking, the state space of the process needs to be constructed. This tends to increase exponentially with the size of the process schema, or it can even be infinite. We address this issue by means of requirements-specific reduction techniques, i.e., reducing the size of the state space without changing the result of the verification. We present an approach that, for a given requirement the system must fulfill, identifies the tasks relevant for the verification. Our approach then uses these relevant tasks for a reduction that confines the process to regions of interest for the verification. To evaluate our new technique, we use real-world industrial processes and requirements. Mainly because these processes make heavy use of parallelization, full-state-search verification algorithms are not able to verify them. With our reduction in turn, even complex processes with many parallel branches can be verified in less than 10 s. 相似文献