首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   270篇
  免费   17篇
  国内免费   2篇
电工技术   14篇
综合类   1篇
化学工业   67篇
金属工艺   9篇
机械仪表   5篇
建筑科学   2篇
能源动力   31篇
轻工业   14篇
水利工程   4篇
石油天然气   5篇
无线电   30篇
一般工业技术   58篇
冶金工业   20篇
原子能技术   5篇
自动化技术   24篇
  2024年   5篇
  2023年   2篇
  2022年   4篇
  2021年   14篇
  2020年   10篇
  2019年   17篇
  2018年   23篇
  2017年   17篇
  2016年   24篇
  2015年   12篇
  2014年   11篇
  2013年   28篇
  2012年   11篇
  2011年   21篇
  2010年   12篇
  2009年   13篇
  2008年   9篇
  2007年   11篇
  2006年   3篇
  2005年   6篇
  2004年   3篇
  2003年   3篇
  2002年   3篇
  2000年   2篇
  1999年   1篇
  1998年   6篇
  1997年   5篇
  1996年   1篇
  1994年   2篇
  1993年   2篇
  1990年   2篇
  1988年   1篇
  1987年   2篇
  1986年   2篇
  1984年   1篇
排序方式: 共有289条查询结果,搜索用时 15 毫秒
1.
Ye  Liang  Yan  Susu  Zhen  Jialing  Han  Tian  Ferdinando  Hany  Seppänen  Tapio  Alasaarela  Esko 《Mobile Networks and Applications》2022,27(4):1688-1699
Mobile Networks and Applications - In recent years, physical violence detection has become a research hotspot in the area of human activity recognition. With the improvement and full coverage of...  相似文献   
2.
We evaluate the performance of the Crosier's cumulative sum (C‐CUSUM) control chart when the probability distribution parameters of the underlying quality characteristic are estimated from Phase I data. Because the average run length (ARL) under estimated parameters is a random variable, we study the estimation effect on the chart performance in terms of the expected value of the average run length (AARL) and the standard deviation of the average run length (SDARL). Previous evaluations of this control chart were conducted while assuming known process parameters. Using the Markov chain and simulation approaches, we evaluate the in‐control performance of the chart and provide some quantiles for its in‐control ARL distribution under estimated parameters. We also compare the performance of the C‐CUSUM chart to that of the ordinary CUSUM (O‐CUSUM) chart when the process parameters are unknown. Our results show that large number of Phase I samples are required to achieve a quite reasonable performance. Additionally, the performance of the C‐CUSUM chart is found to be superior to that of the O‐CUSUM chart. Finally, we recommend the use of a recently proposed bootstrap procedure in designing the C‐CUSUM chart to guarantee, at a certain probability, that the in‐control ARL will be of at least the desired value using the available amount of Phase I data. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
3.
Unmanned aerial vehicles (UAVs) have shown promising benefits in many applications. This has been enabled by the emergence of additive manufacturing (AM), which give the designers a large amount of geometrical freedom. In this paper, a novel design process of fused deposition modeling (FDM) combining both topology and infill optimization is introduced for AM of high performance porous structures. Tensile testing of FDM printed samples is first carried out to study the effect of the build orientation on the mechanical properties of acrylonitrile butadiene styrene (ABS) samples. It is found that samples built perpendicular to the load axis are the weakest with a tensile strength of 29 MPa and Young's modulus of 1960 MPa. The materials properties are fed to the finite elements analysis (FEA) for geometrical topology optimization, aiming to maximize stiffness and reduce weight of those parts. Afterwards, an infill optimization is carried out on the topology optimized parts using different mesostructures such as honeycomb, triangular, and rectangular to achieve high structural performance. The results showed that triangular pattern with 50% infill density had the lowest developed stresses, less mass, and strain energy when compared to other structures. Optimum UAVs parts of a quadcopter are successfully manufactured, assembled, and tested.
  相似文献   
4.
In this report we present for the first time strong evidence for autosomal-dominant inheritance of grant liver hemangiomas. Furthermore, we review the current literature about incidence, pathogenesis, clinics, as well as diagnostic and therapeutic aspects of LH. A large family of Italian origin is described where three female patients in three successive generations suffered from large symptomatic LH. In addition, two other female relatives exhibited asymptomatic LH on sonographic scans. The restriction of the disease to the female gender could be explained by a sex-dependent difference in penetrance or expressivity of a presumable "liver-hemangioma" gene, or by known proliferative factors such as female sex hormones. We also observed an increased incidence of adenomas of the thyroidea among members with or without LH of the presented family. This uncommon familial association has also not yet been described and its genetic aspects are discussed.  相似文献   
5.
One of the most significant difficulties with developing Service-Oriented Architecture (SOA) involves meeting its security challenges, since the responsibilities of SOA security are based on both the service providers and the consumers. In recent years, many solutions to these challenges have been implemented, such as the Web Services Security Standards, including WS-Security and WS-Policy. However, those standards are insufficient for the new generation of Web technologies, including Web 2.0 applications. In this research, we propose an intelligent SOA security framework by introducing its two most promising services: the Authentication and Security Service (NSS), and the Authorization Service (AS). The suggested autonomic and reusable services are constructed as an extension of WS-1 security standards, with the addition of intelligent mining techniques, in order to improve performance and effectiveness. In this research, we apply three different mining techniques: the Association Rules, which helps to predict attacks, the Online Analytical Processing (OLAP) Cube, for authorization, and clustering mining algorithms, which facilitate access control rights representation and automation. Furthermore, a case study is explored to depict the behavior of the proposed services inside an SOA business environment. We believe that this work is a significant step towards achieving dynamic SOA security that automatically controls the access to new versions of Web applications, including analyzing and dropping suspicious SOAP messages and automatically managing authorization roles.  相似文献   
6.
7.
8.
In this article, the authors examine how the internal audit function maintains its legitimacy when enterprise resource planning systems are introduced. This work centers on an in-depth case study of a multinational bank and finds that enterprise resource planning systems impose an institutional logic of control based on interlinked assumptions. These assumptions motivate changes in the practice and structure of the internal audit function to become an integrated and comprehensive function to maintain its legitimacy.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号