全文获取类型
收费全文 | 899篇 |
免费 | 42篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 12篇 |
综合类 | 1篇 |
化学工业 | 236篇 |
金属工艺 | 22篇 |
机械仪表 | 23篇 |
建筑科学 | 14篇 |
矿业工程 | 2篇 |
能源动力 | 73篇 |
轻工业 | 45篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 79篇 |
一般工业技术 | 191篇 |
冶金工业 | 30篇 |
原子能技术 | 2篇 |
自动化技术 | 214篇 |
出版年
2024年 | 9篇 |
2023年 | 44篇 |
2022年 | 47篇 |
2021年 | 72篇 |
2020年 | 48篇 |
2019年 | 53篇 |
2018年 | 70篇 |
2017年 | 51篇 |
2016年 | 43篇 |
2015年 | 27篇 |
2014年 | 37篇 |
2013年 | 69篇 |
2012年 | 47篇 |
2011年 | 58篇 |
2010年 | 50篇 |
2009年 | 44篇 |
2008年 | 39篇 |
2007年 | 36篇 |
2006年 | 32篇 |
2005年 | 20篇 |
2004年 | 10篇 |
2003年 | 7篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 3篇 |
排序方式: 共有947条查询结果,搜索用时 15 毫秒
1.
Ankur Das Rahul Caprihan 《The International Journal of Advanced Manufacturing Technology》2008,38(11-12):1098-1113
Manufacturing flexibility is a difficult to quantify concept that defies universal definition. This paper presents a novel fuzzy-logic approach for measuring manufacturing flexibility that exploits linguistic variables for quantifying pertinent factors affecting commonly utilized flexibility types. Towards this end, we identify and measure the contribution of specified state variables towards the assumed flexibility types in order to compute an overall flexibility index for a generic manufacturing system. The suggested framework provides a convenient end user approach amenable to software implementation that is exemplified through the development of a prototypical software tool called “Flexibility Evaluator”. 相似文献
2.
Metallurgical and Materials Transactions A - The design of high entropy alloys (HEAs) can be accelerated using machine learning (ML) algorithms. In the current study, the design parameter’s... 相似文献
3.
Knowledge of the information goal of users is critical in website design, analyzing the efficacy of such designs, and in ensuring effective user-access to
desired information. Determining the information goal is complex due to the subjective and latent nature of user information
needs. This challenge is further exacerbated in media-rich websites since the semantics of media-based information is context-based
and emergent. A critical step in determining information goals lies in the identification of content pages. These are the pages which contain the information the user seeks. We propose a method to automatically determine the content
pages by taking into account the organization of the web site, the media-based information content, as well as the influence
of a specific user browsing pattern. Given a specific browsing pattern, in our method, putative content pages are identified
as the pages corresponding to the local minima of page-content entropy values. For an (unknown) user information goal this
intuitively corresponds to modeling the progressive transition of the user from pages with generic information to those with
specific information. Experimental investigations on media rich sites demonstrate the effectiveness of the technique and underline
its potential in modeling user information needs and actions in a media-rich web. 相似文献
4.
Information Systems and e-Business Management - Collaborative filtering (CF) is a popular and widely accepted recommendation technique. CF is an automated form of word-of-mouth communication... 相似文献
5.
M. K. Tiwari Niraj Sinha Shailendra Kumar Rahul Rai S. K. Mukhopadhyay 《国际生产研究杂志》2013,51(5):1113-1129
In order to protect the environment and regain value added to products, a process known as disassembly has come into the limelight. This process is to be applied to reuse abandoned goods and materials. Manufacturers are being forced to establish disassembly plants and to develop their products' designs so as to maintain the government's dictate to dispose off their products in an environmentally responsible manner. This research presents a cost-based heuristic analysis for a circuit board assembly. Various components of the product and their assembly relationships are represented by a Petri Net diagram. Firing the transitions of the disassembly Petri Net is integrated with cost-based indices to develop an effective disassembly strategy. The methodology discussed here simplifies the decisionmaking process involved in disassembly planning. A comprehensive disassembly process planning system is proposed here and is exemplified by a case study of circuit board assembly. 相似文献
6.
The effect of bending strain on current carrying capacity of MgB2 multifilamentary wires was studied with 4, 8 and 16 multifilamentary wires. The critical current density (JC) of straight wires and bent wires with 5, 10, and 15 cm diameter was measured. Both annealed & bent and bent & annealed wires were used for measurement. The JC of annealed & bent wires were found to decrease with decrease in bent diameter and the rate of degradation of JC decreased with increasing number of filaments, while bent & annealed wires almost retained its JC at all diameters studied. 相似文献
7.
Rahul Shukla Pier Luigi Dragotti Minh N Do Martin Vetterli 《IEEE transactions on image processing》2005,14(3):343-359
This paper presents novel coding algorithms based on tree-structured segmentation, which achieve the correct asymptotic rate-distortion (R-D) behavior for a simple class of signals, known as piecewise polynomials, by using an R-D based prune and join scheme. For the one-dimensional case, our scheme is based on binary-tree segmentation of the signal. This scheme approximates the signal segments using polynomial models and utilizes an R-D optimal bit allocation strategy among the different signal segments. The scheme further encodes similar neighbors jointly to achieve the correct exponentially decaying R-D behavior (D(R) - c(o)2(-c1R)), thus improving over classic wavelet schemes. We also prove that the computational complexity of the scheme is of O(N log N). We then show the extension of this scheme to the two-dimensional case using a quadtree. This quadtree-coding scheme also achieves an exponentially decaying R-D behavior, for the polygonal image model composed of a white polygon-shaped object against a uniform black background, with low computational cost of O(N log N). Again, the key is an R-D optimized prune and join strategy. Finally, we conclude with numerical results, which show that the proposed quadtree-coding scheme outperforms JPEG2000 by about 1 dB for real images, like cameraman, at low rates of around 0.15 bpp. 相似文献
8.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
9.
Pal Debasish Singhal Rahul Bandyopadhyay Ayan Kumar 《Wireless Personal Communications》2022,124(2):1897-1897
Wireless Personal Communications - 相似文献
10.
Ferdous Khan James O. Smith Janos M. Kanczler Rahul. S. Tare Richard O.C. Oreffo Mark Bradley 《Advanced functional materials》2013,23(22):2850-2862
Skeletal tissue regeneration is often required following trauma, where substantial bone or cartilage loss may be encountered and is a significant driver for the development of biomaterials with a defined 3D structural network. Solvent blending is a process that avoids complications associated with conventional thermal or mechanical polymer blending or synthesis, opening up large areas of chemical and physical space, while potentially simplifying regulatory pathways towards in vivo application. Here ternary mixtures of natural and synthetic polymers were solvent blended and evaluated as potential bone tissue engineering matrices for osteoregeneration by the assessment of growth and differentiation of STRO‐1+ skeletal stem cells. Several of the blend materials were found to be excellent supports for human bone marrow‐derived STRO‐1+ skeletal cells and fetal skeletal cells, with the optimized blend exhibiting in vivo osteogenic potential, suggesting that these polymer blends could act as suitable matrices for bioengineering of hard tissues. 相似文献