全文获取类型
收费全文 | 1049篇 |
免费 | 65篇 |
国内免费 | 17篇 |
专业分类
电工技术 | 11篇 |
综合类 | 6篇 |
化学工业 | 213篇 |
金属工艺 | 16篇 |
机械仪表 | 52篇 |
建筑科学 | 16篇 |
能源动力 | 75篇 |
轻工业 | 162篇 |
水利工程 | 17篇 |
石油天然气 | 2篇 |
无线电 | 129篇 |
一般工业技术 | 225篇 |
冶金工业 | 16篇 |
原子能技术 | 7篇 |
自动化技术 | 184篇 |
出版年
2024年 | 2篇 |
2023年 | 41篇 |
2022年 | 92篇 |
2021年 | 126篇 |
2020年 | 87篇 |
2019年 | 85篇 |
2018年 | 106篇 |
2017年 | 68篇 |
2016年 | 79篇 |
2015年 | 41篇 |
2014年 | 64篇 |
2013年 | 65篇 |
2012年 | 50篇 |
2011年 | 67篇 |
2010年 | 40篇 |
2009年 | 23篇 |
2008年 | 21篇 |
2007年 | 16篇 |
2006年 | 10篇 |
2005年 | 7篇 |
2004年 | 12篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1989年 | 1篇 |
1982年 | 2篇 |
排序方式: 共有1131条查询结果,搜索用时 0 毫秒
1.
AbstractIndustry 4.0 aims at providing a digital representation of a production landscape, but the challenges in building, maintaining, optimizing, and evolving digital models in inter-organizational production chains have not been identified yet in a systematic manner. In this paper, various Industry 4.0 research and technical challenges are addressed, and their present scenario is discussed. Moreover, in this article, the novel concept of developing experience-based virtual models of engineering entities, process, and the factory is presented. These models of production units, processes, and procedures are accomplished by virtual engineering object (VEO), virtual engineering process (VEP), and virtual engineering factory (VEF), using the knowledge representation technique of Decisional DNA. This blend of the virtual and physical domains permits monitoring of systems and analysis of data to foresee problems before they occur, develop new opportunities, prevent downtime, and even plan for the future by using simulations. Furthermore, the proposed virtual model concept not only has the capability of Query Processing and Data Integration for Industrial Data but also real-time visualization of data stream processing. 相似文献
2.
Fabrication and thermal characterization of a resistance temperature detector (RTD) heater and microthermocouples (MTs) on silicon substrates have been reported in this paper. The influence of film thickness and nickel-gold (Au) electroplating on RTD on its steady-state temperature with respect to its steady-state electrical power input and resistance is studied. Further, the thermal effects of multiple thermocouples in a thermopile as well as the effects of Au layers in the contact pads of the thermopiles on their open-circuit Seebeck voltage are studied. Therein lies the novelty of this paper. The in situ operating relationships for the RTD heater and the MT are provided 相似文献
3.
Kiani Azaz Ahmed Hafeez Yaser Imran Muhammad Ali Sadia 《The Journal of supercomputing》2021,77(8):8391-8432
The Journal of Supercomputing - Agile software development (ASD) and software product line (SPL) have shown significant benefits for software engineering processes and practices. Although both... 相似文献
4.
Silhouette-based human action recognition using SAX-Shapes 总被引:1,自引:0,他引:1
Human action recognition is an important problem in Computer Vision. Although most of the existing solutions provide good accuracy results, the methods are often overly complex and computationally expensive, hindering practical applications. In this regard, we introduce the combination of time-series representation for the silhouette and Symbolic Aggregate approXimation (SAX), which we refer to as SAX-Shapes, to address the problem of human action recognition. Given an action sequence, the extracted silhouettes of an actor from every frame are transformed into time series. Each of these time series is then efficiently converted into the symbolic vector: SAX. The set of all these SAX vectors (SAX-Shape) represents the action. We propose a rotation invariant distance function to be used by a random forest algorithm to perform the human action recognition. Requiring only silhouettes of actors, the proposed method is validated on two public datasets. It has an accuracy comparable to the related works and it performs well even in varying rotation. 相似文献
5.
Sutharshan Rajasegarar Alexander Gluhak Muhammad Ali Imran Michele Nati Masud Moshtaghi Christopher Leckie Marimuthu Palaniswami 《Pattern recognition》2014
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes. 相似文献
6.
Tariq Junaid Armghan Ammar Ijaz Amir Ashraf Imran 《Multimedia Tools and Applications》2021,80(14):21449-21464
Multimedia Tools and Applications - The High Efficiency Video Coding (HEVC) efficiently reduces the size of the multimedia contents, but at the cost of high computation complexity. In order to make... 相似文献
7.
区域水文要素复杂性研究是当今的热点问题,为了研究哈尔滨地区汛期径流量的复杂性特征及变化趋势,将R/S分析法和等概率粗粒化LZC算法引入到区域径流复杂性分析与变化趋势预测中,对地区内10个水文站点的汛期径流序列的复杂性进行诊断并对其变化趋势进行分析。研究结果表明:哈尔滨、通河、阿城、依兰、烟囱山各站未来的汛期径流量呈减少趋势,岔林河、莲花、西北河、延寿、四平山各站未来的汛期径流量呈增长趋势;各站点汛期径流序列的复杂度由高到低依次为:四平山、烟囱山、岔林河、阿城、西北河、依兰、莲花、通河、哈尔滨、延寿;从河流集水面积对其径流长程相关性和复杂性的影响可以看出,站点的河流集水面积越大,其径流量的长程相关性越强,复杂性指数越小。研究成果揭示了本地区汛期径流量的变化趋势以及复杂性演变特征,该特征可为区域径流预测及水资源优化配置提供科学依据。 相似文献
8.
Naveed Aslam Mirza Hikmat Ullah Khan Khalid Iqbal Saqib Iqbal Muhammad Imran 《New Review of Hypermedia and Multimedia》2013,19(4):335-345
ABSTRACTThe quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube. 相似文献
9.
Sajjad Ahmad Imran Raza M. Hasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《计算机、材料和连续体(英文)》2023,74(2):2363-2377
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes. 相似文献
10.