全文获取类型
收费全文 | 1859篇 |
免费 | 78篇 |
国内免费 | 15篇 |
专业分类
电工技术 | 43篇 |
综合类 | 7篇 |
化学工业 | 419篇 |
金属工艺 | 38篇 |
机械仪表 | 58篇 |
建筑科学 | 72篇 |
矿业工程 | 6篇 |
能源动力 | 151篇 |
轻工业 | 177篇 |
水利工程 | 14篇 |
石油天然气 | 23篇 |
无线电 | 219篇 |
一般工业技术 | 303篇 |
冶金工业 | 107篇 |
原子能技术 | 14篇 |
自动化技术 | 301篇 |
出版年
2024年 | 10篇 |
2023年 | 45篇 |
2022年 | 84篇 |
2021年 | 100篇 |
2020年 | 83篇 |
2019年 | 83篇 |
2018年 | 100篇 |
2017年 | 101篇 |
2016年 | 88篇 |
2015年 | 48篇 |
2014年 | 92篇 |
2013年 | 171篇 |
2012年 | 119篇 |
2011年 | 133篇 |
2010年 | 94篇 |
2009年 | 98篇 |
2008年 | 75篇 |
2007年 | 61篇 |
2006年 | 33篇 |
2005年 | 24篇 |
2004年 | 22篇 |
2003年 | 24篇 |
2002年 | 22篇 |
2001年 | 23篇 |
2000年 | 16篇 |
1999年 | 17篇 |
1998年 | 22篇 |
1997年 | 23篇 |
1996年 | 20篇 |
1995年 | 20篇 |
1994年 | 16篇 |
1993年 | 4篇 |
1992年 | 10篇 |
1991年 | 4篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1985年 | 10篇 |
1984年 | 6篇 |
1983年 | 9篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1970年 | 1篇 |
排序方式: 共有1952条查询结果,搜索用时 0 毫秒
161.
In the past few years the telecommunications industry has undergone significant changes. We are rapidly evolving to a state where audio/visual and data traffic is all provided on the same networks. Telecommunication companies are investing billions of dollars in the design and maintenance of telecommunication networks to provide the users with the better quality of service that they have begun to expect. Due to their high capacity, fiber optic cables have become the medium of choice in the deployment of such new networks worldwide. Such high capacities encourage telecommunication providers to create networks that are substantially more sparse than previous copper based networks. Unfortunately, with sparsity comes vulnerability to failure. Given the dependence on the varied services offered by the modern networks, the magnitudes of the investments involved and the costs of disasters it is only logical that researchers look at problems in survivable network design as an interesting research question. There have been a number of papers that have addressed these and other related issues. In this paper we try to classify the area of survivable network design and provide a classification scheme for the same. 相似文献
162.
Din Salah Ud Shao Junming Kumar Jay Mawuli Cobbinah Bernard Mahmud S. M. Hasan Zhang Wei Yang Qinli 《Knowledge and Information Systems》2021,63(9):2231-2276
Knowledge and Information Systems - Developing effective and efficient data stream classifiers is challenging for the machine learning community because of the dynamic nature of data streams. As a... 相似文献
163.
Surgical robots are increasingly being used in operation theaters involving normal or laparoscopic surgeries. The working of these surgical robots is highly dependent on their control algorithms, which require very rigorous analysis to ensure their correct functionality due to the safety-critical nature of surgeries. Traditionally, safety of control algorithms is ensured by simulations, but they provide incomplete and approximate analysis results due to their inherent sampling-based nature. We propose to use probabilistic model checking, which is a formal verification method, for quantitative analysis, to verify the control algorithms of surgical robots in this paper. As an illustrative example, the paper provides a formal analysis of a virtual fixture control algorithm, implemented in a neuro-surgical robot, using the PRISM model checker. In particular, we provide a formal discrete-time Markov chain-based model of the given control algorithm and its environment. This formal model is then analyzed for multiple virtual fixtures, like cubic, hexagonal and irregular shapes. This verification allowed us to discover new insights about the considered algorithm that allow us to design safer control algorithms. 相似文献
164.
H. Jaafar K. S. Beh N. A. M. Yunus W. Z. W. Hasan S. Shafie O. Sidek 《Microsystem Technologies》2014,20(12):2109-2121
This paper emphasis on state-of-the-art of the earlier until the current trend and demand, principles, design considerations, key performance and fabrication technology of RF MEMS switch devices developed over the past few years. RF MEMS switch performance and features such as actuation voltage, insertion loss, isolation and ease with cost of fabrication and applications are compared and discussed. 相似文献
165.
The calculation of the degree d of an approximate greatest common divisor of two inexact polynomials f(y) and g(y) reduces to the determination of the rank loss of a resultant matrix, the entries of which are functions of the coefficients of f(y) and g(y). This paper considers this issue by describing two methods to calculate d, such that knowledge of the noise level imposed on the coefficients of f(y) and g(y) is not assumed. One method uses the residual of a linear algebraic equation whose coefficient matrix and right hand side vector are derived from the Sylvester resultant matrix S(f,g), and the other method uses the first principal angle between a line and a hyperplane, the equations of which are calculated from S(f,g). Computational results on inexact polynomials whose exact forms have multiple roots of high degree are shown and very good results are obtained. These results are compared with the rank loss of S(f,g) for the calculation of d, and it is shown that this method yields incorrect results for these examples. 相似文献
166.
Effects of interface style on user perceptions and behavioral intention to use computer systems 总被引:1,自引:0,他引:1
This study examines the influence of two interface styles (menu- and command-based) on the perceived ease of use, perceived usefulness, and behavioral intention of the user to use the system. We have treated the system interface style as an external factor in the technology acceptance model (TAM) to examine its direct and indirect effects on behavioral intention to accept and use a system. The results showed that the interface style had direct effects on perceived ease of use and perceived usefulness which, in turn, demonstrated significant effects on behavioral intention to use the system. Further, the results showed that perceptions of the menu-based interface were more favorable than perceptions of the command-based interface. These results provide several theoretical and practical implications for designing an effective system. 相似文献
167.
Iqtadar Hussain Tariq Shah Muhammad Asif Gondal Waqar Ahmad Khan Hasan Mahmood 《Neural computing & applications》2013,23(1):97-104
In this paper, we present a method to construct a substitution box used in encryption applications. The proposed algorithm for the construction of substitution box relies on the linear fractional transform method. The design methodology is simple, while the confusion-creating ability of the new substitution box is complex. The strength of the proposed substitution box is evaluated, and an insight is provided to quantify the confusion-creating ability. In addition, tests are performed to assess the vulnerability of the encrypted data to algebraic and statistical attacks. The substitution box is critically analyzed by strict avalanche criterion, bit independent criterion, differential approximation probability test, linear approximation probability test, non-linearity test, and majority logic criterion. The performance of the proposed substitution box is also compared with those of some of the well-known counterparts including AES, APA, Gray, S8, Skipjack, Xyi, and prime of residue substitution boxes. It is apparent that the performance, in terms of confusion-creating ability, of the new substitution box is better than those of some of the existing non-linear components used in encryption systems. The majority logic criterion is applied to these substitution boxes to further evaluate the strength and usefulness. 相似文献
168.
It is envisaged that the application of the multilevel security (MLS) scheme will enhance flexibility and effectiveness of authorization policies in shared enterprise databases and will replace cumbersome authorization enforcement practices through complicated view definitions on a per user basis. However, the critical problem with the current model is that the belief at a higher security level is cluttered with irrelevant or inconsistent data as no mechanism for attenuation is supported. Critics also argue that it is imperative for MLS database users to theorize about the belief of others, perhaps at different security levels, an apparatus that is currently missing and the absence of which is seriously felt.The impetus for our current research is the need to provide an adequate framework for belief reasoning in MLS databases. In this paper, we show that these concepts can be captured in a F-logic style declarative query language, called MultiLog, for MLS deductive databases for which a proof theoretic, model theoretic and fixpoint semantics exist. This development is significant from a database perspective as it now enables us to compute the semantics of MultiLog databases in a bottom-up fashion. We also define a bottom-up procedure to compute unique models of stratified MultiLog databases. Finally, we establish the equivalence of MultiLog's three logical characterizations—model theory, fixpoint theory and proof theory. 相似文献
169.
Berna?Tektas?Sivrikaya Ferhan?Cebi Hasan?Hüseyin?Turan Nihat?Kasap Dursun?DelenEmail author 《Information Systems Frontiers》2017,19(5):975-991
We study the long-term generation capacity investment problem of an independent power generation company (GenCo) that functions in an environment where GenCos perform business with both bilateral contracts (BC) and transactions in the day-ahead market (DAM). A fuzzy mixed integer linear programming model with a fuzzy objective and fuzzy constraints is developed to incorporate the impacts of imprecision/uncertainty in the economic environment on the calculation of the optimal value of the GenCo’s objective function. In formulating the fuzzy objective function we also include the potential impacts of climate change on the energy output of hydroelectric power plants. In addition to formulating and solving the capacity planning/investment problem, we also performed scenario-based (sensitivity) analysis to explore how investment decisions of the GenCos change when fuzziness (tolerance) in the maximum energy output of hydroelectric units and/or drought expectation increases. The proposed model is novel and investigates the effects of factors like drought expectations of climate changes, hydroelectric power plant investments, and other power generation technology investment options. 相似文献
170.
Adnan Hasan Bdair Aighuraibawi Selvakumar Manickam Rosni Abdullah Zaid Abdi Alkareem Alyasseri Ayman Khallel Dilovan Asaad Zebari Hussam Mohammed Jasim Mazin Mohammed Abed Zainb Hussein Arif 《计算机系统科学与工程》2023,47(1):553-574
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS. 相似文献