全文获取类型
收费全文 | 8244篇 |
免费 | 496篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 65篇 |
综合类 | 7篇 |
化学工业 | 1713篇 |
金属工艺 | 109篇 |
机械仪表 | 179篇 |
建筑科学 | 310篇 |
矿业工程 | 21篇 |
能源动力 | 211篇 |
轻工业 | 1767篇 |
水利工程 | 100篇 |
石油天然气 | 35篇 |
无线电 | 383篇 |
一般工业技术 | 1168篇 |
冶金工业 | 1330篇 |
原子能技术 | 33篇 |
自动化技术 | 1318篇 |
出版年
2024年 | 19篇 |
2023年 | 87篇 |
2022年 | 143篇 |
2021年 | 232篇 |
2020年 | 209篇 |
2019年 | 234篇 |
2018年 | 337篇 |
2017年 | 318篇 |
2016年 | 338篇 |
2015年 | 269篇 |
2014年 | 363篇 |
2013年 | 657篇 |
2012年 | 550篇 |
2011年 | 561篇 |
2010年 | 415篇 |
2009年 | 396篇 |
2008年 | 384篇 |
2007年 | 359篇 |
2006年 | 274篇 |
2005年 | 217篇 |
2004年 | 189篇 |
2003年 | 167篇 |
2002年 | 147篇 |
2001年 | 119篇 |
2000年 | 80篇 |
1999年 | 91篇 |
1998年 | 529篇 |
1997年 | 286篇 |
1996年 | 200篇 |
1995年 | 115篇 |
1994年 | 83篇 |
1993年 | 84篇 |
1992年 | 34篇 |
1991年 | 24篇 |
1990年 | 17篇 |
1989年 | 23篇 |
1988年 | 18篇 |
1987年 | 22篇 |
1986年 | 19篇 |
1985年 | 24篇 |
1984年 | 13篇 |
1983年 | 11篇 |
1982年 | 8篇 |
1981年 | 16篇 |
1980年 | 11篇 |
1979年 | 4篇 |
1978年 | 5篇 |
1977年 | 14篇 |
1976年 | 20篇 |
1975年 | 5篇 |
排序方式: 共有8749条查询结果,搜索用时 15 毫秒
61.
Miguel A. Martínez-del-Amor Luis F. Macías-Ramos Luis Valencia-Cabrera Mario J. Pérez-Jiménez 《Natural computing》2016,15(4):565-573
Population Dynamics P systems are a type of multienvironment P systems that serve as a formal modeling framework for real ecosystems. The accurate simulation of these probabilistic models, e.g. with Direct distribution based on Consistent Blocks Algorithm, entails large run times. Hence, parallel platforms such as GPUs have been employed to speedup the simulation. In 2012, the first GPU simulator of PDP systems was presented. However, it was able to run only randomly generated PDP systems. In this paper, we present current updates made on this simulator, involving an input modu le for binary files and an output module for CSV files. Finally, the simulator has been experimentally validated with a real ecosystem model, and its performance has been tested with two high-end GPUs: Tesla C1060 and K40. 相似文献
62.
João Tavares Jorge Barbosa Ismael Cardoso Cristiano Costa Adenauer Yamin Rodrigo Real 《Universal Access in the Information Society》2016,15(4):589-607
This article proposes Hefestos, an intelligent system applied to ubiquitous accessibility. This model uses ubiquitous computing concepts to manage accessibility resources for people with disabilities. Among the concepts employed, context awareness, user profiles and trails management can be highlighted. The paper proposes an ontology for accessibility and delineates scenarios of its application in everyday life of people with disabilities. Moreover, the implementation of a smart wheelchair prototype and its application in a practical experiment is described. Ten users with a range of disability degrees tried the system and filled out a survey based on the technology acceptance model. This experiment demonstrated the main functionalities and the acceptance of the system. The results showed 96 % of acceptance regarding perceived easy of use and 98 % in perceived usefulness. These results were encouraging and show the potential for implementing Hefestos in real life situations. 相似文献
63.
Jose Garcia-Rodriguez Sergio Orts-Escolano Anastassia Angelopoulou Alexandra Psarrou Jorge Azorin-Lopez Juan Manuel Garcia-Chamizo 《Journal of Real-Time Image Processing》2016,11(4):731-749
This work describes a neural network based architecture that represents and estimates object motion in videos. This architecture addresses multiple computer vision tasks such as image segmentation, object representation or characterization, motion analysis and tracking. The use of a neural network architecture allows for the simultaneous estimation of global and local motion and the representation of deformable objects. This architecture also avoids the problem of finding corresponding features while tracking moving objects. Due to the parallel nature of neural networks, the architecture has been implemented on GPUs that allows the system to meet a set of requirements such as: time constraints management, robustness, high processing speed and re-configurability. Experiments are presented that demonstrate the validity of our architecture to solve problems of mobile agents tracking and motion analysis. 相似文献
64.
Jorge E. Camargo Juan C. Caicedo Fabio A. Gonzalez 《Journal of Visual Languages and Computing》2013,24(1):53-67
While search engines have been a successful tool to search text information, image search systems still face challenges. The keyword-based query paradigm used to search in image collection systems, which has been successful in text retrieval, may not be useful in scenarios where the user does not have the precise way to express a visual query. Image collection exploration is a new paradigm where users interact with the image collection to discover useful and relevant pictures. This paper proposes a framework for the construction of an image collection exploration system based on kernel methods, which offers a mathematically strong basis to address each stage of an image collection exploration system: image representation, summarization, visualization and interaction. In particular, our approach emphasizes a semantic representation of images using kernel functions, which can be seamlessly harnessed across all system components. Experiments were conducted with real users to verify the effectiveness and efficiency of the proposed strategy. 相似文献
65.
Carlos Gañán Jose L. Muñoz Oscar Esparza Jorge Mata-Díaz Juan Hernández-Serrano Juanjo Alins 《Journal of Network and Computer Applications》2013,36(5):1337-1351
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable. 相似文献
66.
Abraham Martín-Campillo Jon Crowcroft Eiko Yoneki Ramon Martí 《Journal of Network and Computer Applications》2013,36(2):870-880
Forwarding data in scenarios where devices have sporadic connectivity is a challenge. An example scenario is a disaster area, where forwarding information generated in the incident location, like victims' medical data, to a coordination point is critical for quick, accurate and coordinated intervention. New applications are being developed based on mobile devices and wireless opportunistic networks as a solution to destroyed or overused communication networks. But the performance of opportunistic routing methods applied to emergency scenarios is unknown today. In this paper, we compare and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them. 相似文献
67.
Marco Riccardi Roberto Di Pietro Marta Palanques Jorge Aguilà Vila 《Computer Networks》2013,57(2):422-435
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field. 相似文献
68.
Design and construction of an experimental pervious paved parking area to harvest reusable rainwater
Gomez-Ullate E Novo AV Bayon JR Hernandez JR Castro-Fresno D 《Water science and technology》2011,64(9):1942-1950
Pervious pavements are sustainable urban drainage systems already known as rainwater infiltration techniques which reduce runoff formation and diffuse pollution in cities. The present research is focused on the design and construction of an experimental parking area, composed of 45 pervious pavement parking bays. Every pervious pavement was experimentally designed to store rainwater and measure the levels of the stored water and its quality over time. Six different pervious surfaces are combined with four different geotextiles in order to test which materials respond better to the good quality of rainwater storage over time and under the specific weather conditions of the north of Spain. The aim of this research was to obtain a good performance of pervious pavements that offered simultaneously a positive urban service and helped to harvest rainwater with a good quality to be used for non potable demands. 相似文献
69.
70.
Félix Gómez Mármol Christoph Sorge Ronald Petrlic Osman Ugus Dirk Westhoff Gregorio Martínez Pérez 《International Journal of Information Security》2013,12(2):67-82
The recent deployment of smart grids promises to bring numerous advantages in terms of energy consumption reduction in both homes and businesses. A more transparent and instantaneous measurement of electricity consumption through smart meters utilization leads to an enhancement in the ability of monitoring, controlling and predicting energy usage. Nevertheless, it also has associated drawbacks related to the privacy of customers, since such management might reveal their personal habits, which electrical appliances they are using at each moment, whether they are at home or not, etc. In this work, we present a privacy-enhanced architecture for smart metering aimed at tackling this threat by means of encrypting individual measurements while allowing the electricity supplier to access the aggregation of the corresponding decrypted values. 相似文献