全文获取类型
收费全文 | 330篇 |
免费 | 20篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 73篇 |
金属工艺 | 2篇 |
机械仪表 | 4篇 |
建筑科学 | 18篇 |
矿业工程 | 1篇 |
能源动力 | 35篇 |
轻工业 | 20篇 |
水利工程 | 8篇 |
无线电 | 41篇 |
一般工业技术 | 35篇 |
冶金工业 | 8篇 |
原子能技术 | 1篇 |
自动化技术 | 99篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 16篇 |
2021年 | 17篇 |
2020年 | 7篇 |
2019年 | 16篇 |
2018年 | 15篇 |
2017年 | 17篇 |
2016年 | 11篇 |
2015年 | 11篇 |
2014年 | 11篇 |
2013年 | 24篇 |
2012年 | 29篇 |
2011年 | 38篇 |
2010年 | 19篇 |
2009年 | 23篇 |
2008年 | 11篇 |
2007年 | 22篇 |
2006年 | 9篇 |
2005年 | 2篇 |
2004年 | 9篇 |
2003年 | 7篇 |
2002年 | 4篇 |
2001年 | 5篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1987年 | 1篇 |
1979年 | 1篇 |
1976年 | 4篇 |
排序方式: 共有350条查询结果,搜索用时 15 毫秒
131.
Anna Tampoukou Alexandros Koutsouris Angeliki T. Paraskevopoulou 《Landscape Research》2013,38(5):610-620
The potential of Botanic Gardens (BGs) to contribute to environmental education is well documented. To what degree this potential is met concerning school students’ environmental education is to be considered. In Greece, Environmental Education Centres (EECs) develop Environmental Education Programmes (EEPs) for schools to implement. A questionnaire survey addressing teachers employed at the EECs in Greece investigated the use of BGs as a means of environmental education and identified their most important features in supporting school EEPs. Findings indicated that the majority of EEC teachers (90.6%) have not developed EEPs involving the use of BGs, although BGs were ranked as most suitable amongst other green spaces for conducting such programmes, particularly for primary school students. Teachers identified the need for BGs to be designed accordingly and provide the necessary infrastructure to be educationally effective that included facilitating teaching (e.g. open spaces, areas to congregate, easy access paths and indoor facilities) and plant-orientated elements as well as plant management displays. A strategy by BGs to promote their role in environmental education and a multidisciplinary design approach would maximise student benefit. 相似文献
132.
Agnieszka Kapa?ka Stéphane Fierro Zacharias Frontistis Alexandros Katsaounis Stefano Neodo Olivier Frey Nico de Rooij Kai M. Udert Christos Comninellis 《Electrochimica acta》2011,56(3):1361
The electrochemical oxidation of ammonia (NH4+/NH3) in sodium perchlorate was investigated on IrO2 electrodes prepared by two techniques: the thermal decomposition of H2IrCl6 precursor and the anodic oxidation of metallic iridium. The electrochemical behaviour of Ir(IV)/Ir(III) surface redox couple differs between the electrodes indicating that on the anodic iridium oxide film (AIROF) both, the surface and the interior of the electrode are electrochemically active whereas on the thermally decomposed iridium oxide films (TDIROF), mainly the electrode surface participates in the electrochemical processes.On both electrodes, ammonia is oxidized in the potential region of Ir(V)/Ir(IV) surface redox couple activity, thus, may involve Ir(V). During ammonia oxidation, TDIROF is deactivated, probably by adsorbed products of ammonia oxidation. To regenerate TDIROF, it is necessary to polarize the electrode in the hydrogen evolution region. On the contrary, AIROF seems not to be blocked during ammonia oxidation indicating its fast regeneration during the potential scan. The difference between both electrodes results from the difference in the activity of the iridium oxide surface redox couples. 相似文献
133.
Alexandros G. Fragkiadakis Vasilios A. Siris Nikolaos E. Petroulakis Apostolos P. Traganitis 《Wireless Communications and Mobile Computing》2015,15(2):276-294
We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the signal‐to‐interference‐plus‐noise ratio (SINR) executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms. The local algorithms fall into two categories: simple threshold that raise an alarm if the output of the SINR‐based metrics we consider deviates from a predefined detection threshold and cumulative sum (cusum) algorithms that raise an alarm if the aggregated output exceeds the predefined threshold. For collaborative detection, we use the Dempster–Shafer theory of evidence algorithm. We collect SINR traces from a real IEEE 802.11 network, and with the use of a new evaluation method, we evaluate both the local and the Dempster–Shafer algorithms in terms of the detection probability, false alarm rate, and their robustness to different detection threshold values, under different attack intensities. The evaluation shows that the cusums achieve higher performance than the simple threshold algorithms under all attack intensities. The Dempster–Shafer algorithm when combined with the simple algorithms, it can increase their performance by more than 80%, but for the cusum algorithms it does not substantially improve their already high performance.Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
134.
Remote Trap Passivation in Colloidal Quantum Dot Bulk Nano‐heterojunctions and Its Effect in Solution‐Processed Solar Cells
下载免费PDF全文
![点击此处可从《Advanced materials (Deerfield Beach, Fla.)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
135.
Motivated by the way R-trees are implemented in commercial databases systems, in this paper we examine several deletion techniques for R-trees. In particular, in commercial systems R-tree entries are mapped onto relational tables, which implement their own concurrency protocols on top of existing table-level concurrency mechanisms. In analogy, the actual industrial implementations of B-trees do not apply the well-known merging procedure from textbooks in case of node underflows, but rather they apply the free-at-empty technique. This way, space is sacrificed for the benefit of faster deletions and less locking operations, whereas the search performance practically remains unaffected. In this context, we examine the efficiency of modifications to the original R-tree deletion algorithm, which relax certain constraints of this algorithm and perform a controlled reorganization procedure according to a specified criterion. We present the modified algorithms and experimental results about the impact of these modifications on the tree quality, the execution time for the deletion operation and the processing time of search queries, considering several parameters. The experimental results indicate that the modified algorithms improve the efficiency of the deletion operation, while they do not affect the quality of the R-tree and its performance with respect to search operations. 相似文献
136.
Nicolas SPYRELLIS Evangelia A. PAVLATOU Styliani SPANOU Alexandros ZOIKIS-KARATHANASIS 《中国有色金属学会会刊》2009,19(4):800-804
Nickel and nickel-phosphorous matrix composite coatings reinforced by TiO2, SiC and WC particles were produced under direct and pulse current conditions from an additive-free Watts' type bath. The influence of the variable electrolysis parameters (type of current, frequency of current pulses and current density) and the reinforcing particles properties (type, size and concentration in the bath) on the surface morphology and the structure of the deposits was examined. It is demonstrated that the embedding of ceramic particles modifies in various ways the nickel electrocrystallisation process. On the other hand, Ni-P amorphous matrix is not affected by the occlusion of the particles. Overall, the imposition of pulse current conditions leads to composite coatings with increased embedded percentage and more homogenous distribution of particles in the matrix than coatings produced under direct current regime. 相似文献
137.
We present a novel and practical way to integrate techniques from computer vision to low bit-rate coding systems for video teleconferencing applications. Our focus is to locate and track the faces and selected facial features of persons in typical head-and-shoulders video sequences, and to exploit the location information in a ‘classical’ video coding/decoding system. The motivation is to enable the system to encode selectively various image areas and to produce perceptually pleasing coded images where faces are sharper. We refer to this approach—a mix of classical waveform coding and model—based coding-as model-assisted coding. We propose two totally automatic algorithms which, respectively, perform the detection of a head outline, and identify an ‘eyes-nose-mouth’ region, both from downsampled binary thresholded edge images. The algorithms operate accurately and robustly, even in cases of significant head rotation or partial occlusion by moving objects. We show how the information about face and facial feature location can be advantageously exploited by low bit-rate waveform-based video coders. In particular, we describe a method of object-selective quantizer control in a standard coding system based on motion-compensated discrete cosine transform—CCITT's recommendation H.261. The approach is based on two novel algorithms, namely buffer rate modulation and buffer size modulation. By forcing the rate control algorithm to transfer a fraction of the total available bit-rate from the coding of the non-facial to that of the facial area, the coder produces images with better-rendered facial features, i.e. coding artefacts in the facial area are less pronounced and eye contact is preserved. The improvement was found to be perceptually significant on video sequences coded at the ISDN rate of 64 kbps, with 48 kbps for the input (color) video signal in QCIF format. 相似文献
138.
Sarantis Paskalis Alexandros Kaloxylos Evangelos Zervas Lazaros Merakos 《Mobile Networks and Applications》2003,8(3):197-207
During the past years, several attempts have been made to develop functionality for mobility management support and QoS provision in the realm of the IP networks. Since IP was not designed to support such functionality, new protocols have been specified and implemented to tackle these issues. Mobile IP is currently the dominant protocol that allows users to retain connectivity while roaming in IP networks. RSVP (Resource reSerVation Protocol) is a well established protocol for reserving network resources to support QoS requirements. These protocols, when deployed separately, can work quite efficiently. However, if their functionality is combined, several inefficiencies arise in terms of QoS deterioration and misuse of the network resources. To minimize these inefficiencies, we propose a new approach that limits mobility and QoS related network modifications inside the domain, in which a user moves. The deployment of our scheme enhances the network resource usage efficiency, while minimizing the duration of the QoS deterioration experienced after a terminal movement. To quantify the advantages of our proposal, we have developed an analytical and a simulation model that we also present in this paper. 相似文献
139.
Christos Bouras Chryssi Chantzi Vaggelis Kapoulas Alexandros Panagopoulos Ioanna Sampraku Afrodite Sevasti 《International Journal of Communication Systems》2003,16(2):151-169
In our days, efficient management of the available network resources becomes a critical issue, both from a functional point of view (so that users can be provided with the bandwidth they need), and an economical point of view (so that carriers can satisfactorily and efficiently serve as many customers as possible and at the same time increase their revenue). In this paper we consider a bandwidth control scheme (i.e. managed bandwidth service) for an ATM network infrastructure which is applied to the Greek research and technology network (GRNET). We present some methods that we have tested (in a simulation setting) in order to increase the efficiency of the system and the utilization of the available bandwidth. More specifically, we consider a bandwidth‐resizing algorithm for virtual paths, in order to keep the allocated bandwidth very close to the bandwidth actually used. This leads to an increased number of accepted requests and better network utilization. We, also, use the simulation results in order to get an estimation of the effective bandwidth for VBR paths that can be used in call admission. Finally, we consider a semi‐offline scheme where requests are gathered and considered for acceptance in regular intervals. Simulation results show an increase in the utilization of resources. As a further improvement, we allow connections to be allocated a little before or after the time initially requested. This leads to further improvement in network utilization. All the improvement schemes were tested with the ATM‐TN simulator and the results look promising. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
140.
Efficient similarity search for market basket data 总被引:2,自引:0,他引:2
Alexandros Nanopoulos Yannis Manolopoulos 《The VLDB Journal The International Journal on Very Large Data Bases》2002,11(2):138-152
Several organizations have developed very large market basket databases for the maintenance of customer transactions. New
applications, e.g., Web recommendation systems, present the requirement for processing similarity queries in market basket
databases. In this paper, we propose a novel scheme for similarity search queries in basket data. We develop a new representation
method, which, in contrast to existing approaches, is proven to provide correct results. New algorithms are proposed for the
processing of similarity queries. Extensive experimental results, for a variety of factors, illustrate the superiority of
the proposed scheme over the state-of-the-art method.
Edited by R. Ng. Received: August 6, 2001 / Accepted: May 21, 2002 Published online: September 25, 2002 相似文献