全文获取类型
收费全文 | 666篇 |
免费 | 26篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 179篇 |
金属工艺 | 17篇 |
机械仪表 | 7篇 |
建筑科学 | 13篇 |
能源动力 | 22篇 |
轻工业 | 76篇 |
水利工程 | 5篇 |
石油天然气 | 4篇 |
无线电 | 59篇 |
一般工业技术 | 126篇 |
冶金工业 | 58篇 |
原子能技术 | 3篇 |
自动化技术 | 119篇 |
出版年
2024年 | 2篇 |
2023年 | 14篇 |
2022年 | 20篇 |
2021年 | 28篇 |
2020年 | 22篇 |
2019年 | 18篇 |
2018年 | 24篇 |
2017年 | 18篇 |
2016年 | 21篇 |
2015年 | 13篇 |
2014年 | 26篇 |
2013年 | 48篇 |
2012年 | 53篇 |
2011年 | 59篇 |
2010年 | 49篇 |
2009年 | 33篇 |
2008年 | 33篇 |
2007年 | 30篇 |
2006年 | 36篇 |
2005年 | 19篇 |
2004年 | 15篇 |
2003年 | 16篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 7篇 |
1999年 | 9篇 |
1998年 | 19篇 |
1997年 | 16篇 |
1996年 | 5篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1976年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有693条查询结果,搜索用时 15 毫秒
61.
Ixent Galpin Alvaro A. A. Fernandes Norman W. Paton 《The VLDB Journal The International Journal on Very Large Data Bases》2013,22(4):495-517
The resource-constrained nature of mote-level wireless sensor networks (WSNs) poses challenges for the design of a general-purpose sensor network query processors (SNQPs). Existing SNQPs tend to generate query execution plans (QEPs) that are selected on the basis of a fixed, implicit expectation, for example, that energy consumption should be kept as small as possible. However, in WSN applications, the same query may be subject to several, possibly conflicting, quality-of-service (QoS) expectations concomitantly (for example maximizing data acquisition rates subject to keeping energy consumption low). It is also not uncommon for the QoS expectations to change over the lifetime of a deployment (for example from low to high data acquisition rates). This paper describes optimization algorithms that respond to stated QoS expectations (about acquisition rate, delivery time, energy consumption and lifetime) when making routing, placement, and timing decisions for in-WSN query processing. The paper shows experimentally that QoS-awareness offers significant benefits in responding to, and reconciling, diverse QoS expectations, thereby enabling QoS-aware SNQPs to generate efficient QEPs for a broader range WSN applications than has hitherto been possible. 相似文献
62.
Lu??s Antunes Armando Matos Alexandre Pinto Andr?? Souto Andreia Teixeira 《Theory of Computing Systems》2013,52(1):162-178
We prove several results relating injective one-way functions, time-bounded conditional Kolmogorov complexity, and time-bounded conditional entropy. First we establish a connection between injective, strong and weak one-way functions and the expected value of the polynomial time-bounded Kolmogorov complexity, denoted here by?E(K t (x|f(x))). These results are in both directions. More precisely, conditions on?E(K t (x|f(x))) that imply that?f is a weak one-way function, and properties of?E(K t (x|f(x))) that are implied by the fact that?f is a strong one-way function. In particular, we prove a separation result: based on the concept of time-bounded Kolmogorov complexity, we find an interval in which every function?f is a necessarily weak but not a strong one-way function. Then we propose an individual approach to injective one-way functions based on Kolmogorov complexity, defining Kolmogorov one-way functions and prove some relationships between the new proposal and the classical definition of one-way functions, showing that a Kolmogorov one-way function is also a deterministic one-way function. A relationship between Kolmogorov one-way functions and the conjecture of polynomial time symmetry of information is also proved. Finally, we relate?E(K t (x|f(x))) and two forms of time-bounded entropy, the unpredictable entropy?H unp, in which ??one-wayness?? of a function can be easily expressed, and the Yao+ entropy, a measure based on compression/decompression schema in which only the decompressor is restricted to be time-bounded. 相似文献
63.
Compiler Verification has been identified as a vital process in the implementation of correct safety-critical systems. We extend here Hoare's refinement-algebra approach to compilation in order to include real-time languages in which processes interact asynchronously via communication queues. The existence of unique fixed-points is exploited to verify the implementation of crucial operators such as asynchronous input, delay and timeout. 相似文献
64.
Mauricio Casares Senem Velipasalar Alvaro Pinto 《Computer Vision and Image Understanding》2010,114(11):1223-1237
An embedded smart camera is a stand-alone unit that not only captures images, but also includes a processor, memory and communication interface. Battery-powered, embedded smart cameras introduce many additional challenges since they have very limited resources, such as energy, processing power and memory. Computer vision algorithms running on these camera boards should be light-weight and efficient. Considering the memory requirements of an algorithm and its portability to an embedded processor should be an integral part of the algorithm design in addition to the accuracy requirements. This paper presents a light-weight and efficient background modeling and foreground detection algorithm that is highly robust against lighting variations and non-static backgrounds including scenes with swaying trees, water fountains and rain. Compared to many traditional methods, the memory requirement for the data saved for each pixel is very small in the proposed algorithm. Moreover, the number of memory accesses and instructions are adaptive, and are decreased depending on the amount of activity in the scene. Each pixel is treated differently based on its history, and instead of requiring the same number of memory accesses and instructions for every pixel, we require less instructions for stable background pixels. The plot of the number of unstable pixels at each frame also serves as a tool to find the video portions with high activity. The proposed method selectively updates the background model with an automatically adaptive rate, thus can adapt to rapid changes. As opposed to traditional methods, pixels are not always treated individually, and information about neighbors is incorporated into decision making. The results obtained with nine challenging outdoor and indoor sequences are presented, and compared with the results of different state-of-the-art background subtraction methods. The ROC curves and memory comparison of different background subtraction methods are also provided. The experimental results demonstrate the success of the proposed light-weight salient foreground detection method. 相似文献
65.
Manuel Alvar Andrea Torsello Alvaro Sanchez-Miralles José María Armingol 《Machine Vision and Applications》2014,25(5):1351-1368
Smart surveillance systems are increasingly being used to detect potentially dangerous situations. To do so, the common and easier way is to model normal human behaviors and consider as abnormal any new strange behavior in the scene. In this article, Dominant Sets is adapted to model most frequent behaviors and to detect any unknown event to trigger an alarm. It is proved that after an unsupervised training, Dominant Sets can robustly detect abnormal behaviors. The method is tested in several different cases and compared to other usual clusterization methods such as KNN, mixture of Gaussians or Fuzzy \(K\) -Means to confirm its robustness and performance. The overall performance of abnormal behavior detection based on Dominant Sets is better, being the error ratio at least \(1.5\) points lower than the others. 相似文献
66.
Tony Salvador John W. Sherry Alvaro E. Urrutia 《Information Technology for Development》2013,19(1):77-95
About 10% of the world has access to information and communication technologies (ICTs). Telecenters and cyber cafés are one prevalent way to increase access. This paper suggests increasing access through currently existing, local businesses where people already gather and where proprietors already posses existing business relationships with suppliers and customers. This paper questions the prevailing emphasis on the “cyber'' characteristics of access, e.g., computing and internet access as is currently known, and attempts to refocus the conversation by considering computing and access in the context of the “café,” e.g., as public life in the sense of Habermas, which permits an in situ evolution of relevant access. This analysis is based on extant literature and direct ethnographic research in several public places in six countries. We offer example design perspectives based on a reflection of “third places” as inspiration for appropriate innovation in the provision of computing and communications. © 2005 Wiley Periodicals, Inc. 相似文献
67.
The scanning electrochemical microscope (SECM) is a non-optical scanning microscopic instrument capable of imaging highly localized electrical currents associated with charge transfer reactions occurring in the vicinity of the surface of coated metals. The SECM tip operates as working microelectrode in an electrochemical cell under potentiostatic control. Microelectrode current and position is recorded as the tip is scanned very near a coated sample at a constant Z height, and variations in the faradaical current measured at selected tip potential values can be related to changes in the local concentration of electroactive species involved in corrosion reactions occurring at the substrate. Carbon steel samples coated with polyurethane in which a holiday was produced prior to immersion in different aqueous electrolytes were investigated with this technique. The release of Fe(II) ionic species into the solution phase from local anodic sites, as well as the consumption of dissolved oxygen at the corresponding cathodic locations was successfully monitored. 相似文献
68.
Ojeda A Frías A González R Linares Z Pizzani P 《Archivos latinoamericanos de nutrición》2010,60(1):93-98
In order to evaluate the variability in concentration of secondary metabolites among grains from different sorghum hybrids (Sorghum bicolor (L) Moench) and provide some information for rational use in animal feeds, grain samples were collected from 12 hybrids (Criollo 1, Criollo 27, Chaguaramas III, Chaguaramas VII, Cristiani Burkard H-8046-2, Guanipa 95, Himeca 101, Himeca 400, Pioneer 81-G67, Pioneer 83-G88, Pioneer 86-P42 y Tecsem 120) sowed on 2008 in the Turén municipality, Portuguesa State-Venezuela. Using standardized analytical methods, hybrids showed polyphenolics compounds contents (0.92 +/- 0.37% TaE), total (0.61 +/- 0.29% TaE) and condensed tannins (0.95 +/- 0.65% LeuE), phytic phosphorus (0.17 +/- 0.03%) and intrinsic phytase activity (12.3 +/- 6.74 U/kg) in the ranges described in the literature, with an important variation among hybrids that must be considered for their inclusion levels in the formulation of balanced feeds, as well as plant breeding programs. 相似文献
69.
Isaac Jardin Alejandro Berna-Erro Joel Nieto-Felipe Alvaro Macias Jose Sanchez-Collado Jose J. Lopez Gines M. Salido Juan A. Rosado 《International journal of molecular sciences》2022,23(23)
Orai1, the first identified member of the Orai protein family, is ubiquitously expressed in the animal kingdom. Orai1 was initially characterized as the channel responsible for the store-operated calcium entry (SOCE), a major mechanism that allows cytosolic calcium concentration increments upon receptor-mediated IP3 generation, which results in intracellular Ca2+ store depletion. Furthermore, current evidence supports that abnormal Orai1 expression or function underlies several disorders. Orai1 is, together with STIM1, the key element of SOCE, conducting the Ca2+ release-activated Ca2+ (CRAC) current and, in association with TRPC1, the store-operated Ca2+ (SOC) current. Additionally, Orai1 is involved in non-capacitative pathways, as the arachidonate-regulated or LTC4-regulated Ca2+ channel (ARC/LRC), store-independent Ca2+ influx activated by the secretory pathway Ca2+-ATPase (SPCA2) and the small conductance Ca2+-activated K+ channel 3 (SK3). Furthermore, Orai1 possesses two variants, Orai1α and Orai1β, the latter lacking 63 amino acids in the N-terminus as compared to the full-length Orai1α form, which confers distinct features to each variant. Here, we review the current knowledge about the differences between Orai1α and Orai1β, the implications of the Ca2+ signals triggered by each variant, and their downstream modulatory effect within the cell. 相似文献
70.
Christof Huebner Rachel Cardell‐Oliver Stefan Hanelt Tino Wagenknecht Alvaro Monsalve 《Wireless Communications and Mobile Computing》2013,13(17):1499-1510
Wireless sensor networks for environmental monitoring and agricultural applications often face Long‐range requirements at low bit rates together with a large numbers of nodes. This paper presents the design and test of a novel wireless sensor network that combines a large radio range with very low power consumption and cost. Our asymmetric sensor network uses ultra‐low‐cost 40‐MHz transmitters and a sensitive software‐defined radio receiver with multi‐channel capability. Experimental radio range measurements in two different outdoor environments demonstrate a single‐hop range of up to 1.8 km. A theoretical model for radio propagation at 40 MHz in outdoor environments is proposed and validated with the experimental measurements. The reliability and fidelity of network communication over longer periods is evaluated with a deployment for distributed temperature measurements. Our results demonstrate the feasibility of the transmit‐only low‐frequency system design approach for future environmental sensor networks. Although there have been several papers proposing the theoretical benefits of this approach, to the best of our knowledge, this is the first paper to provide experimental validation of such claims. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献