全文获取类型
收费全文 | 229篇 |
免费 | 9篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 41篇 |
金属工艺 | 2篇 |
机械仪表 | 9篇 |
建筑科学 | 4篇 |
能源动力 | 7篇 |
轻工业 | 17篇 |
石油天然气 | 3篇 |
无线电 | 31篇 |
一般工业技术 | 43篇 |
冶金工业 | 11篇 |
原子能技术 | 3篇 |
自动化技术 | 66篇 |
出版年
2023年 | 11篇 |
2022年 | 25篇 |
2021年 | 17篇 |
2020年 | 13篇 |
2019年 | 7篇 |
2018年 | 20篇 |
2017年 | 8篇 |
2016年 | 10篇 |
2015年 | 3篇 |
2014年 | 7篇 |
2013年 | 19篇 |
2012年 | 10篇 |
2011年 | 9篇 |
2010年 | 4篇 |
2009年 | 5篇 |
2008年 | 9篇 |
2007年 | 11篇 |
2006年 | 5篇 |
2005年 | 2篇 |
2004年 | 3篇 |
2003年 | 1篇 |
2002年 | 3篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1998年 | 7篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有238条查询结果,搜索用时 18 毫秒
161.
The effects of longitudinal wave distribution and mirror structures on the small-signal response of surface-emitting lasers are analyzed for the first time. The analysis is based on an improved dynamic model implemented in the transfer-matrix representation. It is shown that for two structures with the same threshold gain and the same internal structure, high contrast mirrors give rise to a higher relaxation oscillation and modulation bandwidth for the same injection level 相似文献
162.
Jay C. Hanan Geoffrey A. Swift Ersan Üstündag Irene J. Beyerlein Jonathan D. Almer Ulrich Lienert Dean R. Haeffner 《Metallurgical and Materials Transactions A》2002,33(12):3839-3845
Fiber fractures are crucial in initiating damage zones that ultimately determine the strength and lifetime of fiber-reinforced
metal matrix composites. The evolution of damage in a metal matrix composite (MMC) comprised of a row of unidirectional SiC
fibers (32 vol pct) surrounded by a Ti matrix was examined, for the first time, using X-ray microdiffraction. Multiple strain
maps including both phases were collected in situ under applied tensile stress. The elastic axial strains were then compared to predictions from a modified shear-lag model,
which, unlike other shear-lag models, considers the elastic response of both constituents. The strains showed good correlation
with the model. The results confirmed, for the first time, both the need and validity of this new model specifically developed
for large scale multifracture simulations of MMCs. The results also provided unprecedented insight for the model, revealing
the necessity of incorporating such factors as plasticity of the matrix, residual stress in the composite, and selection of
the load sharing parameter. 相似文献
163.
Hanan Samet 《Information Processing Letters》1985,21(1):1-6
The bidirectional coroutine is introduced as a mechanism for overcoming a shortcoming in the method of specification of the transfer of control between coroutines. An analogy is drawn between subroutines and coroutines by observing that coroutines, like subroutines, should not have to know with whom they are interacting. At present, most coroutine implementations require specific mention of the coroutine being resumed, or use a suspend mechanism in which case one coroutine acts as a slave (the suspending one) and the other as a master. In the second case, the slave need not know the identity of its master while the master must know the identity of its slave. For bidirectional coroutines, a coroutine need not know the identity of its master nor its slave. This is achieved by replacing the suspend primitive with two new primitives — resume master and resume slave. 相似文献
164.
The quadtree representation encodes a 2″ by 2″ binary image as a set of maximal blocks of 1's or 0's whose sizes and positions are powers of 2. With the aid of the quadtree, a hierarchy of approximations to the image can be defined. Several ways of doing this are described. The accuracy of these approximations is empirically evaluated by studying how fast estimates of the first few moments of the image, computed from the approximations, converge to the true values, using a database of 112 airplane silhouettes. Approaches to the problem of fast shape matching using these approximations are also discussed. 相似文献
165.
Shahzad Nazir Muhammad Asif Shahbaz Ahmad Hanan Aljuaid Shahbaz Ahmad Yazeed Ghadi Zubair nawaz 《计算机、材料和连续体(英文)》2022,72(3):4755-4769
Social media provide digitally interactional technologies to facilitate information sharing and exchanging individuals. Precisely, in case of disasters, a massive corpus is placed on platforms such as Twitter. Eyewitness accounts can benefit humanitarian organizations and agencies, but identifying the eyewitness Tweets related to the disaster from millions of Tweets is difficult. Different approaches have been developed to address this kind of problem. The recent state-of-the-art system was based on a manually created dictionary and this approach was further refined by introducing linguistic rules. However, these approaches suffer from limitations as they are dataset-dependent and not scalable. In this paper, we proposed a method to identify eyewitnesses from Twitter. To experiment, we utilized 13 features discovered by the pioneer of this domain and can classify the tweets to determine the eyewitness. Considering each feature, a dictionary of words was created with the Word Dictionary Maker algorithm, which is the crucial contribution of this research. This algorithm inputs some terms relevant to a specific feature for its initialization and then creates the words dictionary. Further, keyword matching for each feature in tweets is performed. If a feature exists in a tweet, it is termed as 1; otherwise, 0. Similarly, for 13 features, we created a file that reflects features in each tweet. To classify the tweets based on features, Naïve Bayes, Random Forest, and Neural Network were utilized. The approach was implemented on different disasters like earthquakes, floods, hurricanes, and Forest fires. The results were compared with the state-of-the-art linguistic rule-based system with 0.81 F-measure values. At the same time, the proposed approach gained a 0.88 value of F-measure. The results were comparable as the proposed approach is not dataset-dependent. Therefore, it can be used for the identification of eyewitness accounts. 相似文献
166.
Small cells are deployed in the long-term evolution—advanced (LTE-A) data standard to satisfy rapidly increasing data rates at hotspots and enhance coverage in buildings. Small cells are low-cost, low-power nodes with limited coverage. With small cells, the more sophisticated network architecture increases the difficulty of dealing with mobility management. The conflict between traffic demands and network resources is also very important, and the signalling overhead (ping-pong) in the handover procedure should be considered in mobility management. With the aim of solving these issues, efficient handover algorithms are being used to enhance mobility management in small-cell networks. This article presents a new handover optimization algorithm for LTE-A networks based on fuzzy logic. It consists of selecting the optimum handover margins for both macro and small cells which are required for the handover process to optimize the performance metrics. The proposed handover optimization technique is evaluated and compared with two well-known handover algorithms. The results show that it achieves a minimum call drop rate and has a minimum number of handovers. 相似文献
167.
Youssef Hanan Farouk El-Kady Abeer M. Ahmed Manar M. Abo-almaged Hanan Hassan 《Journal of Porous Materials》2021,28(6):1979-1998
Journal of Porous Materials - This work was aiming to design novel bio-composite (BC) materials based on microwave-prepared AuNPs-loaded Zeolite-A (ZA-Au) and nano-hydroxyapatite (HA).... 相似文献
168.
Hazourli Ahmed Rachid Djeghri Amine Salam Hanan Othmani Alice 《Multimedia Tools and Applications》2021,80(9):13639-13662
Multimedia Tools and Applications - In this paper, an approach for Facial Expressions Recognition (FER) based on a multi-facial patches (MFP) aggregation network is proposed. Deep features are... 相似文献
169.
Samet H 《IEEE transactions on pattern analysis and machine intelligence》2008,30(2):243-252
Similarity searching often reduces to finding the k nearest neighbors to a query object. Finding the k nearest neighbors is achieved by applying either a depth- first or a best-first algorithm to the search hierarchy containing the data. These algorithms are generally applicable to any index based on hierarchical clustering. The idea is that the data is partitioned into clusters which are aggregated to form other clusters, with the total aggregation being represented as a tree. These algorithms have traditionally used a lower bound corresponding to the minimum distance at which a nearest neighbor can be found (termed MinDist) to prune the search process by avoiding the processing of some of the clusters as well as individual objects when they can be shown to be farther from the query object q than all of the current k nearest neighbors of q. An alternative pruning technique that uses an upper bound corresponding to the maximum possible distance at which a nearest neighbor is guaranteed to be found (termed MaxNearestDist) is described. The MaxNearestDist upper bound is adapted to enable its use for finding the k nearest neighbors instead of just the nearest neighbor (i.e., k=1) as in its previous uses. Both the depth-first and best-first k-nearest neighbor algorithms are modified to use MaxNearestDist, which is shown to enhance both algorithms by overcoming their shortcomings. In particular, for the depth-first algorithm, the number of clusters in the search hierarchy that must be examined is not increased thereby potentially lowering its execution time, while for the best-first algorithm, the number of clusters in the search hierarchy that must be retained in the priority queue used to control the ordering of processing of the clusters is also not increased, thereby potentially lowering its storage requirements. 相似文献
170.
Qureshi Kashif Naseer Abdullah Abdul Hanan Kaiwartya Omprakash Ullah Fasee Iqbal Saleem Altameem Ayman 《Telecommunication Systems》2020,74(2):145-156
Telecommunication Systems - The Internet Engineering Task Force recommends the use of a group of well-defined protocols to support Internet of ThingsLow-Power Low-Rate Networks (LLNs). These... 相似文献