全文获取类型
收费全文 | 5620篇 |
免费 | 475篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 29篇 |
综合类 | 2篇 |
化学工业 | 2016篇 |
金属工艺 | 44篇 |
机械仪表 | 117篇 |
建筑科学 | 203篇 |
矿业工程 | 5篇 |
能源动力 | 142篇 |
轻工业 | 1847篇 |
水利工程 | 30篇 |
石油天然气 | 42篇 |
无线电 | 176篇 |
一般工业技术 | 702篇 |
冶金工业 | 223篇 |
原子能技术 | 18篇 |
自动化技术 | 503篇 |
出版年
2024年 | 13篇 |
2023年 | 87篇 |
2022年 | 330篇 |
2021年 | 362篇 |
2020年 | 184篇 |
2019年 | 177篇 |
2018年 | 222篇 |
2017年 | 211篇 |
2016年 | 229篇 |
2015年 | 180篇 |
2014年 | 286篇 |
2013年 | 456篇 |
2012年 | 417篇 |
2011年 | 421篇 |
2010年 | 285篇 |
2009年 | 309篇 |
2008年 | 311篇 |
2007年 | 284篇 |
2006年 | 189篇 |
2005年 | 187篇 |
2004年 | 118篇 |
2003年 | 119篇 |
2002年 | 100篇 |
2001年 | 71篇 |
2000年 | 70篇 |
1999年 | 54篇 |
1998年 | 71篇 |
1997年 | 59篇 |
1996年 | 58篇 |
1995年 | 47篇 |
1994年 | 29篇 |
1993年 | 19篇 |
1992年 | 14篇 |
1991年 | 18篇 |
1990年 | 5篇 |
1989年 | 13篇 |
1988年 | 11篇 |
1987年 | 14篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 11篇 |
1983年 | 4篇 |
1982年 | 13篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1978年 | 5篇 |
1976年 | 6篇 |
1964年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有6099条查询结果,搜索用时 15 毫秒
101.
Cristian Danila Georgiana Stegaru Aurelian Mihai Stanescu Cristina Serbanescu 《Journal of Intelligent Manufacturing》2016,27(1):73-82
Integration of Web-Services and “smart objects” in supply chain manufacturing systems (SCM) enables enterprise innovation and competitiveness in a globalized economy. The paper proposes a web-service based architecture for SCM that enables enterprises to develop context-awareness and to achieve interoperability at data, services, processes and business levels using event based web service notifications. The architecture is analyzed and implemented following the case study of an enterprise in the automotive industry. 相似文献
102.
Requirements analysis is the software engineering stage that is closest to the users’ world. It also involves tasks that are knowledge intensive. Thus, the use of Bayesian networks (BNs) to model this knowledge would be a valuable aid. These probabilistic models could manage the imprecision and ambiguities usually present in requirements engineering (RE). In this work, we conduct a literature review focusing on where and how BNs are applied on subareas of RE in order to identify which gaps remain uncovered and which methods might engineers employ to incorporate this intelligent technique into their own requirements processes. The scarcity of identified studies (there are only 20) suggests that not all RE areas have been properly investigated in the literature. The evidence available for adopting BNs into RE is sufficiently mature yet the methods applied are not easily translatable to other topics. Nonetheless, there are enough studies supporting the applicability of synergistic cooperation between RE and BNs. This work provides a background for understanding the current state of research encompassing RE and BNs. Functional, non-functional and -ilities requirements artifacts are enhanced by the use of BNs. These models were obtained by interacting with experts or by learning from databases. The most common criticism from the point of view of BN experts is that the models lack validation, whereas requirements engineers point to the lack of a clear application method for BNs and the lack of tools for incorporating them as built-in help functions. 相似文献
103.
In the study of data exchange one usually assumes an open-world semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only moves ‘as much data as needed’ from the source to the target to satisfy constraints of a schema mapping. It avoids some of the problems exhibited by the open-world semantics, but limits the expressivity of schema mappings. Here we propose a mixed approach: one can designate different attributes of target schemas as open or closed, to combine the additional expressivity of the open-world semantics with the better behavior of query answering in closed worlds. We define such schema mappings, and show that they cover a large space of data exchange solutions with two extremes being the known open and closed-world semantics. We investigate the problems of query answering and schema mapping composition, and prove two trichotomy theorems, classifying their complexity based on the number of open attributes. We find conditions under which schema mappings compose, extending known results to a wide range of closed-world mappings. We also provide results for restricted classes of queries and mappings guaranteeing lower complexity. 相似文献
104.
Rodrigo RomanAuthor Vitae Cristina AlcarazAuthor Vitae 《Computers & Electrical Engineering》2011,37(2):147-159
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN. 相似文献
105.
106.
Dolors Costal Cristina Gómez Anna Queralt Ruth Raventós Ernest Teniente 《Software and Systems Modeling》2008,7(4):469-486
An important aspect in the specification of conceptual schemas is the definition of general constraints that cannot be expressed
by the predefined constructs provided by conceptual modeling languages. This is generally achieved by using general-purpose
languages like OCL. In this paper we propose a new approach that facilitates the definition of such general constraints in
UML. More precisely, we define a profile that extends the set of predefined UML constraints by adding certain types of constraints
that are commonly used in conceptual schemas. We also show how our proposal facilitates reasoning about the constraints and
their automatic code generation, study the application of our ideas to the specification of two real-life applications, and
present a prototype tool implementation.
相似文献
Ernest TenienteEmail: |
107.
Fernández-Miyakawa ME Dorr R Fernández LE Uzal FA Ibarra C 《Computer methods and programs in biomedicine》2007,85(2):95-100
This paper describes the development of a simple system for measurement of net water movement through biological membrane barriers. The system is based on the detection of a water meniscus inside a polyethylene tube, which reflects the water movement inside one hemichamber of a modified Ussing chamber containing a membrane barrier. The detection device consists of a commercial computer-controlled flat bed scanner and specifically developed software. This system allows one to perform a relatively high number of individual experiments per physical unit. It is a flexible and affordable device, which allows comparatively more information per unit to be obtained than previously described methods. 相似文献
108.
Ignacio Fernández Manuel Mazo José L. Lázaro Daniel Pizarro Enrique Santiso Pedro Martín Cristina Losada 《Autonomous Robots》2007,23(4):305-324
This paper presents a new proposal for positioning and guiding mobile robots in indoor environments. The proposal is based
on the information provided by static cameras located in the movement environment. This proposal falls within the scope of
what are known as intelligent environments; in this case, the environment is provided with cameras that, once calibrated,
allow the position of the robots to be obtained. Based on this information, control orders for the robots can be generated
using a radio frequency link. In order to facilitate identification of the robots, even under extremely adverse ambient lighting
conditions, a beacon consisting of four circular elements constructed from infrared diodes is mounted on board the robots.
In order to identify the beacon, an edge detection process is carried out. This is followed by a process that, based on the
algebraic distance, obtains the estimated ellipses associated with each element of the beacon. Once the beacon has been identified,
the coordinates of the centroids for the elements that make up the beacon are obtained on the various image planes. Based
on these coordinates, an algorithm is proposed that takes into account the standard deviation of the error produced in the
various cameras in ascertaining the coordinates of the beacon’s elements. An odometric system is also used in guidance that,
in conjunction with a Kalman Filter, allows the position of the robot to be estimated during the time intervals required to
process the visual information provided by the cameras.
相似文献
Cristina LosadaEmail: |
109.
We study the problem of decomposing the vertex set V of a graph into two nonempty parts V1,V2 which induce subgraphs where each vertex v∈V1 has degree at least a(v) inside V1 and each v∈V2 has degree at least b(v) inside V2. We give a polynomial-time algorithm for graphs with bounded treewidth which decides if a graph admits a decomposition, and gives such a decomposition if it exists. This result and its variants are then applied to designing polynomial-time approximation schemes for planar graphs where a decomposition does not necessarily exist but the local degree conditions should be met for as many vertices as possible. 相似文献
110.