全文获取类型
收费全文 | 3058篇 |
免费 | 228篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 36篇 |
综合类 | 1篇 |
化学工业 | 745篇 |
金属工艺 | 75篇 |
机械仪表 | 122篇 |
建筑科学 | 127篇 |
矿业工程 | 2篇 |
能源动力 | 223篇 |
轻工业 | 540篇 |
水利工程 | 16篇 |
石油天然气 | 16篇 |
无线电 | 198篇 |
一般工业技术 | 578篇 |
冶金工业 | 94篇 |
原子能技术 | 19篇 |
自动化技术 | 500篇 |
出版年
2024年 | 19篇 |
2023年 | 42篇 |
2022年 | 76篇 |
2021年 | 135篇 |
2020年 | 127篇 |
2019年 | 122篇 |
2018年 | 155篇 |
2017年 | 143篇 |
2016年 | 177篇 |
2015年 | 123篇 |
2014年 | 163篇 |
2013年 | 388篇 |
2012年 | 176篇 |
2011年 | 220篇 |
2010年 | 177篇 |
2009年 | 207篇 |
2008年 | 164篇 |
2007年 | 133篇 |
2006年 | 97篇 |
2005年 | 70篇 |
2004年 | 67篇 |
2003年 | 41篇 |
2002年 | 52篇 |
2001年 | 21篇 |
2000年 | 24篇 |
1999年 | 32篇 |
1998年 | 29篇 |
1997年 | 12篇 |
1996年 | 24篇 |
1995年 | 7篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 9篇 |
1991年 | 10篇 |
1990年 | 7篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 4篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有3292条查询结果,搜索用时 45 毫秒
991.
This paper discusses a formal approach for establishing theories of trust for authentication systems which can be used to
reason about how agent beliefs evolve through time. The goal of an authentication system is to verify and authorise users
in order to protect restricted data and information, so trust is a critical issue for authentication systems. After authentication,
two principals (people, computers, services) should be entitled to believe that they are communicating with each other and
not with intruders. So, it is important to express such beliefs precisely and to capture the reasoning that leads to them.
In this paper, we focus on analysis of agent beliefs in dynamic environments using a temporalised belief logic, obtained by
adding a temporal logic onto a belief logic. Working through a well-known authentication protocol, namely Kerberos, we discuss
how to express principal beliefs involved in authentication protocols and the evolution of those beliefs based on a series
of observations of agents as a consequence of communication. Our approach could be used for designing, verifying and implementing
authentication protocols.
相似文献
Mehmet A. OrgunEmail: |
992.
993.
994.
Mehmet Yasar Gundogdu 《Particulate Science and Technology》2004,22(4):339-353
Discharge characteristics of fine polydisperse granular powders of equal-solid density and near-spherical particle shape through a conical hopper were investigated by measuring solid discharge rates of powders. Effects of orifice size of hopper and size distribution of powders on discharge rate were determined by means of experiments conducted for six different sizes of hopper orifice and three different powder types under gravity flow conditions. A new effective mean diameter characterizing polydisperse powders is first introduced and determined from the particle size versus weight fraction distribution of a powder as the size corresponding to 50% cumulative weight fraction. This effective mean diameter was efficiently used in two modified forms of the Beverloo equation to predict discharge rates of polydisperse powders through hopper orifices. 相似文献
995.
Yavuz Akbulut Serkan Şendağ Gürkay Birinci Kerem Kılıçer Mehmet C Şahin Hatice F Odabaşı 《Computers & Education》2008
Internet contributes to the development of science and facilitates scientific demeanors while it also serves as a ground for academic misdemeanors. Recent studies indicate that Internet facilitates and spreads academic dishonesty. The purpose of the current study is to investigate the extent of involvement of Turkish university students in academic dishonesty practices facilitated through Internet (i.e. e-dishonesty) and to question the conditions which lead to e-dishonesty. Three hundred and forty nine education faculty students from the most populated state university in Turkey were administered two Likert-Scale questionnaires developed by the researchers. After the reliability and validity conditions were met, two exploratory factor analyses were conducted. The first one revealed the factors constituting common types of e-dishonesty among undergraduate students which were fraudulence, plagiarism, falsification, delinquency, and unauthorized help. The second factor analysis exhibited individual and contextual factors triggering e-dishonesty which were named as individual factors, institutional policies and peer pressure. Results of both analyses are discussed and suggestions for further research are provided. 相似文献
996.
Mehmet Akin Muhammed B. Kurt Necmettin Sezgin Muhittin Bayram 《Neural computing & applications》2008,17(3):227-236
We developed a new method for estimation of vigilance level by using both EEG and EMG signals recorded during transition from
wakefulness to sleep. Previous studies used only EEG signals for estimating the vigilance levels. In this study, it was aimed
to estimate vigilance level by using both EEG and EMG signals for increasing the accuracy of the estimation rate. In our work,
EEG and EMG signals were obtained from 30 subjects. In data preparation stage, EEG signals were separated to its subbands
using wavelet transform for efficient discrimination, and chin EMG was used to verify and eliminate the movement artifacts.
The changes in EEG and EMG were diagnosed while transition from wakefulness to sleep by using developed artificial neural
network (ANN). Training and testing data sets consist of the subbanded components of EEG and power density of EMG signals
were applied to the ANN for training and testing the system which gives three situations for the vigilance level of the subject:
awake, drowsy, and sleep. The accuracy of estimation was about 98–99% while the accuracy of the previous study, which uses
only EEG, was 95–96%. 相似文献
997.
A. Çivril 《Information Processing Letters》2013,113(14-16):543-545
998.
Coşku Kasnakoğlu Andrea Serrani Mehmet Önder Efe 《International journal of control》2013,86(9):1475-1492
A control input separation method is proposed for reduced-order modelling in boundary control problems. The dynamics of flow systems are typically described by partial differential equations where the input affects the system through boundary conditions. From a control design perspective it is most desirable and natural to employ finite-dimensional representations in which the input enters the dynamics directly. The method proposed here to resolve the input from the boundary conditions is based on obtaining a proper orthogonal decomposition of the unforced flow of the system, and then augmenting this decomposition by optimally computed actuation modes, built using snapshots of the actuated flow. A reduced-order Galerkin model is then derived for this expansion, in which the input appears as an explicit term in the system dynamics. The model reduces exactly to the original baseline case under zero input conditions. The proposed method is then compared to an existing input separation technique, namely the sub-domain separation method. A boundary control example regarding the 2D incompressible Navier–Stokes equation is considered to illustrate the proposed method, where a controller is designed to achieve tracking of a desired 2D spatial profile for the flow velocity. 相似文献
999.
Next generation wireless networks concept aims at collaboration of various radio access technologies in order to provide quality of service (QoS) supported and cost efficient connections at anywhere and anytime. Since the next generation wireless systems are expected to be of heterogeneous topology, traditional handoff (horizontal handoff/handover) mechanisms are not sufficient to meet the requirements of these types of networks. More intelligent vertical handoff algorithms which consider user profiles, application requirements, and network conditions must be employed in order to provide enhanced performance results for both user and network. Moreover, frequency reuse of one (FRO) seems to be the strongest candidate of deployment options for next generation wireless networks; therefore, interference conditions gains a significant attention in vertical handoff decision making process. In this study, a fuzzy logic-based handoff decision algorithm is introduced for wireless heterogeneous networks. The parameters; data rate, received signal strength indicator (RSSI), and mobile speed are considered as inputs of the proposed fuzzy-based system in order to decide handoff initialization process and select the best candidate access point around a smart mobile terminal. Also, in contrast to the traditional fuzzy-based algorithms, the method proposed takes ambient interference power, which is referred to as interference rate, as another input to the decision process. The results show that the performance is significantly enhanced for both user and network by the method proposed. 相似文献
1000.
Mark Fuge Mehmet Ersin Yumer Gunay Orbay Levent Burak Kara 《Computer aided design》2012,44(10):1020-1032
This paper enables the rapid creation and modification of freeform surfaces inside an augmented reality environment, and focuses on methods for enabling increased flexibility during exploratory, conceptual industrial product design through three-dimensional (3D) sketch-based user input. Specifically, we address the role of multiple shape representations with varying uncertainty levels during 3D conceptual sketching, along with methods to transform between those representations. The main contributions of this work are: (1) the formulation of virtual shape data in multiple, concurrent representations (points and surfaces), and a regression method to transition fluidly back and forth between these representations during design, (2) methods for deforming and exploring the product shape using these multiple representations, and (3) representations of these forms such that designers can explore conceptual designs without the need for detailed surface operations such as trimming or continuity enforcement. Through incorporating these contributions, we introduce techniques that can be incorporated in future computer-aided conceptual design systems. These contributions are demonstrated for freeform surface design, with examples of computer mouse and car seat exterior surfaces. 相似文献