全文获取类型
收费全文 | 465篇 |
免费 | 13篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 102篇 |
金属工艺 | 4篇 |
机械仪表 | 10篇 |
建筑科学 | 9篇 |
能源动力 | 10篇 |
轻工业 | 45篇 |
水利工程 | 4篇 |
无线电 | 48篇 |
一般工业技术 | 65篇 |
冶金工业 | 69篇 |
原子能技术 | 2篇 |
自动化技术 | 107篇 |
出版年
2024年 | 7篇 |
2023年 | 4篇 |
2022年 | 10篇 |
2021年 | 21篇 |
2020年 | 7篇 |
2019年 | 15篇 |
2018年 | 17篇 |
2017年 | 11篇 |
2016年 | 17篇 |
2015年 | 10篇 |
2014年 | 17篇 |
2013年 | 26篇 |
2012年 | 27篇 |
2011年 | 22篇 |
2010年 | 15篇 |
2009年 | 31篇 |
2008年 | 21篇 |
2007年 | 13篇 |
2006年 | 15篇 |
2005年 | 12篇 |
2004年 | 11篇 |
2003年 | 12篇 |
2002年 | 12篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 7篇 |
1998年 | 24篇 |
1997年 | 22篇 |
1996年 | 15篇 |
1995年 | 6篇 |
1994年 | 8篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1986年 | 2篇 |
1982年 | 2篇 |
1980年 | 1篇 |
1977年 | 2篇 |
1975年 | 1篇 |
1968年 | 1篇 |
1967年 | 2篇 |
排序方式: 共有478条查询结果,搜索用时 0 毫秒
31.
Raffaele Di Gregorio 《野外机器人技术杂志》2002,19(12):595-603
Translational parallel manipulators are parallel manipulators wherein the end‐effector performs only spatial translations. This paper presents a new family of translational parallel manipulators. The manipulators of this family are independent constraint manipulators. They have three limbs that are topologically identical and have no rotation singularity. The limbs of these manipulators feature five one‐degree‐of‐freedom kinematic pairs in series. Four joints are revolute pairs and the remaining one, called T‐pair, is a kinematic pair that can be manufactured in different ways. In each limb, three adjacent revolute pairs have parallel axes and the remaining revolute pair has an axis that is not parallel to the axes of the other revolute pairs. The mobility analysis of the manipulators of this new family is addressed by taking into account two different choices for the actuated pairs. One of the results of this analysis is that the geometry of a translational parallel manipulator free from singularities can be defined for a particular choice of the actuated pairs. © 2002 Wiley Periodicals, Inc. 相似文献
32.
33.
Juan M. Marín Pérez Jorge Bernal Bernabé Jose M. Alcaraz Calero Felix J. Garcia Clemente Gregorio Martínez Pérez Antonio F. Gómez Skarmeta 《Future Generation Computer Systems》2011,27(1):40-55
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process. 相似文献
34.
Allyn Knox Enrico Bertuzzo Lorenzo Mari Daniel Odermatt Eric Verrecchia Andrea Rinaldo 《International journal of remote sensing》2013,34(13):5219-5238
Many regions of the world, including inland lakes, present with suboptimal conditions for the remotely sensed retrieval of optical signals, thus challenging the limits of available satellite data-processing tools, such as atmospheric correction models (ACM) and water constituent-retrieval (WCR) algorithms. Working in such regions, however, can improve our understanding of remote-sensing tools and their applicability in new contexts, in addition to potentially offering useful information about aquatic ecology. Here, we assess and compare 32 combinations of two ACMs, two WCRs, and three binary categories of data quality standards to optimize a remotely sensed proxy of plankton biomass in Lake Kivu. Each parameter set is compared against the available ground-truth match-ups using Spearman’s right-tailed ρ. Focusing on the best sets from each ACM–WCR combination, their performances are discussed with regard to data distribution, sample size, spatial completeness, and seasonality. The results of this study may be of interest both for ecological studies on Lake Kivu and for epidemiological studies of disease, such as cholera, the dynamics of which has been associated with plankton biomass in other regions of the world. 相似文献
35.
This work presents Immucube, a scalable and efficient mechanism to improve dependability of interconnection networks for parallel and distributed computers. Immucube achieves better flexibility and scalability than any other previous fault-tolerant mechanism in k-ary n-cubes. The proposal inherits from Immunet several advantages over other previous fault-tolerant routing algorithms: 1) allowing any temporal and spatial fault combination, 2) permitting automatic and application-transparent reconfiguration after any fault, and 3) requiring a negligible overhead in the absence of faults. Immucube introduces new important features, such as: 4) providing graceful performance degradation, even in very large interconnection networks, 5) tolerating transparent resource utilization after transitory faults or partial repair of faulty resources, 6) being able to deal with intermittent faults, and 7) being able to dynamically recover the original network performance when all the failed components have been repaired 相似文献
36.
Riccardo Bernardini Roberto Rinaldo 《International Journal of Information Security》2017,16(3):249-261
The recent availability of reliable schemes for physically unclonable constants (PUC) opens interesting possibilities in the field of security. In this paper, we explore the possibility of using PUCs to embed in a chip random permutations to be used, for example, as building blocks in cryptographic constructions such as sponge functions, substitution–permutation networks, and so on. We show that the most difficult part is the generation of random integers using as the only randomness source the bit-string produced by the PUC. In order to solve the integer generation problem, we propose a partial rejection method that allows the designer to trade-off between entropy and efficiency. The results show that the proposed schemes can be implemented with reasonable complexity. 相似文献
37.
Rodríguez-de-Vera Jesús M. González-Carrillo Josefa García José M. Bernabé Gregorio 《The Journal of supercomputing》2021,77(9):10138-10151
The Journal of Supercomputing - Left ventricular non-compaction (LVNC) is a rare cardiomyopathy characterized by abnormal trabeculations in the left ventricle cavity. Although traditional computer... 相似文献
38.
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be carried out through the Internet. Nevertheless, they are still some drawbacks due to security threats while performing such operations. Trust and reputation management rises as a novel way of solving some of those problems. In this paper we present our work TRIMS (a privacy-aware trust and reputation model for identity management systems), which applies a trust and reputation model to guarantee an acceptable level of security when deciding if a different domain might be considered reliable when receiving certain sensitive user’s attributes. Specifically, we will address the problems which surfaces when a domain needs to decide whether to exchange some information with another possibly unknown domain to effectively provide a service to one of its users. This decision will be determined by the trust deposited in the targeting domain. As far as we know, our proposal is one of the first approaches dealing with trust and reputation management in a multi-domain scenario. Finally, the performed experiments have demonstrated the robustness and accuracy of our model in a wide variety of scenarios. 相似文献
39.
SCIDDICA-SS3: a new version of cellular automata model for simulating fast moving landslides 总被引:1,自引:0,他引:1
Maria Vittoria Avolio Salvatore Di Gregorio Valeria Lupiano Paolo Mazzanti 《The Journal of supercomputing》2013,65(2):682-696
Cellular Automata (CA) are discrete and parallel computational models useful for simulating dynamic systems that evolve on the basis on local interactions. Some natural events, such as some types of landslides, fall into this type of phenomena and lend themselves well to be simulated with this approach. This paper describes the latest version of the SCIDDICA CA family models, specifically developed to simulate debris-flows type landslides. The latest model of the family, named SCIDDICA-SS3, inherits all the features of its predecessor, SCIDDICA-SS2, with the addition of a particular strategy to manage momentum. The introduction of the latter permits a better approximation of inertial effects that characterize some rapid debris flows. First simulations attempts of real landslides with SCIDDICA-SS3 have produced quite satisfactory results, comparable with the previous model. 相似文献
40.
Pedro Luis Mateo Navarro Gregorio Martínez Pérez Diego Sevilla Ruiz 《International journal of human-computer interaction》2014,30(12):946-964
This article describes a novel approach to model the quality of experience (QoE) of users in mobile environments. The context-aware and ratings interaction model (CARIM) addresses the open questions of how to quantify user experiences from the analysis of interaction in mobile scenarios, and how to compare different QoE records to each other. A set of parameters are used to dynamically describe the interaction between the user and the system, the context in which it is performed and the perceived quality of users. CARIM structures these parameters into a uniform representation, supporting the dynamic analysis of interaction to determine QoE of users and enabling the comparison between different interaction records. Its run-time nature allows applications to make context- and QoE-based decisions in real time to adapt themselves, and thus provide a better experience to users. As a result, CARIM provides unified criteria for the inference and analysis of QoE in mobile scenarios. Its design and implementation can be integrated (and easily extended if needed) into many different development environments. An experiment with real users comparing two different interaction designs and validating user behavior hypotheses proved the effectiveness of applying CARIM for the assessment of QoE in mobile applications. 相似文献