首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   465篇
  免费   13篇
电工技术   3篇
化学工业   102篇
金属工艺   4篇
机械仪表   10篇
建筑科学   9篇
能源动力   10篇
轻工业   45篇
水利工程   4篇
无线电   48篇
一般工业技术   65篇
冶金工业   69篇
原子能技术   2篇
自动化技术   107篇
  2024年   7篇
  2023年   4篇
  2022年   10篇
  2021年   21篇
  2020年   7篇
  2019年   15篇
  2018年   17篇
  2017年   11篇
  2016年   17篇
  2015年   10篇
  2014年   17篇
  2013年   26篇
  2012年   27篇
  2011年   22篇
  2010年   15篇
  2009年   31篇
  2008年   21篇
  2007年   13篇
  2006年   15篇
  2005年   12篇
  2004年   11篇
  2003年   12篇
  2002年   12篇
  2001年   6篇
  2000年   6篇
  1999年   7篇
  1998年   24篇
  1997年   22篇
  1996年   15篇
  1995年   6篇
  1994年   8篇
  1993年   8篇
  1992年   4篇
  1991年   3篇
  1989年   4篇
  1988年   1篇
  1986年   2篇
  1982年   2篇
  1980年   1篇
  1977年   2篇
  1975年   1篇
  1968年   1篇
  1967年   2篇
排序方式: 共有478条查询结果,搜索用时 0 毫秒
31.
Translational parallel manipulators are parallel manipulators wherein the end‐effector performs only spatial translations. This paper presents a new family of translational parallel manipulators. The manipulators of this family are independent constraint manipulators. They have three limbs that are topologically identical and have no rotation singularity. The limbs of these manipulators feature five one‐degree‐of‐freedom kinematic pairs in series. Four joints are revolute pairs and the remaining one, called T‐pair, is a kinematic pair that can be manufactured in different ways. In each limb, three adjacent revolute pairs have parallel axes and the remaining revolute pair has an axis that is not parallel to the axes of the other revolute pairs. The mobility analysis of the manipulators of this new family is addressed by taking into account two different choices for the actuated pairs. One of the results of this analysis is that the geometry of a translational parallel manipulator free from singularities can be defined for a particular choice of the actuated pairs. © 2002 Wiley Periodicals, Inc.  相似文献   
32.
33.
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process.  相似文献   
34.
Many regions of the world, including inland lakes, present with suboptimal conditions for the remotely sensed retrieval of optical signals, thus challenging the limits of available satellite data-processing tools, such as atmospheric correction models (ACM) and water constituent-retrieval (WCR) algorithms. Working in such regions, however, can improve our understanding of remote-sensing tools and their applicability in new contexts, in addition to potentially offering useful information about aquatic ecology. Here, we assess and compare 32 combinations of two ACMs, two WCRs, and three binary categories of data quality standards to optimize a remotely sensed proxy of plankton biomass in Lake Kivu. Each parameter set is compared against the available ground-truth match-ups using Spearman’s right-tailed ρ. Focusing on the best sets from each ACM–WCR combination, their performances are discussed with regard to data distribution, sample size, spatial completeness, and seasonality. The results of this study may be of interest both for ecological studies on Lake Kivu and for epidemiological studies of disease, such as cholera, the dynamics of which has been associated with plankton biomass in other regions of the world.  相似文献   
35.
This work presents Immucube, a scalable and efficient mechanism to improve dependability of interconnection networks for parallel and distributed computers. Immucube achieves better flexibility and scalability than any other previous fault-tolerant mechanism in k-ary n-cubes. The proposal inherits from Immunet several advantages over other previous fault-tolerant routing algorithms: 1) allowing any temporal and spatial fault combination, 2) permitting automatic and application-transparent reconfiguration after any fault, and 3) requiring a negligible overhead in the absence of faults. Immucube introduces new important features, such as: 4) providing graceful performance degradation, even in very large interconnection networks, 5) tolerating transparent resource utilization after transitory faults or partial repair of faulty resources, 6) being able to deal with intermittent faults, and 7) being able to dynamically recover the original network performance when all the failed components have been repaired  相似文献   
36.
The recent availability of reliable schemes for physically unclonable constants (PUC) opens interesting possibilities in the field of security. In this paper, we explore the possibility of using PUCs to embed in a chip random permutations to be used, for example, as building blocks in cryptographic constructions such as sponge functions, substitution–permutation networks, and so on. We show that the most difficult part is the generation of random integers using as the only randomness source the bit-string produced by the PUC. In order to solve the integer generation problem, we propose a partial rejection method that allows the designer to trade-off between entropy and efficiency. The results show that the proposed schemes can be implemented with reasonable complexity.  相似文献   
37.
The Journal of Supercomputing - Left ventricular non-compaction (LVNC) is a rare cardiomyopathy characterized by abnormal trabeculations in the left ventricle cavity. Although traditional computer...  相似文献   
38.
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be carried out through the Internet. Nevertheless, they are still some drawbacks due to security threats while performing such operations. Trust and reputation management rises as a novel way of solving some of those problems. In this paper we present our work TRIMS (a privacy-aware trust and reputation model for identity management systems), which applies a trust and reputation model to guarantee an acceptable level of security when deciding if a different domain might be considered reliable when receiving certain sensitive user’s attributes. Specifically, we will address the problems which surfaces when a domain needs to decide whether to exchange some information with another possibly unknown domain to effectively provide a service to one of its users. This decision will be determined by the trust deposited in the targeting domain. As far as we know, our proposal is one of the first approaches dealing with trust and reputation management in a multi-domain scenario. Finally, the performed experiments have demonstrated the robustness and accuracy of our model in a wide variety of scenarios.  相似文献   
39.
Cellular Automata (CA) are discrete and parallel computational models useful for simulating dynamic systems that evolve on the basis on local interactions. Some natural events, such as some types of landslides, fall into this type of phenomena and lend themselves well to be simulated with this approach. This paper describes the latest version of the SCIDDICA CA family models, specifically developed to simulate debris-flows type landslides. The latest model of the family, named SCIDDICA-SS3, inherits all the features of its predecessor, SCIDDICA-SS2, with the addition of a particular strategy to manage momentum. The introduction of the latter permits a better approximation of inertial effects that characterize some rapid debris flows. First simulations attempts of real landslides with SCIDDICA-SS3 have produced quite satisfactory results, comparable with the previous model.  相似文献   
40.
This article describes a novel approach to model the quality of experience (QoE) of users in mobile environments. The context-aware and ratings interaction model (CARIM) addresses the open questions of how to quantify user experiences from the analysis of interaction in mobile scenarios, and how to compare different QoE records to each other. A set of parameters are used to dynamically describe the interaction between the user and the system, the context in which it is performed and the perceived quality of users. CARIM structures these parameters into a uniform representation, supporting the dynamic analysis of interaction to determine QoE of users and enabling the comparison between different interaction records. Its run-time nature allows applications to make context- and QoE-based decisions in real time to adapt themselves, and thus provide a better experience to users. As a result, CARIM provides unified criteria for the inference and analysis of QoE in mobile scenarios. Its design and implementation can be integrated (and easily extended if needed) into many different development environments. An experiment with real users comparing two different interaction designs and validating user behavior hypotheses proved the effectiveness of applying CARIM for the assessment of QoE in mobile applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号