全文获取类型
收费全文 | 2008篇 |
免费 | 143篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 24篇 |
综合类 | 2篇 |
化学工业 | 551篇 |
金属工艺 | 44篇 |
机械仪表 | 34篇 |
建筑科学 | 79篇 |
矿业工程 | 1篇 |
能源动力 | 72篇 |
轻工业 | 238篇 |
水利工程 | 6篇 |
石油天然气 | 2篇 |
无线电 | 211篇 |
一般工业技术 | 394篇 |
冶金工业 | 49篇 |
原子能技术 | 36篇 |
自动化技术 | 414篇 |
出版年
2024年 | 1篇 |
2023年 | 20篇 |
2022年 | 48篇 |
2021年 | 65篇 |
2020年 | 51篇 |
2019年 | 45篇 |
2018年 | 62篇 |
2017年 | 72篇 |
2016年 | 68篇 |
2015年 | 78篇 |
2014年 | 103篇 |
2013年 | 160篇 |
2012年 | 137篇 |
2011年 | 221篇 |
2010年 | 146篇 |
2009年 | 135篇 |
2008年 | 126篇 |
2007年 | 86篇 |
2006年 | 88篇 |
2005年 | 79篇 |
2004年 | 58篇 |
2003年 | 63篇 |
2002年 | 45篇 |
2001年 | 24篇 |
2000年 | 20篇 |
1999年 | 29篇 |
1998年 | 16篇 |
1997年 | 12篇 |
1996年 | 23篇 |
1995年 | 6篇 |
1994年 | 17篇 |
1993年 | 15篇 |
1992年 | 9篇 |
1991年 | 5篇 |
1990年 | 4篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有2157条查询结果,搜索用时 15 毫秒
111.
Asma Adnane Christophe Bidan Rafael Timóteo de Sousa Júnior 《Computer Communications》2013,36(10-11):1159-1171
The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities.In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR. 相似文献
112.
Sylviane Gentil Jacky Montmain Christophe Combastel 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2004,34(5):2207-2221
This paper presents a model-based diagnostic method designed in the context of process supervision. It has been inspired by both artificial intelligence and control theory. AI contributes tools for qualitative modeling, including causal modeling, whose aim is to split a complex process into elementary submodels. Control theory, within the framework of fault detection and isolation (FDI), provides numerical models for generating and testing residuals, and for taking into account inaccuracies in the model, unknown disturbances and noise. Consistency-based reasoning provides a logical foundation for diagnostic reasoning and clarifies fundamental assumptions, such as single fault and exoneration. The diagnostic method presented in the paper benefits from the advantages of all these approaches. Causal modeling enables the method to focus on sufficient relations for fault isolation, which avoids combinatorial explosion. Moreover, it allows the model to be modified easily without changing any aspect of the diagnostic algorithm. The numerical submodels that are used to detect inconsistency benefit from the precise quantitative analysis of the FDI approach. The FDI models are studied in order to link this method with DX component-oriented reasoning. The recursive on-line use of this algorithm is explained and the concept of local exoneration is introduced. 相似文献
113.
Linear amphiphilic diblock copolymers of polylactide (PLA) and poly(2-dimethylaminoethyl methacrylate) (PDMAEMA) were synthesized by atom transfer radical polymerization (ATRP) of DMAEMA followed by ring-opening polymerization (ROP) of LLA using the bifunctional initiator, 2′-hydroxyethyl 2-bromoisobutyrate. NMR showed that the resulting PLA block was racemic and a quaternization/precipitation technique showed that there were significant amounts of racemic PLA homopolymer. In addition, simultaneous ATRP of DMAEMA and ROP of l-lactide by tin octoate were conducted at varied temperatures, indicating 90 °C as a suitable compromise temperature; this one-pot process also led to racemization and P(L)LA homopolymer. The racemization was attributed to reversible deprotonation of LLA by the N(CH3)2 moiety of (P)DMAEMA and the PLA homopolymer impurity was related to in situ formation of lactoyl lactate (LA–LA) due to nucleophilic ring opening of lactide by the amino moieties of (P)DMAEMA. The methods presented can be useful for the preparation of PDMAEMA–b–PLA/PLA composites in a two-step process or in a single step, one-pot process. 相似文献
114.
Soham Uday Mehta Ravi Ramamoorthi Mark Meyer Christophe Hery 《Computer Graphics Forum》2012,31(4):1501-1508
Environment‐mapped rendering of Lambertian isotropic surfaces is common, and a popular technique is to use a quadratic spherical harmonic expansion. This compact irradiance map representation is widely adopted in interactive applications like video games. However, many materials are anisotropic, and shading is determined by the local tangent direction, rather than the surface normal. Even for visualization and illustration, it is increasingly common to define a tangent vector field, and use anisotropic shading. In this paper, we extend spherical harmonic irradiance maps to anisotropic surfaces, replacing Lambertian reflectance with the diffuse term of the popular Kajiya‐Kay model. We show that there is a direct analogy, with the surface normal replaced by the tangent. Our main contribution is an analytic formula for the diffuse Kajiya‐Kay BRDF in terms of spherical harmonics; this derivation is more complicated than for the standard diffuse lobe. We show that the terms decay even more rapidly than for Lambertian reflectance, going as l–3, where l is the spherical harmonic order, and with only 6 terms (l = 0 and l = 2) capturing 99.8% of the energy. Existing code for irradiance environment maps can be trivially adapted for real‐time rendering with tangent irradiance maps. We also demonstrate an application to offline rendering of the diffuse component of fibers, using our formula as a control variate for Monte Carlo sampling. 相似文献
115.
Yacine Aït Oumeziane Sophie Moissette Marjorie Bart Florence Collet Sylvie Pretot Christophe Lanos 《Journal of Building Performance Simulation》2017,10(3):256-271
Building envelopes with bio-materials like hemp concrete are currently undergoing an increasing development due to their low environmental impact and their interesting hygrothermal properties. This kind of hygroscopic material is characterized by a hysteretic behaviour. In this paper, the influence of such behaviour on the hygrothermal response of a building wall is discussed. An experimental facility is designed to measure temperature and relative humidity within a hemp concrete wall submitted to climatic variations. This facility provides a set of experimental data suited for benchmarking. Numerical simulations are performed with a hysteresis model implemented in a heat and moisture transfer model. Comparisons between numerical and experimental results show that hysteresis modelling is relevant to simulate the hygrothermal response of the wall. The discussion is extended to the influence of the initial moisture content. 相似文献
116.
117.
Coen De Roover Christophe Scholliers Wouter Amerijckx Theo D’Hondt Wolfgang De Meuter 《Science of Computer Programming》2013
Advances in wireless sensing and actuation technology allow embedding significant amounts of application logic inside wireless sensor networks. Such active WSN applications are more autonomous, but are significantly more complex to implement. Event-based middleware lends itself to implementing these applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control comes at the cost of event handlers which lack composability and violate software engineering principles such as separation of concerns. In this paper, we present CrimeSPOT as a domain-specific language for programming WSN applications on top of event-driven middleware. Its node-centric features enable programming a node’s interactions through declarative rules rather than event handlers. Its network-centric features support reusing code within and among WSN applications. Unique to CrimeSPOT is its support for associating application-specific semantics with events that carry sensor readings. These preclude transposing existing approaches that address the shortcomings of event-based middleware to the domain of wireless sensor networks. We provide a comprehensive overview of the language and the implementation of its accompanying runtime. The latter comprises several extensions to the Rete forward chaining algorithm. We evaluate the expressiveness of the language and the overhead of its runtime using small, but representative active WSN applications. 相似文献
118.
Localized Neuron Stimulation with Organic Electrochemical Transistors on Delaminating Depth Probes 下载免费PDF全文
119.
In this paper, the impact of outliers on the performance of high-dimensional data analysis methods is studied in the context
of face recognition. Most of the existing face recognition methods are based on PCA-like methods: faces are projected into
a lower dimensional space in which similarity between faces is supposed to be more easily evaluated. These methods are, however,
very sensitive to the quality of the face images used in the training and in the recognition phases. Their performance significantly
drops when face images are not well centered or taken under variable illumination conditions. In this paper, we study this
phenomenon for two face recognition methods, namely PCA and LDA2D, and we propose a filtering process that allows the automatic
selection of noisy face images which are responsible for the performance degradation. This process uses two techniques. The
first one is based on the recently proposed robust high-dimensional data analysis method called RobPCA. It is specific to
the case of recognition from video sequences. The second technique is based on a novel and effective face classification technique.
It allows isolating still face images that are not very precisely cropped, not well-centered or in a non-frontal pose. Experiments
show that this filtering process significantly improves recognition rates by 10 to 30%.
相似文献
Christophe GarciaEmail: |
120.
Lukas C. Buelens Vladimir V. Galvita Hilde Poelman Christophe Detavernier Guy B. Marin 《化学,工程师,技术》2016,88(11):1684-1692
The kinetics of redox reactions of iron oxide in oxygen carrier 50Fe2O3/MgAl2O4 are examined using different time‐resolved techniques. Reduction kinetics are studied by H2 temperature‐programmed reduction (H2‐TPR) monitored by time‐resolved in situ XRD. In contrast to conventional TPR, in situ XRD distinguishes the three‐stage reduction of Fe2O3 → Fe3O4 → FeO → Fe. It also shows that the oxidation of Fe → Fe3O4 by CO2 has no intermediate crystalline phases, explaining why its kinetics can easily be investigated by conventional CO2 temperature‐programmed oxidation (CO2‐TPO). A shrinking core model which takes into account solid state diffusion allows describing the experimental data. 相似文献