全文获取类型
收费全文 | 1575篇 |
免费 | 38篇 |
专业分类
电工技术 | 78篇 |
综合类 | 1篇 |
化学工业 | 420篇 |
金属工艺 | 28篇 |
机械仪表 | 19篇 |
建筑科学 | 65篇 |
矿业工程 | 5篇 |
能源动力 | 24篇 |
轻工业 | 271篇 |
水利工程 | 7篇 |
石油天然气 | 5篇 |
无线电 | 100篇 |
一般工业技术 | 213篇 |
冶金工业 | 259篇 |
原子能技术 | 7篇 |
自动化技术 | 111篇 |
出版年
2022年 | 15篇 |
2021年 | 22篇 |
2020年 | 24篇 |
2018年 | 19篇 |
2017年 | 28篇 |
2016年 | 25篇 |
2015年 | 17篇 |
2014年 | 32篇 |
2013年 | 50篇 |
2012年 | 39篇 |
2011年 | 76篇 |
2010年 | 32篇 |
2009年 | 43篇 |
2008年 | 59篇 |
2007年 | 55篇 |
2006年 | 38篇 |
2005年 | 42篇 |
2004年 | 26篇 |
2003年 | 34篇 |
2002年 | 34篇 |
2001年 | 23篇 |
2000年 | 26篇 |
1999年 | 27篇 |
1998年 | 50篇 |
1997年 | 35篇 |
1996年 | 39篇 |
1995年 | 30篇 |
1994年 | 27篇 |
1993年 | 23篇 |
1992年 | 25篇 |
1991年 | 16篇 |
1990年 | 21篇 |
1989年 | 18篇 |
1988年 | 16篇 |
1987年 | 19篇 |
1985年 | 19篇 |
1984年 | 17篇 |
1983年 | 13篇 |
1982年 | 13篇 |
1981年 | 14篇 |
1979年 | 13篇 |
1978年 | 14篇 |
1977年 | 13篇 |
1976年 | 18篇 |
1975年 | 12篇 |
1974年 | 22篇 |
1973年 | 16篇 |
1971年 | 18篇 |
1970年 | 17篇 |
1966年 | 21篇 |
排序方式: 共有1613条查询结果,搜索用时 14 毫秒
91.
92.
Matthew E. Wilhelm Anne V. Le Matthew D. Stuber 《American Institute of Chemical Engineers》2019,65(12):e16836
We present a deterministic global optimization method for nonlinear programming formulations constrained by stiff systems of ordinary differential equation (ODE) initial value problems (IVPs). The examples arise from dynamic optimization problems exhibiting both fast and slow transient phenomena commonly encountered in model-based systems engineering applications. The proposed approach utilizes unconditionally stable implicit integration methods to reformulate the ODE-constrained problem into a nonconvex nonlinear program (NLP) with implicit functions embedded. This problem is then solved to global optimality in finite time using a spatial branch-and-bound framework utilizing convex/concave relaxations of implicit functions constructed by a method which fully exploits problem sparsity. The algorithms were implemented in the Julia programming language within the EAGO.jl package and demonstrated on five illustrative examples with varying complexity relevant in process systems engineering. The developed methods enable the guaranteed global solution of dynamic optimization problems with stiff ODE–IVPs embedded. 相似文献
93.
Influence of Microstructure and Surface Activation of Dual‐Phase Membrane Ce0.8Gd0.2O2−δ–FeCo2O4 on Oxygen Permeation 下载免费PDF全文
Madhumidha Ramasamy Stefan Baumann Justinas Palisaitis Falk Schulze‐Küppers Maria Balaguer Daejin Kim Wilhelm A. Meulenberg Jochim Mayer Ramesh Bhave Olivier Guillon Martin Bram 《Journal of the American Ceramic Society》2016,99(1):349-355
Dual‐phase oxygen transport membranes are fast‐growing research interest for application in oxyfuel combustion process. One such potential candidate is CGO‐FCO (60 wt% Ce0.8Gd0.2O2?δ–40 wt% FeCo2O4) identified to provide good oxygen permeation flux with substantial stability in harsh atmosphere. Dense CGO‐FCO membranes of 1 mm thickness were fabricated by sintering dry pellets pressed from powders synthesized by one‐pot method (modified Pechini process) at 1200°C for 10 h. Microstructure analysis indicates presence of a third orthorhombic perovskite phase in the sintered composite. It was also identified that the spinel phase tends to form an oxygen deficient phase at the grain boundary of spinel and CGO phases. Surface exchange limitation of the membranes was overcome by La0.6Sr0.4Co0.2Fe0.8O3?δ (LSCF) porous layer coating over the composite. The oxygen permeation flux of the CGO‐FCO screen printed with a porous layer of 10 μm thick LSCF is 0.11 mL/cm2 per minute at 850°C with argon as sweep and air as feed gas at the rates of 50 and 250 mL/min. 相似文献
94.
Humans manage to adapt learned movements very quickly to new situations by generalizing learned behaviors from similar situations. In contrast, robots currently often need to re-learn the complete movement. In this paper, we propose a method that learns to generalize parametrized motor plans by adapting a small set of global parameters, called meta-parameters. We employ reinforcement learning to learn the required meta-parameters to deal with the current situation, described by states. We introduce an appropriate reinforcement learning algorithm based on a kernelized version of the reward-weighted regression. To show its feasibility, we evaluate this algorithm on a toy example and compare it to several previous approaches. Subsequently, we apply the approach to three robot tasks, i.e., the generalization of throwing movements in darts, of hitting movements in table tennis, and of throwing balls where the tasks are learned on several different real physical robots, i.e., a Barrett WAM, a BioRob, the JST-ICORP/SARCOS CBi and a Kuka KR?6. 相似文献
95.
Ivan Martinovic Paul Pichota Matthias Wilhelm Frank A. Zdarsky Jens B. Schmitt 《Pervasive and Mobile Computing》2009,5(5):510-525
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library. 相似文献
96.
M. Shamim Hossain Sandro Hardy Atif Alamri Abdulhameed Alelaiwi Verena Hardy Christoph Wilhelm 《Multimedia Systems》2016,22(6):659-674
Stroke is considered one of the main causes of death around the world. Survivors often suffer different kinds of disabilities in terms of their cognitive and motor capabilities, and are therefore unable to perform their day-to-day activities. To regain some of their cognitive as well as motor abilities, they require rehabilitation. To this end, we present a serious game framework based on augmented reality technology that may motivate the patients’ involvement in the rehabilitation exercise. Additionally, we analyze the requirements for such a framework and describe the concept and implementation of the proposed approach. Furthermore, we designed a wireless vibrotactile output device that is attached to a tangible object. The tangible object that is connected to the framework can give haptic as well as audio-visual feedback to the patient in a more motivating and entertaining environment for rehabilitation exercises. The suitability and utility of the proposed framework was evaluated with real stroke patients and compared against the performance of a healthy control group, thus facilitating occupational therapists in assessing a patient’s progress. Our evaluations show that the serious games with vibrotactile feedback are well accepted by patients. 相似文献
97.
Miroslaw Staron Wilhelm Meding Christer Nilsson 《Information and Software Technology》2009,51(4):721-737
As in every engineering discipline, metrics play an important role in software development, with the difference that almost all software projects need the customization of metrics used. In other engineering disciplines, the notion of a measurement system (i.e. a tool used to collect, calculate, and report quantitative data) is well known and defined, whereas it is not as widely used in software engineering. In this paper we present a framework for developing custom measurement systems and its industrial evaluation in a software development unit within Ericsson. The results include the framework for designing measurement systems and its evaluation in real life projects at the company. The results show that with the help of ISO/IEC standards, measurement systems can be effectively used in software industry and that the presented framework improves the way of working with metrics. This paper contributes with the presentation of how automation of metrics collection and processing can be successfully introduced into a large organization and shows the benefits of it: increased efficiency of metrics collection, increased adoption of metrics in the organization, independence from individuals and standardized nomenclature for metrics in the organization. 相似文献
98.
Gabriele Kern-Isberner Marco Wilhelm Christoph Beierle 《Annals of Mathematics and Artificial Intelligence》2017,79(1-3):163-179
An often used methodology for reasoning with probabilistic conditional knowledge bases is provided by the principle of maximum entropy (so-called MaxEnt principle) that realises an idea of least amount of assumed information and thus of being as unbiased as possible. In this paper we exploit the fact that MaxEnt distributions can be computed by solving nonlinear equation systems that reflect the conditional logical structure of these distributions. We apply the theory of Gröbner bases that is well known from computational algebra to the polynomial system which is associated with a MaxEnt distribution, in order to obtain results for reasoning with maximum entropy. We develop a three-phase compilation scheme extracting from a knowledge base consisting of probabilistic conditionals the information which is crucial for MaxEnt reasoning and transforming it to a Gröbner basis. Based on this transformation, a necessary condition for knowledge bases to be consistent is derived. Furthermore, approaches to answering MaxEnt queries are presented by demonstrating how inferring the MaxEnt probability of a single conditional from a given knowledge base is possible. Finally, we discuss computational methods to establish general MaxEnt inference rules. 相似文献
99.
A large part of safety-critical embedded systems has to satisfy hard real-time constraints. These need sound methods and tools to derive run-time guarantees that are not only reliable but also precise. The achievable precision highly depends on characteristics of the target architecture, the implementation methods and system layers of the software. Trends in hardware and software design run contrary to predictability. This article describes threats to timing predictability of systems, and proposes design principles that support timing predictability. The ultimate goal is to design performant systems with sharp upper and lower bounds on execution times. 相似文献
100.
Predicting weekly defect inflow in large software projects based on project planning and test status
Defects discovered during the testing phase in software projects need to be removed before the software is shipped to the customers. The removal of defects can constitute a significant amount of effort in a project and project managers are faced with a decision whether to continue development or shift some resources to cope with defect removal. The goal of this research is to improve the practice of project management by providing a method for predicting the number of defects reported into the defect database in the project. In this paper we present a method for predicting the number of defects reported into the defect database in a large software project on a weekly basis. The method is based on using project progress data, in particular the information about the test progress, to predict defect inflow in the next three coming weeks. The results show that the prediction accuracy of our models is up to 72% (mean magnitude of relative error for predictions of 1 week in advance is 28%) when used in ongoing large software projects. The method is intended to support project managers in more accurate adjusting resources in the project, since they are notified in advance about the potentially large effort needed to correct defects. 相似文献