全文获取类型
收费全文 | 5565篇 |
免费 | 277篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 78篇 |
综合类 | 13篇 |
化学工业 | 1158篇 |
金属工艺 | 126篇 |
机械仪表 | 164篇 |
建筑科学 | 121篇 |
矿业工程 | 29篇 |
能源动力 | 296篇 |
轻工业 | 463篇 |
水利工程 | 59篇 |
石油天然气 | 42篇 |
无线电 | 635篇 |
一般工业技术 | 1259篇 |
冶金工业 | 545篇 |
原子能技术 | 66篇 |
自动化技术 | 841篇 |
出版年
2024年 | 24篇 |
2023年 | 117篇 |
2022年 | 287篇 |
2021年 | 437篇 |
2020年 | 263篇 |
2019年 | 295篇 |
2018年 | 312篇 |
2017年 | 268篇 |
2016年 | 260篇 |
2015年 | 174篇 |
2014年 | 222篇 |
2013年 | 429篇 |
2012年 | 257篇 |
2011年 | 286篇 |
2010年 | 190篇 |
2009年 | 162篇 |
2008年 | 151篇 |
2007年 | 136篇 |
2006年 | 117篇 |
2005年 | 85篇 |
2004年 | 65篇 |
2003年 | 80篇 |
2002年 | 61篇 |
2001年 | 52篇 |
2000年 | 50篇 |
1999年 | 66篇 |
1998年 | 154篇 |
1997年 | 128篇 |
1996年 | 98篇 |
1995年 | 73篇 |
1994年 | 61篇 |
1993年 | 56篇 |
1992年 | 36篇 |
1991年 | 43篇 |
1990年 | 36篇 |
1989年 | 31篇 |
1988年 | 25篇 |
1987年 | 29篇 |
1986年 | 34篇 |
1985年 | 32篇 |
1984年 | 26篇 |
1983年 | 29篇 |
1982年 | 13篇 |
1981年 | 13篇 |
1980年 | 11篇 |
1978年 | 16篇 |
1977年 | 17篇 |
1976年 | 23篇 |
1973年 | 8篇 |
1972年 | 8篇 |
排序方式: 共有5895条查询结果,搜索用时 0 毫秒
71.
Detection of rapidly evolving malware requires classification techniques that can effectively and efficiently detect zero-day
attacks. Such detection is based on a robust model of benign behavior and deviations from that model are used to detect malicious
behavior. In this paper we propose a low-complexity host-based technique that uses deviations in static file attributes to
detect malicious executables. We first develop simple statistical models of static file attributes derived from the empirical
data of thousands of benign executables. Deviations among the attribute models of benign and malware executables are then
quantified using information-theoretic (Kullback-Leibler-based) divergence measures. This quantification reveals distinguishing
attributes that are considerably divergent between benign and malware executables and therefore can be used for detection.
We use the benign models of divergent attributes in cross-correlation and log-likelihood frameworks to classify malicious
executables. Our results, using over 4,000 malicious file samples, indicate that the proposed detector provides reasonably
high detection accuracy, while having significantly lower complexity than existing detectors. 相似文献
72.
Premjit K. Sanjram Azizuddin Khan 《International journal of human-computer studies》2011,69(6):428-439
The paper examines prospective memory (ProM) in programmer multitasking and reports administration of a naturalistic atypical action. The study emphasizes on how attention, time orientation, and expertise affect ProM performance in multitasking among a group of computer science and engineering students (N=108). The results suggest that attention play a crucial role in multitasking and ProM performance with respect to whether or not a word display requires more attention to be devoted in monitoring and identifying it for an appropriate action. Polychrons exhibit lesser degree of ProM performance failure than monochrons whereas expertise does not have an effect. Finally, results show that out of overall ProM performance failure, habit intrusion errors comprise of 16.22% occurring 1.75 times in every 10 valid click responses of ProM task. Moreover, experts demonstrate a superior performance over novices in programming. 相似文献
73.
Spatial sensitivity analysis of multi-criteria weights in GIS-based land suitability evaluation 总被引:3,自引:0,他引:3
With growing interest in extending GIS to support multi-criteria decision-making (MCDM) methods, enhancing GIS-based MCDM with sensitivity analysis (SA) procedures is crucial to understand the model behavior and its limitations. This paper presents a novel approach of examining multi-criteria weight sensitivity of a GIS-based MCDM model. It explores the dependency of model output on the weights of input parameters, identifying criteria that are especially sensitive to weight changes and to show the impacts of changing criteria weights on the model outcomes in spatial dimension. A methodology was developed to perform simulations where the weights associated with all criteria used for suitability modelling were varied one-at-a-time (OAT) to investigate their relative impacts on the final evaluation results. A tool which incorporates the OAT method with the Analytical Hierarchy Process (AHP) within the ArcGIS environment was implemented. It permits a range of user defined simulations to be performed to quantitatively evaluate model dynamic changes, measures the stability of results with respect to the variation of different parameter weights, and displays spatial change dynamics. A case study of irrigated cropland suitability assessment addressing the application of the new GIS-based AHP-SA tool is described. It demonstrates that the tool is spatial, simple and flexible. 相似文献
74.
The aim of the study was to examine the pattern of the change in discomfort for combined wrist deviation and forearm rotation as joint angles increased away from neutral in a repetitive task. There were five levels of wrist deviation (neutral, 35% and 55% of the range of motion (ROM) in radial and ulnar deviation) and five levels of forearm rotation (neutral, 30% and 60% of the ROM in pronation and supination). Twenty-five participants performed a repetitive flexion task with a force of 10 N +/- 1 N at a frequency of 15 exertions per min, with replication after 1 week for six of the participants. A visual analogue scale was used for recording the discomfort scores. Repeated measures analysis of covariance with the Greenhouse-Geisser correction, where necessary, was used on transformed values of the discomfort scores. Grip test endurance time at 50% of maximum voluntary contraction was included as a covariate. Wrist deviation (p = 0.007) and forearm rotation (p = 0.001) were found to have significant effects. Interactions of the main factors were not significant and nor was the covariate. Quadratic regression equations were derived and were used to generate iso-discomfort contours, which show a useful area of low discomfort around the central neutral zone of wrist postures, but with steep increases in discomfort at the extreme combinations of wrist ulnar/radial deviation with forearm pronation/supination. Discomfort equations and contours, showing wrist and forearm postures, which are either acceptable or potentially injurious, are useful for the design of industrial tools, machine controls and workspaces. Reference to these can help to reduce the risk of musculoskeletal injury associated with the tasks or tools by avoiding poor postures with unacceptable deviations from neutral posture. 相似文献
75.
K. Geihs P. Barone F. Eliassen J. Floch R. Fricke E. Gjorven S. Hallsteinsen G. Horn M. U. Khan A. Mamelli G. A. Papadopoulos N. Paspallis R. Reichle E. Stav 《Software》2009,39(4):385-422
Driven by the emergence of mobile and pervasive computing there is a growing demand for context‐aware software systems that can dynamically adapt to their run‐time environment. We present the results of project MADAM that has delivered a comprehensive solution for the development and operation of context‐aware, self‐adaptive applications. The main contributions of MADAM are (a) a sophisticated middleware that supports the dynamic adaptation of component‐based applications, and (b) an innovative model‐driven development methodology that is based on abstract adaptation models and corresponding model‐to‐code transformations. MADAM has demonstrated the viability of a general, integrated approach to application‐level adaptation. We discuss our experiences with two real‐world case studies that were built using the MADAM approach. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
76.
Mohamed Sahli Christine Millot Claude Roques-Carmes Chantal Khan Malek 《Microsystem Technologies》2009,15(6):827-835
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing. 相似文献
77.
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
Abdul Hameed Alireza Khoshkbarforoushha Rajiv Ranjan Prem Prakash Jayaraman Joanna Kolodziej Pavan Balaji Sherali Zeadally Qutaibah Marwan Malluhi Nikos Tziritas Abhinav Vishnu Samee U. Khan Albert Zomaya 《Computing》2016,98(7):751-774
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability. 相似文献
78.
Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal placement of wind turbines. Due to complex nature of micrositing of wind turbines, the wind farm layout design problem is considered a complex optimization problem. In the recent past, various techniques and algorithms have been developed for optimization of energy output from wind farms. The present study proposes an optimization approach based on the cuckoo search (CS) algorithm, which is relatively a recent technique. A variant of CS is also proposed that incorporates a heuristic-based seed solution for a better performance. The proposed CS algorithms are compared with genetic and particle swarm optimization (PSO) algorithms, which have been extensively applied to wind farm layout design. Empirical results indicate that the proposed CS algorithms outperformed the genetic and PSO algorithms for the given test scenarios in terms of yearly power output and efficiency. 相似文献
79.
Muhammad Umer Khan Shuai Li Qixin Wang Zili Shao 《Journal of Intelligent and Robotic Systems》2016,82(1):163-174
This paper mainly addresses formation control problem of non-holonomic systems in an optimized manner. Instead of using linearization to solve this problem approximately, we designed control laws with guaranteed global convergence by leveraging nonlinear transformations. Under this nonlinear transformation, consensus of non-holonomic robots can be converted into a stabilization problem, to which optimal treatment applies. This concept is then extended to the formation control and tracking problem for a team of robots following leader-follower strategy. A trajectory generator prescribes the feasible motion of virtual reference robot, a decentralized control law is used for each robot to track the reference while maintaining the formation. The asymptotic convergence of follower robots to the position and orientation of the reference robot is ensured using the Lyapunov function which is also generated using chained form differential equations. In order to witness the efficacy of the scheme, simulations results are presented for Unicycle and Car-like robots. 相似文献
80.
Muhammad Sajjad Khan Muhammad Sung Wook Baik Seungmin Rho Zahoor Jan Sang-Soo Yeo Irfan Mehmood 《Multimedia Tools and Applications》2017,76(3):3519-3536
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers. 相似文献