全文获取类型
收费全文 | 1247篇 |
免费 | 79篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 273篇 |
金属工艺 | 21篇 |
机械仪表 | 45篇 |
建筑科学 | 63篇 |
矿业工程 | 3篇 |
能源动力 | 93篇 |
轻工业 | 120篇 |
水利工程 | 15篇 |
石油天然气 | 5篇 |
无线电 | 113篇 |
一般工业技术 | 223篇 |
冶金工业 | 69篇 |
原子能技术 | 15篇 |
自动化技术 | 260篇 |
出版年
2024年 | 4篇 |
2023年 | 13篇 |
2022年 | 31篇 |
2021年 | 38篇 |
2020年 | 32篇 |
2019年 | 36篇 |
2018年 | 64篇 |
2017年 | 36篇 |
2016年 | 66篇 |
2015年 | 37篇 |
2014年 | 66篇 |
2013年 | 120篇 |
2012年 | 73篇 |
2011年 | 100篇 |
2010年 | 62篇 |
2009年 | 134篇 |
2008年 | 79篇 |
2007年 | 57篇 |
2006年 | 56篇 |
2005年 | 29篇 |
2004年 | 29篇 |
2003年 | 23篇 |
2002年 | 21篇 |
2001年 | 12篇 |
2000年 | 14篇 |
1999年 | 7篇 |
1998年 | 13篇 |
1997年 | 10篇 |
1996年 | 3篇 |
1995年 | 6篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1980年 | 2篇 |
1979年 | 7篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1974年 | 3篇 |
1973年 | 2篇 |
排序方式: 共有1328条查询结果,搜索用时 0 毫秒
21.
Hakk? Murat Genç Osman Kaan Erol?brahim Eksin Mehmet Fatih BerberBinnur Onaran Güleryüz 《Expert systems with applications》2012,39(1):316-327
An appropriate and efficient gate assignment is of great importance in airports since it plays a major role in the revenue obtained from the airport operations. In this study, we have focused mainly on maximum gate employment, or in other words minimize the total duration of un-gated flights. Here, we propose a method that combines the benefits of heuristic approaches with some stochastic approach instead of using a purely probabilistic approach to top-down solution of the problem. The heuristic approaches are usually used in order to provide a fast solution of the problem and later stochastic searches are used in order to ameliorate the previous results of the heuristic approach whenever possible. The proposed method generates an assignment order for the whole planes that corresponds to assignment priority. The ordering process is followed by the allocation step. Since, in practice, each airport has its own physical architecture, there have been arisen many constraints mainly concerning airplane types and parking lots in this step. Sequentially handling the plane ordering and allocation phases provides us great modularity in handling the constraints. The effectiveness of the proposed methodology has been tried to be illustrated firstly on fictively generated flight schedule data and secondly on the real world data obtained from a real world application developed for ?stanbul Atatürk Airport. 相似文献
22.
Murat Caner Testik 《Quality and Reliability Engineering International》2005,21(2):115-130
As a result of time series parameter estimation based on previous data, the probability content of residuals control charts may vary when standard control limits are used. In this paper, we consider the AR(1) process with the autoregressive parameter being estimated from a sample of observations. The performance of the exponentially weighted moving average (EWMA) control chart for residuals is investigated. Modified control limits that account for the uncertainty in the parameter estimate are provided. Comparisons through simulation signify the importance of the modified control limits. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
23.
24.
25.
In this paper, the maximum length limits for integral bridges built on clay are determined as a function of the ability of steel H-piles supporting the abutments to sustain thermal-induced cyclic displacements and the flexural capacity of the abutment. First, H-pile sections that can accommodate large plastic deformations are determined considering their local buckling instability. Then, a low-cycle fatigue damage model is used to determine the maximum cyclic deformations that such piles can sustain. Next, nonlinear static pushover analyses of two typical integral bridges are conducted to study the effect of various geometric, structural, and geotechnical parameters on the performance of integral bridges subjected to uniform temperature variations. Using the pushover analyses results, design guidelines are developed to enhance and determine the maximum length limits for integral bridges built on clay. It is recommended that the maximum length of concrete integral bridges be limited to 210 m (689 ft) in cold climates and 260 m (853 ft) in moderate climates and that of steel integral bridges be limited to 120 m (394 ft) in cold climates and 180 m (590 ft) in moderate climates. 相似文献
26.
Ashraf A. Almimi Murat Kulahci Douglas C. Montgomery 《Quality and Reliability Engineering International》2008,24(2):127-152
Inserting estimates for the missing observations from split‐plot designs restores their balanced or orthogonal structure and alleviates the difficulties in the statistical analysis. In this article, we extend a method due to Draper and Stoneman to estimate the missing observations from unreplicated two‐level factorial and fractional factorial split‐plot (FSP and FFSP) designs. The missing observations, which can either be from the same whole plot, from different whole plots, or comprise entire whole plots, are estimated by equating to zero a number of specific contrast columns equal to the number of the missing observations. These estimates are inserted into the design table and the estimates for the remaining effects (or alias chains of effects as the case with FFSP designs) are plotted on two half‐normal plots: one for the whole‐plot effects and the other for the subplot effects. If the smaller effects do not point at the origin, then different contrast columns to some or all of the initial ones should be discarded and the plots re‐examined for bias. Using examples, we show how the method provides estimates for the missing observations that are very close to their actual values. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
27.
28.
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection 总被引:1,自引:0,他引:1
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) and (ii) encrypting location data using private information retrieval (PIR) protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset D. For instance, location cloaking requires large-sized CRs, leading to excessive disclosure of POIs (O(|D|) in the worst case). PIR, on the other hand, reduces this bound to \(O(\sqrt{|D|})\), but at the expense of high processing and communication overhead. We propose hybrid, two-step approaches for private location-based queries which provide protection for both the users and the database. In the first step, user locations are generalized to coarse-grained CRs which provide strong privacy. Next, a PIR protocol is applied with respect to the obtained query CR. To protect against excessive disclosure of POI locations, we devise two cryptographic protocols that privately evaluate whether a point is enclosed inside a rectangular region or a convex polygon. We also introduce algorithms to efficiently support PIR on dynamic POI sub-sets. We provide solutions for both approximate and exact NN queries. In the approximate case, our method discloses O(1) POI, orders of magnitude fewer than CR- or PIR-based techniques. For the exact case, we obtain optimal disclosure of a single POI, although with slightly higher computational overhead. Experimental results show that the hybrid approaches are scalable in practice, and outperform the pure-PIR approach in terms of computational and communication overhead. 相似文献
29.
Chinmay Rao Asok Ray Soumik Sarkar Murat Yasar 《Signal, Image and Video Processing》2009,3(2):101-114
Symbolic dynamic filtering (SDF) has been recently reported in literature as a pattern recognition tool for early detection
of anomalies (i.e., deviations from the nominal behavior) in complex dynamical systems. This paper presents a review of SDF
and its performance evaluation relative to other classes of pattern recognition tools, such as Bayesian Filters and Artificial
Neural Networks, from the perspectives of: (i) anomaly detection capability, (ii) decision making for failure mitigation and
(iii) computational efficiency. The evaluation is based on analysis of time series data generated from a nonlinear active
electronic system.
This work has been supported in part by the U.S. Army Research Laboratory and the U.S. Army Research Office under Grant No.
W911NF-07-1-0376, by the U.S. Office of Naval Research under Grant No. N00014-08-1-380, and by NASA under Cooperative Agreement
No. NNX07AK49A. 相似文献
30.
We develop analytical and numerical conditions to determine whether limit cycle oscillations synchronize in diffusively coupled systems. We examine two classes of systems: reaction–diffusion PDEs with Neumann boundary conditions, and compartmental ODEs, where compartments are interconnected through diffusion terms with adjacent compartments. In both cases the uncoupled dynamics are governed by a nonlinear system that admits an asymptotically stable limit cycle. We provide two-time scale averaging methods for certifying stability of spatially homogeneous time-periodic trajectories in the presence of sufficiently small or large diffusion and develop methods using the structured singular value for the case of intermediate diffusion. We highlight cases where diffusion stabilizes or destabilizes such trajectories. 相似文献