全文获取类型
收费全文 | 4174篇 |
免费 | 345篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 28篇 |
综合类 | 3篇 |
化学工业 | 1720篇 |
金属工艺 | 34篇 |
机械仪表 | 109篇 |
建筑科学 | 135篇 |
矿业工程 | 1篇 |
能源动力 | 114篇 |
轻工业 | 1113篇 |
水利工程 | 20篇 |
石油天然气 | 17篇 |
无线电 | 145篇 |
一般工业技术 | 529篇 |
冶金工业 | 108篇 |
原子能技术 | 6篇 |
自动化技术 | 441篇 |
出版年
2024年 | 10篇 |
2023年 | 65篇 |
2022年 | 327篇 |
2021年 | 350篇 |
2020年 | 141篇 |
2019年 | 144篇 |
2018年 | 161篇 |
2017年 | 181篇 |
2016年 | 182篇 |
2015年 | 157篇 |
2014年 | 216篇 |
2013年 | 334篇 |
2012年 | 317篇 |
2011年 | 318篇 |
2010年 | 194篇 |
2009年 | 222篇 |
2008年 | 211篇 |
2007年 | 208篇 |
2006年 | 125篇 |
2005年 | 120篇 |
2004年 | 89篇 |
2003年 | 78篇 |
2002年 | 58篇 |
2001年 | 40篇 |
2000年 | 39篇 |
1999年 | 30篇 |
1998年 | 28篇 |
1997年 | 29篇 |
1996年 | 28篇 |
1995年 | 15篇 |
1994年 | 10篇 |
1993年 | 7篇 |
1992年 | 5篇 |
1991年 | 9篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 5篇 |
1985年 | 7篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1972年 | 4篇 |
1969年 | 2篇 |
排序方式: 共有4523条查询结果,搜索用时 15 毫秒
81.
María Cristina Riff Xavier Bonnaire Bertrand Neveu 《Engineering Applications of Artificial Intelligence》2009,22(4-5):823-827
In this paper, we present a review of the recent approaches proposed in the literature for strip-packing problems. Many of them have been concurrently published, given some similar results for the same set of benchmarks. Due to the quantity of published papers, it is difficult to ascertain the level of current research in this area. 相似文献
82.
We describe a method to compute the internal parameters (focal and principal point) of a camera with known position and orientation, based on the observation of two or more conics on a known plane. The conics can even be degenerate (e.g., pairs of lines). The proposed method can be used to re-estimate the internal parameters of a fully calibrated camera after zooming to a new, unknown, focal length. It also allows estimating the internal parameters when a second, fully calibrated camera observes the same conics. The parameters estimated through the proposed method are coherent with the output of more traditional procedures that require a higher number of calibration images. A deep analysis of the geometrical configurations that influence the proposed method is also reported. 相似文献
83.
João André Cristina Santos Lino Costa 《Journal of Intelligent and Robotic Systems》2016,82(3-4):379-397
Robots must be able to adapt their motor behavior to unexpected situations in order to safely move among humans. A necessary step is to be able to predict failures, which result in behavior abnormalities and may cause irrecoverable damage to the robot and its surroundings, i.e. humans. In this paper we build a predictive model of sensor traces that enables early failure detection by means of a skill memory. Specifically, we propose an architecture based on a biped locomotion solution with improved robustness due to sensory feedback, and extend the concept of Associative Skill Memories (ASM) to periodic movements by introducing several mechanisms into the training workflow, such as linear interpolation and regression into a Dynamical Motion Primitive (DMP) system such that representation becomes time invariant and easily parameterizable. The failure detection mechanism applies statistical tests to determine the optimal operating conditions. Both training and failure testing were conducted on a DARwIn-OP inside a simulation environment to assess and validate the failure detection system proposed. Results show that the system performance in terms of the compromise between sensitivity and specificity is similar with and without the proposed mechanism, while achieving a significant data size reduction due to the periodic approach taken. 相似文献
84.
Rodrigo Costa Mateus Thiago Luís Lopes Siqueira Valéria Cesário Times Ricardo Rodrigues Ciferri Cristina Dutra de Aguiar Ciferri 《Distributed and Parallel Databases》2016,34(3):425-461
Cloud computing systems handle large volumes of data by using almost unlimited computational resources, while spatial data warehouses (SDWs) are multidimensional databases that store huge volumes of both spatial data and conventional data. Cloud computing environments have been considered adequate to host voluminous databases, process analytical workloads and deliver database as a service, while spatial online analytical processing (spatial OLAP) queries issued over SDWs are intrinsically analytical. However, hosting a SDW in the cloud and processing spatial OLAP queries over such database impose novel obstacles. In this article, we introduce novel concepts as cloud SDW and spatial OLAP as a service, and afterwards detail the design of novel schemas for cloud SDW and spatial OLAP query processing over cloud SDW. Furthermore, we evaluate the performance to process spatial OLAP queries in cloud SDWs using our own query processor aided by a cloud spatial index. Moreover, we describe the cloud spatial bitmap index to improve the performance to process spatial OLAP queries in cloud SDWs, and assess it through an experimental evaluation. Results derived from our experiments revealed that such index was capable to reduce the query response time from 58.20 up to 98.89 %. 相似文献
85.
Sarni Suhaila Rahim Chrisina Jayne Vasile Palade James Shuttleworth 《Neural computing & applications》2016,27(5):1149-1164
Regular eye screening is essential for the early detection and treatment of the diabetic retinopathy. This paper presents a novel automatic screening system for diabetic retinopathy that focuses on the detection of the earliest visible signs of retinopathy, which are microaneurysms. Microaneurysms are small dots on the retina, formed by ballooning out of a weak part of the capillary wall. The detection of the microaneurysms at an early stage is vital, and it is the first step in preventing the diabetic retinopathy. The paper first explores the existing systems and applications related to diabetic retinopathy screening, with a focus on the microaneurysm detection methods. The proposed decision support system consists of an automatic acquisition, screening and classification of diabetic retinopathy colour fundus images, which could assist in the detection and management of the diabetic retinopathy. Several feature extraction methods and the circular Hough transform have been employed in the proposed microaneurysm detection system, alongside the fuzzy histogram equalisation method. The latter method has been applied in the preprocessing stage of the diabetic retinopathy eye fundus images and provided improved results for detecting the microaneurysms. 相似文献
86.
Cristian Danila Georgiana Stegaru Aurelian Mihai Stanescu Cristina Serbanescu 《Journal of Intelligent Manufacturing》2016,27(1):73-82
Integration of Web-Services and “smart objects” in supply chain manufacturing systems (SCM) enables enterprise innovation and competitiveness in a globalized economy. The paper proposes a web-service based architecture for SCM that enables enterprises to develop context-awareness and to achieve interoperability at data, services, processes and business levels using event based web service notifications. The architecture is analyzed and implemented following the case study of an enterprise in the automotive industry. 相似文献
87.
Vasile Dragan Author vitae 《Automatica》2011,47(1):122-126
In this paper, the problem of robust H∞ control is investigated for sampled-data systems with probabilistic sampling. The parameter uncertainties are time-varying norm-bounded and appear in both the state and input matrices. For the simplicity of technical development, only two different sampling periods are considered whose occurrence probabilities are given constants and satisfy Bernoulli distribution, which can be further extended to the case with multiple stochastic sampling periods. By applying an input delay approach, the probabilistic sampling system is transformed into a continuous time-delay system with stochastic parameters in the system matrices. By linear matrix inequality (LMI) approach, sufficient conditions are obtained, which guarantee the robust mean-square exponential stability of the system with an H∞ performance. Moreover, an H∞ controller design procedure is then proposed. An illustrative example is included to demonstrate the effectiveness of the proposed techniques. 相似文献
88.
In the study of data exchange one usually assumes an open-world semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only moves ‘as much data as needed’ from the source to the target to satisfy constraints of a schema mapping. It avoids some of the problems exhibited by the open-world semantics, but limits the expressivity of schema mappings. Here we propose a mixed approach: one can designate different attributes of target schemas as open or closed, to combine the additional expressivity of the open-world semantics with the better behavior of query answering in closed worlds. We define such schema mappings, and show that they cover a large space of data exchange solutions with two extremes being the known open and closed-world semantics. We investigate the problems of query answering and schema mapping composition, and prove two trichotomy theorems, classifying their complexity based on the number of open attributes. We find conditions under which schema mappings compose, extending known results to a wide range of closed-world mappings. We also provide results for restricted classes of queries and mappings guaranteeing lower complexity. 相似文献
89.
Rodrigo RomanAuthor Vitae Cristina AlcarazAuthor Vitae 《Computers & Electrical Engineering》2011,37(2):147-159
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN. 相似文献
90.