全文获取类型
收费全文 | 1342篇 |
免费 | 71篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 14篇 |
综合类 | 1篇 |
化学工业 | 259篇 |
金属工艺 | 9篇 |
机械仪表 | 10篇 |
建筑科学 | 59篇 |
矿业工程 | 3篇 |
能源动力 | 57篇 |
轻工业 | 254篇 |
水利工程 | 16篇 |
石油天然气 | 3篇 |
无线电 | 138篇 |
一般工业技术 | 138篇 |
冶金工业 | 29篇 |
原子能技术 | 1篇 |
自动化技术 | 425篇 |
出版年
2024年 | 3篇 |
2023年 | 15篇 |
2022年 | 41篇 |
2021年 | 53篇 |
2020年 | 20篇 |
2019年 | 35篇 |
2018年 | 44篇 |
2017年 | 38篇 |
2016年 | 62篇 |
2015年 | 44篇 |
2014年 | 77篇 |
2013年 | 105篇 |
2012年 | 100篇 |
2011年 | 102篇 |
2010年 | 84篇 |
2009年 | 93篇 |
2008年 | 98篇 |
2007年 | 92篇 |
2006年 | 75篇 |
2005年 | 46篇 |
2004年 | 42篇 |
2003年 | 30篇 |
2002年 | 24篇 |
2001年 | 12篇 |
2000年 | 10篇 |
1999年 | 10篇 |
1998年 | 13篇 |
1997年 | 4篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 6篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1988年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1979年 | 2篇 |
排序方式: 共有1416条查询结果,搜索用时 15 毫秒
21.
Ioannis D. Moscholios Michael D. Logothetis 《International Journal of Communication Systems》2006,19(1):67-93
We consider a single link loss system of quasi‐random input, described by the Engset multirate loss model (EnMLM). Blocked calls may once reattempt to be connected to the system requiring less bandwidth; then the system is described by the single retry model for finite sources (f‐SRM). The EnMLM and the f‐SRM are extended with the single threshold finite source model (f‐STM), where calls may attempt to be connected to the system with less bandwidth requirements, according to the link occupancy, before blocking occurs. We focus on CBP equalization in the EnMLM, f‐SRM and f‐STM, under the bandwidth reservation (BR) policy. For this analysis, we apply two approximate methods, the Roberts' method and the method of reverse transition rates (RTR), which lead to a recursive CBP calculation. We evaluate the accuracy of the above models under the BR policy by comparing the analytical with simulation CBP results, based on the relative approximation errors (RAE). The results are highly satisfactory because they show that the proposed models (formulas) lead to small RAE. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
22.
In this paper, we study the effect of the round trip propagation delay on performance measures of wavelength division multiplexing (WDM) networks. Even though the impact of propagation delay is substantial in the optical network's behavior, most of the studies ignore the effect of this time component in throughput and delay evaluation. We assume a WDM local area network (LAN) where the round trip propagation delay is less or equal to a data packet transmission time. The proposed asynchronous transmission policy avoids data channel collision. In the analysis, we take into account the propagation delays and the effect of receiver collision for a system with a finite number of stations. 相似文献
23.
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to the more traditional metrics such as throughput. In this paper, two topology-unaware MAC protocols—in which the scheduling time slots are allocated irrespectively of the underline topology—are considered and their energy consumption is derived. It turns out that the per frame power consumption is lower for the less throughput-efficient protocol, suggesting that energy savings are achieved at the expense of throughput.A finer energy consumption study is carried out in the sequel, focusing on the amount of energy consumed to successfully transmit a certain number of packets, or equivalently, on the per successful transmission power consumption. It is shown that the more throughput-efficient protocol consumes less energy per successful transmission under certain conditions (which are derived), due to the lower number of transmission attempts before a data packet is successfully transmitted. The same energy-efficiency relation is observed under certain conditions (which are derived) when data packets are delay constrained and, thus, may become obsolete if not transmitted successfully within a specific time interval. The conditions under which the per successful transmission power consumption is minimized for delay-constrained packets, are also established in this work and it is observed that when the system throughput is maximized, the power consumed is close to the minimum. Simulation results support the claims and the expectations of the aforementioned analysis. 相似文献
24.
In this work we introduce two practical and interesting models of ad-hoc mobile networks: (a) hierarchical ad-hoc networks, comprised of dense subnetworks of mobile users interconnected by a very fast yet limited backbone infrastructure, (b) highly changing ad-hoc networks, where the deployment area changes in a highly dynamic way and is unknown to the protocol. In such networks, we study the problem of basic communication, i.e., sending messages from a sender node to a receiver node. For highly changing networks, we investigate an efficient communication protocol exploiting the coordinated motion of a small part of an ad-hoc mobile network (the runners support) to achieve fast communication. This protocol instead of using a fixed sized support for the whole duration of the protocol, employs a support of some initial (small) size which adapts (given some time which can be made fast enough) to the actual levels of traffic and the (unknown and possibly rapidly changing) network area, by changing its size in order to converge to an optimal size, thus satisfying certain Quality of Service criteria. Using random walks theory, we show that such an adaptive approach is, for this class of ad-hoc mobile networks, significantly more efficient than a simple non-adaptive implementation of the basic runners support idea, introduced in [9,10]. For hierarchical ad-hoc networks, we establish communication by using a runners support in each lower level of the hierarchy (i.e., in each dense subnetwork), while the fast backbone provides interconnections at the upper level (i.e., between the various subnetworks). We analyze the time efficiency of this hierarchical approach. This analysis indicates that the hierarchical implementation of the support approach significantly outperforms a simple implementation of it in hierarchical ad-hoc networks. Finally, we discuss a possible combination of the two approaches above (the hierarchical and the adaptive ones) that can be useful in ad-hoc networks that are both hierarchical and highly changing. Indeed, in such cases the hierarchical nature of these networks further supports the possibility of adaptation. 相似文献
25.
Ronak A. Kapadia Simant R. Upreti Ali Lohi Ioannis Chatzis 《Journal of Petroleum Science and Engineering》2006,51(3-4):214-222
In this work, a mathematical model is developed and simulated to determine gas dispersion along with solubility during the vapor extraction (Vapex) of live oil from a laboratory scale physical model. The physical model is a rectangular block of homogenous porous medium saturated with heavy oil and bitumen. At a given temperature and pressure, the block is initially exposed on its side to a solvent gas, which diffuses into the medium and gets absorbed. The absorption of gas reduces the viscosity of heavy oil and bitumen causing it to drain under gravity. The low-viscosity “live oil” is produced at the bottom of the porous block. The production of live oil with time is accompanied by the shrinkage of oil in the block as well as its increased exposure to gas from top. These phenomena of Vapex are described by the mathematical model, which is used to calculate live oil production with various values of gas solubility and dispersion. Their optimal values are determined for the vapor extraction of Cold Lake bitumen with butane by matching calculated live oil production with its experimental values published earlier. 相似文献
26.
Facial expression recognition in image sequences using geometric deformation features and Support Vector Machines. 总被引:5,自引:0,他引:5
In this paper, two novel methods for facial expression recognition in facial image sequences are presented. The user has to manually place some of Candide grid nodes to face landmarks depicted at the first frame of the image sequence under examination. The grid-tracking and deformation system used, based on deformable models, tracks the grid in consecutive video frames over time, as the facial expression evolves, until the frame that corresponds to the greatest facial expression intensity. The geometrical displacement of certain selected Candide nodes, defined as the difference of the node coordinates between the first and the greatest facial expression intensity frame, is used as an input to a novel multiclass Support Vector Machine (SVM) system of classifiers that are used to recognize either the six basic facial expressions or a set of chosen Facial Action Units (FAUs). The results on the Cohn-Kanade database show a recognition accuracy of 99.7% for facial expression recognition using the proposed multiclass SVMs and 95.1% for facial expression recognition based on FAU detection. 相似文献
27.
28.
Reyhaneh Changiz Hassan Halabian F. Richard Yu Ioannis Lambadaris Helen Tang 《Wireless Communications and Mobile Computing》2014,14(15):1450-1470
In cooperative wireless networks, relay nodes are employed to improve the performance of the network in terms of throughput and reliability. However, the presence of malicious relay nodes in the network may severely degrade the performance of the system. When a relay node behaves maliciously, there exists a possibility that such a node refuses to cooperate when it is selected for cooperation or deliberately drops the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks by using Bayesian framework. In contrast with the previous schemes proposed in wireless networks, this approach takes the channel state information and the relay selection decisions into account to derive a pure trust value for each relay node. The proposed method can be applied to any cooperative system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
29.
Chatzigeorgiou Ioannis D. Rodrigues Miguel R. Wassell Ian J. Carrasco Rolando A. 《Selected Areas in Communications, IEEE Journal on》2009,27(6):944-953
The objective of this paper is two-fold. Initially, we present an analytic technique to rapidly evaluate an approximation to the union bound on the bit error probability of turbo codes. This technique exploits the most significant terms of the union bound, which can be calculated straightforwardly by considering the properties of the constituent convolutional encoders. Subsequently, we use the bound approximation to demonstrate that specific punctured rate-1/2 turbo codes can achieve a lower error floor than that of their rate-1/3 parent codes. In particular, we propose pseudo-random puncturing as a means of improving the bandwidth efficiency of a turbo code and simultaneously lowering its error floor. 相似文献
30.