全文获取类型
收费全文 | 1838篇 |
免费 | 60篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 8篇 |
综合类 | 1篇 |
化学工业 | 709篇 |
金属工艺 | 23篇 |
机械仪表 | 34篇 |
建筑科学 | 24篇 |
矿业工程 | 2篇 |
能源动力 | 85篇 |
轻工业 | 172篇 |
水利工程 | 9篇 |
石油天然气 | 4篇 |
无线电 | 131篇 |
一般工业技术 | 338篇 |
冶金工业 | 53篇 |
原子能技术 | 17篇 |
自动化技术 | 298篇 |
出版年
2024年 | 4篇 |
2023年 | 32篇 |
2022年 | 86篇 |
2021年 | 91篇 |
2020年 | 75篇 |
2019年 | 74篇 |
2018年 | 77篇 |
2017年 | 69篇 |
2016年 | 47篇 |
2015年 | 48篇 |
2014年 | 84篇 |
2013年 | 295篇 |
2012年 | 85篇 |
2011年 | 81篇 |
2010年 | 77篇 |
2009年 | 70篇 |
2008年 | 66篇 |
2007年 | 56篇 |
2006年 | 61篇 |
2005年 | 46篇 |
2004年 | 24篇 |
2003年 | 31篇 |
2002年 | 21篇 |
2001年 | 19篇 |
2000年 | 20篇 |
1999年 | 19篇 |
1998年 | 23篇 |
1997年 | 13篇 |
1996年 | 16篇 |
1995年 | 15篇 |
1994年 | 18篇 |
1993年 | 13篇 |
1992年 | 17篇 |
1991年 | 12篇 |
1990年 | 14篇 |
1989年 | 21篇 |
1988年 | 9篇 |
1987年 | 7篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1983年 | 11篇 |
1982年 | 9篇 |
1981年 | 5篇 |
1979年 | 7篇 |
1978年 | 7篇 |
1977年 | 2篇 |
1976年 | 5篇 |
1975年 | 3篇 |
1971年 | 2篇 |
排序方式: 共有1908条查询结果,搜索用时 15 毫秒
11.
This review paper summarizes current research efforts toward a comprehensive view of wet material dewatering, considering the binding energy as the strength to hold water, and rupture energy given to remove moisture from materials. 相似文献
12.
Dov Katz Arun Venkatraman Moslem Kazemi J. Andrew Bagnell Anthony Stentz 《Autonomous Robots》2014,37(4):369-382
Autonomous manipulation in unstructured environments will enable a large variety of exciting and important applications. Despite its promise, autonomous manipulation remains largely unsolved. Even the most rudimentary manipulation task—such as removing objects from a pile—remains challenging for robots. We identify three major challenges that must be addressed to enable autonomous manipulation: object segmentation, action selection, and motion generation. These challenges become more pronounced when unknown man-made or natural objects are cluttered together in a pile. We present a system capable of manipulating unknown objects in such an environment. Our robot is tasked with clearing a table by removing objects from a pile and placing them into a bin. To that end, we address the three aforementioned challenges. Our robot perceives the environment with an RGB-D sensor, segmenting the pile into object hypotheses using non-parametric surface models. Our system then computes the affordances of each object, and selects the best affordance and its associated action to execute. Finally, our robot instantiates the proper compliant motion primitive to safely execute the desired action. For efficient and reliable action selection, we developed a framework for supervised learning of manipulation expertise. To verify the performance of our system, we conducted dozens of trials and report on several hours of experiments involving more than 1,500 interactions. The results show that our learning-based approach for pile manipulation outperforms a common sense heuristic as well as a random strategy, and is on par with human action selection. 相似文献
13.
P. V. Arun 《International Journal of Speech Technology》2014,17(2):161-165
Developments in the computational analysis of Dzongkha have been limited due to the syntactic complexity of the language. Though the natural language processing domains have witnessed rapid developments over the past decade; very few works has been done in Dzongkha despite of being the national language of Bhutan. In this paper, we have investigated the major problems in Dzongkha processing and have proposed a semantic parsing approach for effective processing of this language. We have used a probabilistic approach and have used the linguistic rules in Dzongkha to remove the ambiguities. Semantic representations along with belief net concepts have been used to increase the accuracy of segmentation, syntactic and semantic analyses. The proposed frame work has been able to solve the major issues related to Dzongkha processing, however needs to be further improved to include all the syntactic variations. 相似文献
14.
Arun K. Bhattacharya John J. Petrovic 《Journal of the American Ceramic Society》1991,74(10):2700-2703
The indentation technique has been used to evaluate the hardness and fracture toughness of SiC-reinforced MoSi2 composites made by hot-pressing. It is seen that the toughness increases with increasing indentation crack length (under increasing load) and a probable mechanism responsible for this behavior is described. It is also observed that there is an optimum volume fraction of SiC particles for which the maximum fracture toughness of the composite can be achieved. 相似文献
15.
The effect of quaternary additions of 0.5% Y and 0.5 and 1.0% Th to a base alloy of Ni-10Cr-5Al on the oxidation behavior and mechanism was studied during oxidation in air over the range of 1000–1200°C. The presence of yttrium decreased the oxidation kinetics slightly, whereas the addition of thorium caused a slight increase. Oxide scale adherence was markedly improved by the addition of the quaternary elements. Although a number of oxides formed on yttrium-containing alloys, quantitative x-ray diffraction clearly showed that the rate-controlling step was the diffusion of oxygen through short-circuit paths in a thin layer of alumina that formed parabolically with time. Mixed oxides containing both aluminum and yttrium formed by the reaction of Y2O3 to form YAlOP3 initially, and Y3Al5O12 (YAG) after longer times. Although the scale adherence of the yttrium-containing alloy was considerably better than the base alloys, spalling did occur that was attributed to the formation of the voluminous YAG particles that grew in a mushroom-like manner, lifting the protective scale off the substrate locally. The YAG particles formed primarily at grain boundaries in the substrate in which the yttrium originally existed as YNi9. This intermetallic compound reacted to form Y2O3, liberating metallic nickel that subsequently reacted to form NiO or NiAl2O4 spinel or both. The Y2O3 reacted with aluminum to ultimately form the YAG mushrooms. Thorium did not form any mixed oxides; the only oxide involving thorium was ThO2, which existed as small particles at the oxide-metal interface. A highly beneficial effect of the thoria particles in reducing film spalling was observed. Scale spalling in the base alloy was attributed to void formation at the oxide-metal interface, the voids forming by condensation of excess vacancies from the Kirkendall effect associated with fast back-diffusion, of nickel into the substrate as aluminum was preferentially oxidized and diffused slowly outward. The mechanism of improved scale adherence in the quaternary alloys was the elimination of voids by annihilation of the Kirkendall vacancies at vacancy sinks introduced by the noncoherent interfaces between yttrium and thorium-containing intermetallics or oxides or both.This work is based on a portion of the dissertation of Arun Kumar in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering, University of California, Los Angeles.Supported by NASA-Ames under grant No. NGR 05-007-352. 相似文献
16.
Arun Lakhotia Andrew Walenstein Craig Miles Anshuman Singh 《Journal in Computer Virology》2013,9(3):109-123
VILO is a lazy learner system designed for malware classification and triage. It implements a nearest neighbor (NN) algorithm with similarities computed over Term Frequency $\times $ Inverse Document Frequency (TFIDF) weighted opcode mnemonic permutation features (N-perms). Being an NN-classifier, VILO makes minimal structural assumptions about class boundaries, and thus is well suited for the constantly changing malware population. This paper presents an extensive study of application of VILO in malware analysis. Our experiments demonstrate that (a) VILO is a rapid learner of malware families, i.e., VILO’s learning curve stabilizes at high accuracies quickly (training on less than 20 variants per family is sufficient); (b) similarity scores derived from TDIDF weighted features should primarily be treated as ordinal measurements; and (c) VILO with N-perm feature vectors outperforms traditional N-gram feature vectors when used to classify real-world malware into their respective families. 相似文献
17.
B. Bharathi C. Arun Kumar T. Nagarajan 《International Journal of Speech Technology》2013,16(1):115-124
In classification tasks, the error rate is proportional to the commonality among classes. In conventional GMM-based modeling technique, since the model parameters of a class are estimated without considering other classes in the system, features that are common across various classes may also be captured, along with unique features. This paper proposes to use unique characteristics of a class at the feature-level and at the phoneme-level, separately, to improve the classification accuracy. At the feature-level, the performance of a classifier has been analyzed by capturing the unique features while modeling, and removing common feature vectors during classification. Experiments were conducted on speaker identification task, using speech data of 40 female speakers from NTIMIT corpus, and on a language identification task, using speech data of two languages (English and French) from OGI_MLTS corpus. At the phoneme-level, performance of a classifier has been analyzed by identifying a subset of phonemes, which are unique to a speaker with respect to his/her closely resembling speaker, in the acoustic sense, on a speaker identification task. In both the cases (feature-level and phoneme-level) considerable improvement in classification accuracy is observed over conventional GMM-based classifiers in the above mentioned tasks. Among the three experimental setup, speaker identification task using unique phonemes shows as high as 9.56 % performance improvement over conventional GMM-based classifier. 相似文献
18.
Insider threats have gained prominence and pose the most challenging threats to a database system. In this paper, we have proposed a new approach for detecting intrusive attacks in databases by fusion of information sources and use of belief update. In database intrusion detection, only intra-transactional features are not sufficient for detecting attackers within the organization as they are potentially familiar with the day-to-day work. Thus, the proposed system uses inter-transactional as well as intra-transactional features for intrusion detection. Moreover, we have also considered three different sensitivity levels of table attributes for keeping track of the malicious modification of the highly sensitive attributes more carefully. We have analyzed the performance of the proposed database intrusion detection system using stochastic models. Our system performs significantly better compared to two intrusion detection systems recently proposed in the literature. 相似文献
19.
20.
Kundu Amlan Panigrahi Suvasini Sural Shamik Majumdar Arun K. 《Dependable and Secure Computing, IEEE Transactions on》2009,6(4):309-315
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA. 相似文献