全文获取类型
收费全文 | 3383篇 |
免费 | 274篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 28篇 |
化学工业 | 944篇 |
金属工艺 | 55篇 |
机械仪表 | 107篇 |
建筑科学 | 125篇 |
矿业工程 | 15篇 |
能源动力 | 123篇 |
轻工业 | 588篇 |
水利工程 | 30篇 |
石油天然气 | 14篇 |
无线电 | 207篇 |
一般工业技术 | 504篇 |
冶金工业 | 157篇 |
原子能技术 | 33篇 |
自动化技术 | 733篇 |
出版年
2024年 | 11篇 |
2023年 | 53篇 |
2022年 | 147篇 |
2021年 | 201篇 |
2020年 | 116篇 |
2019年 | 131篇 |
2018年 | 147篇 |
2017年 | 154篇 |
2016年 | 166篇 |
2015年 | 120篇 |
2014年 | 188篇 |
2013年 | 304篇 |
2012年 | 257篇 |
2011年 | 253篇 |
2010年 | 194篇 |
2009年 | 168篇 |
2008年 | 159篇 |
2007年 | 141篇 |
2006年 | 91篇 |
2005年 | 79篇 |
2004年 | 87篇 |
2003年 | 57篇 |
2002年 | 71篇 |
2001年 | 43篇 |
2000年 | 30篇 |
1999年 | 31篇 |
1998年 | 36篇 |
1997年 | 39篇 |
1996年 | 18篇 |
1995年 | 26篇 |
1994年 | 21篇 |
1993年 | 14篇 |
1992年 | 9篇 |
1991年 | 10篇 |
1990年 | 12篇 |
1989年 | 12篇 |
1988年 | 10篇 |
1987年 | 8篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 6篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1969年 | 3篇 |
1956年 | 1篇 |
排序方式: 共有3663条查询结果,搜索用时 15 毫秒
81.
David Schleicher Luis M. Bergasa Manuel Ocaña Rafael Barea Elena López 《Robotics and Autonomous Systems》2010,58(8):991-1002
In this paper we present a new real-time hierarchical (topological/metric) Visual SLAM system focusing on the localization of a vehicle in large-scale outdoor urban environments. It is exclusively based on the visual information provided by a cheap wide-angle stereo camera. Our approach divides the whole map into local sub-maps identified by the so-called fingerprints (vehicle poses). At the sub-map level (low level SLAM), 3D sequential mapping of natural landmarks and the robot location/orientation are obtained using a top-down Bayesian method to model the dynamic behavior. A higher topological level (high level SLAM) based on fingerprints has been added to reduce the global accumulated drift, keeping real-time constraints. Using this hierarchical strategy, we keep the local consistency of the metric sub-maps, by mean of the EKF, and global consistency by using the topological map and the MultiLevel Relaxation (MLR) algorithm. Some experimental results for different large-scale outdoor environments are presented, showing an almost constant processing time. 相似文献
82.
Rafael Rieder Alberto Barbosa Raposo Márcio Sarroglia Pinho 《Journal of Visual Languages and Computing》2010,21(3):136-156
This work presents a methodology to formally model and to build three-dimensional interaction tasks in virtual environments using three different tools: Petri Nets, the Interaction Technique Decomposition taxonomy, and Object-Oriented techniques. User operations in the virtual environment are represented as Petri Net nodes; these nodes, when linked, represent the interaction process stages. In our methodology, places represent all the states an application can reach, transitions define the conditions to start an action, and tokens embody the data manipulated by the application. As a result of this modeling process we automatically generate the core of the application's source code. We also use a Petri Net execution library to run the application code. In order to facilitate the application modeling, we have adapted Dia, a well-known graphical diagram editor, to support Petri Nets creation and code generation. The integration of these approaches results in a modular application, based on Petri Nets formalism that allows for the specification of an interaction task and for the reuse of developed blocks in new virtual environment projects. 相似文献
83.
Rafael Bárcena Ainhoa Etxebarria 《International Journal of Control, Automation and Systems》2010,8(2):244-249
A study on the convenient tuning of fractional-order hold electronic devices for digital control systems is presented. When certain constraints are fulfilled, this study assures in advance the attainment of inverse stable discrete plants. The main result is based on classic numerical analysis techniques and is applicable when the process to be digitally controlled is described as a second order plant or as a first order plant with time delay. In such cases, by using a conveniently tuned fractional-order hold, the discretization nonminimum-phase zeros emerged when using a common zero-order hold are avoided. In this way, the performance of the digitally controlled system may be improved. 相似文献
84.
J. Rafael Sendra 《Journal of Symbolic Computation》2011,46(9):1030-1038
We present algorithms for parametrizing by radicals an irreducible curve, not necessarily plane, when the genus is less than or equal to 4 and the curve is defined over an algebraically closed field of characteristic zero. In addition, we also present an algorithm for parametrizing by radicals any irreducible plane curve of degree d having at least a point of multiplicity d−r, with 1≤r≤4 and, as a consequence, every irreducible plane curve of degree d≤5 and every irreducible singular plane curve of degree 6. 相似文献
85.
Rafael Marín-LópezAuthor Vitae Fernando Pereñíguez Author VitaeGabriel López Author Vitae Alejandro Pérez-Méndez Author Vitae 《Computer Standards & Interfaces》2011,33(5):494-504
Kerberos is a well-known standard protocol which is becoming one of the most widely deployed for authentication and key distribution in application services. However, whereas service providers use the protocol to control their own subscribers, they do not widely deploy Kerberos infrastructures to handle subscribers coming from foreign domains, as happens in network federations. Instead, the deployment of Authentication, Authorization and Accounting (AAA) infrastructures has been preferred for that operation. Thus, the lack of a correct integration between these infrastructures and Kerberos limits the service access only to service provider's subscribers. To avoid this limitation, we design an architecture which integrates a Kerberos pre-authentication mechanism, based on the use of the Extensible Authentication Protocol (EAP), and advanced authorization, based on the standards SAML and XACML, to link the end user authentication and authorization performed through an AAA infrastructure with the delivery of Kerberos tickets in the service provider's domain. We detail the interfaces, protocols, operation and extensions required for our solution. Moreover, we discuss important aspects such as the implications on existing standards. 相似文献
86.
Otávio Augusto Lazzarini Lemos Sushil Bajracharya Cristina Lopes 《Information and Software Technology》2011,53(4):294-306
Context
Software developers spend considerable effort implementing auxiliary functionality used by the main features of a system (e.g., compressing/decompressing files, encryption/decription of data, scaling/rotating images). With the increasing amount of open source code available on the Internet, time and effort can be saved by reusing these utilities through informal practices of code search and reuse. However, when this type of reuse is performed in an ad hoc manner, it can be tedious and error-prone: code results have to be manually inspected and integrated into the workspace.Objective
In this paper we introduce and evaluate the use of test cases as an interface for automating code search and reuse. We call our approach Test-Driven Code Search (TDCS). Test cases serve two purposes: (1) they define the behavior of the desired functionality to be searched; and (2) they test the matching results for suitability in the local context. We also describe CodeGenie, an Eclipse plugin we have developed that performs TDCS using a code search engine called Sourcerer.Method
Our evaluation consists of two studies: an applicability study with 34 different features that were searched using CodeGenie; and a performance study comparing CodeGenie, Google Code Search, and a manual approach.Results
Both studies present evidence of the applicability and good performance of TDCS in the reuse of auxiliary functionality.Conclusion
This paper presents an approach to source code search and its application to the reuse of auxiliary functionality. Our exploratory evaluation shows promising results, which motivates the use and further investigation of TDCS. 相似文献87.
88.
Cross-entropy has been recently proposed as a heuristic method for solving combinatorial optimization problems. We briefly review this methodology and then suggest a hybrid version with the goal of improving its performance. In the context of the well-known max-cut problem, we compare an implementation of the original cross-entropy method with our proposed version. The suggested changes are not particular to the max-cut problem and could be considered for future applications to other combinatorial optimization problems. 相似文献
89.
Particle swarm optimization (PSO) is an evolutionary metaheuristic inspired by the flocking behaviour of birds, which has successfully been used to solve several kinds of problems, although there are few studies aimed at solving discrete optimization problems. One disadvantage of PSO is the risk of a premature search convergence. To prevent this, we propose to introduce diversity into a discrete PSO by adding a random velocity. The degree of the introduced diversity is not static (i.e. preset before running PSO) but instead changes dynamically according to the heterogeneity of the population (i.e. if the search has converged or not). We solve the response time variability problem (RTVP) to test these two new ideas. The RTVP is an NP-hard combinatorial scheduling problem that has recently appeared in the literature. It occurs whenever products, clients or jobs need to be sequenced in such a way that the variability in the time between the instants at which they receive the necessary resources is minimized. The most efficient algorithm for solving non-small instances of the RTVP published to date is a classical PSO algorithm, referred to by the authors as PSO-M1F. In this paper, we propose 10 discrete PSO algorithms for solving the RTVP: one based on the ideas described above (PSO -c3dyn) and nine based on strategies proposed in the literature and adapted for solving a discrete optimization problem such as the RTVP. We compare all 11 PSO algorithms and the computational experiment shows that, on average, the best results obtained are due to our proposal of dynamic control mechanism for introducing diversity. 相似文献
90.
In this paper we explore the interest of computational intelligence tools in the management of heterogeneous communication networks, specifically to predict congestion, failures and other anomalies in the network that may eventually lead to degradation of the quality of offered services. We show two different applications based on neural and neuro-fuzzy systems for quality of service (QoS) management in next generation networks for voice and video service over heterogeneous Internet protocol (V2oIP) services. The two examples explained in this paper attempt to predict the communication network resources for new incoming calls, and visualizing the QoS of a communication network by means of self-organizing maps. 相似文献