全文获取类型
收费全文 | 1948篇 |
免费 | 112篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 18篇 |
化学工业 | 513篇 |
金属工艺 | 36篇 |
机械仪表 | 41篇 |
建筑科学 | 60篇 |
矿业工程 | 3篇 |
能源动力 | 70篇 |
轻工业 | 289篇 |
水利工程 | 17篇 |
石油天然气 | 10篇 |
无线电 | 129篇 |
一般工业技术 | 331篇 |
冶金工业 | 125篇 |
原子能技术 | 25篇 |
自动化技术 | 394篇 |
出版年
2024年 | 7篇 |
2023年 | 34篇 |
2022年 | 103篇 |
2021年 | 112篇 |
2020年 | 68篇 |
2019年 | 88篇 |
2018年 | 72篇 |
2017年 | 77篇 |
2016年 | 75篇 |
2015年 | 59篇 |
2014年 | 110篇 |
2013年 | 152篇 |
2012年 | 144篇 |
2011年 | 147篇 |
2010年 | 92篇 |
2009年 | 98篇 |
2008年 | 96篇 |
2007年 | 87篇 |
2006年 | 65篇 |
2005年 | 49篇 |
2004年 | 42篇 |
2003年 | 43篇 |
2002年 | 33篇 |
2001年 | 15篇 |
2000年 | 12篇 |
1999年 | 13篇 |
1998年 | 31篇 |
1997年 | 30篇 |
1996年 | 20篇 |
1995年 | 14篇 |
1994年 | 11篇 |
1993年 | 20篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 10篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1972年 | 1篇 |
1971年 | 2篇 |
排序方式: 共有2061条查询结果,搜索用时 15 毫秒
31.
Rafael Marín-LópezAuthor Vitae Fernando Pereñíguez Author VitaeGabriel López Author Vitae Alejandro Pérez-Méndez Author Vitae 《Computer Standards & Interfaces》2011,33(5):494-504
Kerberos is a well-known standard protocol which is becoming one of the most widely deployed for authentication and key distribution in application services. However, whereas service providers use the protocol to control their own subscribers, they do not widely deploy Kerberos infrastructures to handle subscribers coming from foreign domains, as happens in network federations. Instead, the deployment of Authentication, Authorization and Accounting (AAA) infrastructures has been preferred for that operation. Thus, the lack of a correct integration between these infrastructures and Kerberos limits the service access only to service provider's subscribers. To avoid this limitation, we design an architecture which integrates a Kerberos pre-authentication mechanism, based on the use of the Extensible Authentication Protocol (EAP), and advanced authorization, based on the standards SAML and XACML, to link the end user authentication and authorization performed through an AAA infrastructure with the delivery of Kerberos tickets in the service provider's domain. We detail the interfaces, protocols, operation and extensions required for our solution. Moreover, we discuss important aspects such as the implications on existing standards. 相似文献
32.
José Luis Crespo Marta Zorrilla Pilar Bernardos Eduardo Mora 《The Visual computer》2009,25(4):309-323
The objective of this paper is to present an overall approach to forecasting the future position of the moving objects of
an image sequence after processing the images previous to it. The proposed method makes use of classical techniques such as
optical flow to extract objects’ trajectories and velocities, and autoregressive algorithms to build the predictive model.
Our method can be used in a variety of applications, where videos with stationary cameras are used, moving objects are not
deformed and change their position with time. One of these applications is traffic control, which is used in this paper as
a case study with different meteorological conditions to compare with.
相似文献
Marta Zorrilla (Corresponding author)Email: |
33.
A technique that provides closed loop integral action depending on the passive outputs of port-controlled Hamiltonian systems is already available. This paper addresses a new method that allows us to add integral action also on system variables having relative degree higher than one, while still preserving the Hamiltonian form and, thus, closed loop stability. The new approach is applied to design speed regulation controllers for the permanent magnet synchronous motor. Closed loop stability and asymptotic rejection of unknown piecewise constant load torques are formally proved. This theoretically predicted control system performance is illustrated via simulation experiments, which also show that the properties hold under parameter uncertainties. This is in line with the usual practice of including integral action in a controller with the aim of improving its closed loop robustness. The fact that the method enhances the range of possible integral actions in the controller, enriched with this robustness property, allows us to assess it as a practically important complement to the well-known interconnection and damping assignment techniques developed in the framework of port-controlled Hamiltonian systems. 相似文献
34.
This paper presents a new approach to Particle Swarm Optimization, called Michigan Approach PSO (MPSO), and its application
to continuous classification problems as a Nearest Prototype (NP) classifier. In Nearest Prototype classifiers, a collection
of prototypes has to be found that accurately represents the input patterns. The classifier then assigns classes based on
the nearest prototype in this collection. The MPSO algorithm is used to process training data to find those prototypes. In
the MPSO algorithm each particle in a swarm represents a single prototype in the solution and it uses modified movement rules
with particle competition and cooperation that ensure particle diversity. The proposed method is tested both with artificial
problems and with real benchmark problems and compared with several algorithms of the same family. Results show that the particles
are able to recognize clusters, find decision boundaries and reach stable situations that also retain adaptation potential.
The MPSO algorithm is able to improve the accuracy of 1-NN classifiers, obtains results comparable to the best among other
classifiers, and improves the accuracy reported in literature for one of the problems.
相似文献
Pedro IsasiEmail: |
35.
In this paper, the performance and durability of hybrid PEM fuel cell vehicles are investigated. To that end, a hybrid predictive controller is proposed to improve battery performance and to avoid fuel cell and battery degradation. Such controller deals with this complex control problem by handling binary and continuous variables, piecewise affine models and constraints. Moreover, the control strategy is to track motor power demand and keep batteries close to a desired battery state of charge which is appropriately chosen to minimize hydrogen consumption. It is important to highlight the consideration of constraints which are directly related to the goals of this paper, such as minimum fuel cell power threshold and time limitation between fuel cell startups and shutdowns. Furthermore, different models have been elaborated and particularized for a vehicle prototype. These models include few innovations such as a reference governor which smooths fuel cell power demand during sharp power profiles, forcing batteries to supply such peaks and resulting a longer fuel cell lifetime. Battery thermal dynamics are also taken into account in these models in order to analyze the effect of battery temperature on its degradation. Finally, this paper studies the feasibility of the real implementation, presenting an explicit formulation as a solution to reduce execution time. This explicit controller exhibits the same performance as the hybrid predictive controller does with a reduced computational effort. All the results have been validated in several simulations. 相似文献
36.
Alejandro Rago Claudia Marcos J. Andres Diaz-Pace 《Automated Software Engineering》2016,23(2):219-252
Textual requirements are very common in software projects. However, this format of requirements often keeps relevant concerns (e.g., performance, synchronization, data access, etc.) from the analyst’s view because their semantics are implicit in the text. Thus, analysts must carefully review requirements documents in order to identify key concerns and their effects. Concern mining tools based on NLP techniques can help in this activity. Nonetheless, existing tools cannot always detect all the crosscutting effects of a given concern on different requirements sections, as this detection requires a semantic analysis of the text. In this work, we describe an automated tool called REAssistant that supports the extraction of semantic information from textual use cases in order to reveal latent crosscutting concerns. To enable the analysis of use cases, we apply a tandem of advanced NLP techniques (e.g, dependency parsing, semantic role labeling, and domain actions) built on the UIMA framework, which generates different annotations for the use cases. Then, REAssistant allows analysts to query these annotations via concern-specific rules in order to identify all the effects of a given concern. The REAssistant tool has been evaluated with several case-studies, showing good results when compared to a manual identification of concerns and a third-party tool. In particular, the tool achieved a remarkable recall regarding the detection of crosscutting concern effects. 相似文献
37.
38.
aITALC, a new tool for automating loop calculations in high energy physics, is described. The package creates Fortran code for two-fermion scattering processes automatically, starting from the generation and analysis of the Feynman graphs. We describe the modules of the tool, the intercommunication between them and illustrate its use with three examples.
Program summary
Title of the program:aITALC version 1.2.1 (9 August 2005)Catalogue identifier:ADWOProgram summary URL:http://cpc.cs.qub.ac.uk/summaries/ADWOProgram obtainable from:CPC Program Library, Queen's University of Belfast, N. IrelandComputer:PC i386Operating system:GNU/Linux, tested on different distributions SuSE 8.2 to 9.3, Red Hat 7.2, Debian 3.0, Ubuntu 5.04. Also on SolarisProgramming language used:GNU Make, Diana, Form, Fortran77Additional programs/libraries used:Diana 2.35 (Qgraf 2.0), Form 3.1, LoopTools 2.1 (FF)Memory required to execute with typical data:Up to about 10 MBNo. of processors used:1No. of lines in distributed program, including test data, etc.:40 926No. of bytes in distributed program, including test data, etc.:371 424Distribution format:tar gzip fileHigh-speed storage required:from 1.5 to 30 MB, depending on modules present and unfolding of examplesNature of the physical problem:Calculation of differential cross sections for e+e− annihilation in one-loop approximation.Method of solution:Generation and perturbative analysis of Feynman diagrams with later evaluation of matrix elements and form factors.Restriction of the complexity of the problem:The limit of application is, for the moment, the 2→2 particle reactions in the electro-weak standard model.Typical running time:Few minutes, being highly depending on the complexity of the process and the Fortran compiler. 相似文献39.
Butakoff C Frangi AF 《IEEE transactions on pattern analysis and machine intelligence》2006,28(11):1847-1857
This paper presents a framework for weighted fusion of several active shape and active appearance models. The approach is based on the eigenspace fusion method proposed by Hall et al., which has been extended to fuse more than two weighted eigenspaces using unbiased mean and covariance matrix estimates. To evaluate the performance of fusion, a comparative assessment on segmentation precision as well as facial verification tests are performed using the AR, EQUINOX, and XM2VTS databases. Based on the results, it is concluded that the fusion is useful when the model needs to be updated online or when the original observations are absent 相似文献
40.
Alejandro Echeverría Matías Améstica Francisca Gil Miguel Nussbaum Enrique Barrios Sandra Leclerc 《Computers in human behavior》2012
Computer Supported Collaborative Learning is a pedagogical approach that can be used for deploying educational games in the classroom. However, there is no clear understanding as to which technological platforms are better suited for deploying co-located collaborative games, nor the general affordances that are required. In this work we explore two different technological platforms for developing collaborative games in the classroom: one based on augmented reality technology and the other based on multiple-mice technology. In both cases, the same game was introduced to teach electrostatics and the results were compared experimentally using a real class. 相似文献