全文获取类型
收费全文 | 961篇 |
免费 | 60篇 |
专业分类
电工技术 | 13篇 |
综合类 | 2篇 |
化学工业 | 244篇 |
金属工艺 | 5篇 |
机械仪表 | 12篇 |
建筑科学 | 34篇 |
矿业工程 | 1篇 |
能源动力 | 48篇 |
轻工业 | 103篇 |
水利工程 | 9篇 |
石油天然气 | 1篇 |
无线电 | 131篇 |
一般工业技术 | 141篇 |
冶金工业 | 23篇 |
原子能技术 | 1篇 |
自动化技术 | 253篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 45篇 |
2021年 | 45篇 |
2020年 | 31篇 |
2019年 | 19篇 |
2018年 | 36篇 |
2017年 | 43篇 |
2016年 | 46篇 |
2015年 | 33篇 |
2014年 | 39篇 |
2013年 | 63篇 |
2012年 | 65篇 |
2011年 | 81篇 |
2010年 | 50篇 |
2009年 | 63篇 |
2008年 | 61篇 |
2007年 | 47篇 |
2006年 | 40篇 |
2005年 | 34篇 |
2004年 | 20篇 |
2003年 | 14篇 |
2002年 | 16篇 |
2001年 | 9篇 |
2000年 | 7篇 |
1999年 | 8篇 |
1998年 | 6篇 |
1997年 | 15篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有1021条查询结果,搜索用时 46 毫秒
51.
Gengler RY Toma LM Pardo E Lloret F Ke X Van Tendeloo G Gournis D Rudolf P 《Small (Weinheim an der Bergstrasse, Germany)》2012,8(16):2532-2540
Mixed-valence polycyanides (Prussian Blue analogues) possess a rich palette of properties spanning from room-temperature ferromagnetism to zero thermal expansion, which can be tuned by chemical modifications or the application of external stimuli (temperature, pressure, light irradiation). While molecule-based materials can combine physical and chemical properties associated with molecular-scale building blocks, their successful integration into real devices depends primarily on higher-order properties such as crystal size, shape, morphology, and organization. Herein a study of a new reduced-dimensionality system based on Prussian Blue analogues (PBAs) is presented. The system is built up by means of a modified Langmuir-Blodgett technique, where the PBA is synthesized from precursors in a self-limited reaction on a clay mineral surface. The focus of this work is understanding the magnetic properties of the PBAs in different periodic, low-dimensional arrangements, and the influence of the "on surface" synthesis on the final properties and dimensionality of the system. 相似文献
52.
Vervelidou F Chrissoulidis D 《Journal of the Optical Society of America. A, Optics, image science, and vision》2012,29(4):605-616
A dielectric sphere with an eccentric spherical dielectric inclusion and an incident amplitude-modulated plane electromagnetic wave constitute an exterior radiation problem, which is solved in this paper. A solution is obtained by combined use of the Fourier transform and the indirect-mode-matching method. The analysis yields a set of linear equations for the wave amplitudes of the frequency-domain expansion of the electric-field intensity within and outside the externally spherical inhomogeneous body; that set is solved by truncation and matrix inversion. The shape of the backscattered pulse in the time domain is determined by application of the inverse fast Fourier transform. Numerical results are shown for a pulse backscattered by an acrylic sphere that contains an eccentric spherical cavity. The effects of cavity position and size on pulse spreading and delay are discussed. 相似文献
53.
Nikos Komninos Dimitrios D. Vergados Christos Douligeris 《International Journal of Communication Systems》2007,20(12):1391-1406
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
54.
Dimitrios J. Vergados Dimitrios D. Vergados Maria Koutsogiannaki 《Wireless Personal Communications》2012,62(3):687-713
Many scheduling techniques have been developed to solve the problem of sharing the common channel to multiple stations. TDMA
has been increasingly used as a scheduling technique in ad-hoc networks. The current trend for QoS capable applications led
to the deployment of numerous routing schemes that use TDMA. These schemes try to solve the problem of distributing the available
slots among the wireless nodes and at the same time, to find paths within the network that fulfill some QoS related limitations,
such as end-to-end delay. The exact way the slots are distributed among the transmitting nodes has an impact on the end-to-end
delay and other performance parameters of the network, such as capacity. Therefore, the efficiency of the scheduling algorithms
is closely related to the network topologies. In this paper, we propose two new end-to-end TDMA scheduling algorithms that
try to enhance the network capacity by increasing the number of concurrent connections established in the network, without
causing additional end-to-end delay. We study the efficiency of the proposed algorithms, when applied on various random topologies,
and compare them in terms of end-to-end delay and network capacity. 相似文献
55.
Cooperative Caching in Wireless Multimedia Sensor Networks 总被引:1,自引:0,他引:1
Nikos Dimokas Dimitrios Katsaros Yannis Manolopoulos 《Mobile Networks and Applications》2008,13(3-4):337-356
The recent advances in miniaturization and the creation of low-power circuits, combined with small-sized batteries have made the development of wireless sensor networks a working reality. Lately, the production of cheap complementary metal-oxide semiconductor cameras and microphones, which are able to capture rich multimedia content, gave birth to what is called Wireless Multimedia Sensor Networks (WMSNs). WMSNs will boost the capabilities of current wireless sensor networks, and will fuel several novel applications, like multimedia surveillance sensor networks. WMSNs introduce several new research challenges, mainly related to mechanisms to deliver application-level Quality-of-Service (e.g., latency minimization). To address this goal in an environment with extreme resource constraints, with variable channel capacity and with requirements for multimedia in-network processing, the caching of multimedia data, exploiting the cooperation among sensor nodes is vital. This article presents a cooperative caching solution particularly suitable for WMSNs. The proposed caching solution exploits sensor nodes which reside in “positions” of the network that allow them to forward packets or communicate decisions within short latency. These so-called “mediator” nodes are selected dynamically, so as to avoid the creation of hot-spots in the communication and the depletion of their energy. The mediators are not more powerful than the rest of the nodes, but they have some special role in implementing the cooperation among the sensors. The proposed cooperative caching protocol includes components for locating cached data as well as for implementing data purging out of the sensor caches. The proposed solution is evaluated extensively in an advanced simulation environment, and it is compared to the state-of-the-art cooperative caching algorithm for mobile ad hoc networks. The results confirm that the proposed caching mechanism prevails over its competitor. 相似文献
56.
Claudia Loitsch Gerhard Weber Nikolaos Kaklanis Konstantinos Votis Dimitrios Tzovaras 《User Modeling and User-Adapted Interaction》2017,27(3-5):445-491
Moving between devices is omnipresent, but not for people with disabilities or those who require specific accessibility options. Setting up assistive technologies or finding settings to overcome a certain barrier can be a demanding task for people without technical skills. Context-sensitive adaptive user interfaces are advancing, although migrating access features from one device to another is very rarely addressed. In this paper, we describe the knowledge-based component of the Global Public Inclusive Infrastructure that infers how a device shall be best configured at the operating system layer, the application layer and the web layer to meet the requirements of a user including possible special needs or disabilities. In this regard, a mechanism to detect and resolve conflicting accessibility policies as well as recommending preference substitutes is a main requirement, as elaborated in this paper. As the proposed system emulates decision-making of accessibility experts, we validated the automatic deduced configurations against manual configurations of ten accessibility experts. The assessment result shows that the average matching score of the developed system is high. Thus, the proposed system can be considered capable of making precise decisions towards personalizing user interfaces based on user needs and preferences. 相似文献
57.
This paper deals with the synthesis of geopolymers utilizing ferronickel slag as raw material. The utilized slag is produced in the Greek plant LARCO during the pyrometallurgical treatment of laterites for the production of ferronickel, specifically at the step of the reductive smelting in electric arc furnaces. The performed work includes the optimization of the slag-based geopolymeric system through the study of the effect of the synthesis parameters on the mechanical properties of the produced materials. The structure of geopolymers was determined with X-ray diffractometry (XRD), Fourier-transform infrared (FTIR) spectroscopy and scanning electron microscopy (SEM). The obtained results showed that the ferronickel slag is an excellent raw material for the production of inorganic polymers using the geopolymerization technology. The materials produced under the optimum synthesis conditions were compact and rigid and presented high compressive strength (118 MPa), as well as extremely low water absorption (0.7–0.8%). 相似文献
58.
Hans L. Bodlaender Michael R. Fellows Dimitrios M. Thilikos 《Journal of Computer and System Sciences》2009,75(4):231-244
In this paper, we investigate algorithms for some related graph parameters. Each of these asks for a linear ordering of the vertices of the graph (or can be formulated as such), and constructive linear time algorithms for the fixed parameter versions of the problems have been published for several of these. Examples are cutwidth, pathwidth, and directed or weighted variants of these. However, these algorithms have complicated technical details. This paper attempts to present ideas in these algorithms in a different more easily accessible manner, by showing that the algorithms can be obtained by a stepwise modification of a trivial hypothetical non-deterministic algorithm. The methodology is applied to rederive known results for the cutwidth and the pathwidth problem, and obtain new results for several variants of these problems, like directed and weighted variants of cutwidth and modified cutwidth. 相似文献
59.
Dimitrios Dechouniotis Nikolaos Leontiou Xenofontas Dimitropoulos Andreas Kind Spyros Denazis 《International Journal of Network Management》2009,19(6):513-526
Nowadays traffic monitoring and analysis tools provide poor information about traffic volume without giving any clear view of what the hidden rules and relationships that govern these flows are. Since the majority of flows is generated by services (web browsing, email, p2p) and most of these applications are dependent on many network assets (servers and databases) we should discover the underlying relationships of every application. We present a technique that discovers the hidden relationships among components of a network that consist of parts of specific applications. From time information and flow attributes, such as IP addresses and service ports, our method using a novel hybrid genetic algorithm produces a small set of fuzzy rules that can reveal the underlying relationships over a network without any guidance. These dependencies build a service graph which can become a useful tool for fault localization, monitoring service performance, designing changes and anomaly detection. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
60.
Ivo Herle Vladislava Herbstová Michael Kupka Dimitrios Kolymbas 《Canadian Metallurgical Quarterly》2010,24(5):446-451
Flood events demonstrate devastating effects not only on materials and structures in contact with flowing surface water. Equally important is the behavior of foundations in interaction with subsoil. This contribution gives an overview of different phenomena which arise in subsoil and at the foundation level during the groundwater rise accompanied by several case histories related to cultural heritage. Possible geotechnical measures are discussed as well. 相似文献