全文获取类型
收费全文 | 2134篇 |
免费 | 123篇 |
专业分类
电工技术 | 31篇 |
化学工业 | 468篇 |
金属工艺 | 22篇 |
机械仪表 | 45篇 |
建筑科学 | 77篇 |
矿业工程 | 2篇 |
能源动力 | 49篇 |
轻工业 | 202篇 |
水利工程 | 9篇 |
石油天然气 | 5篇 |
武器工业 | 1篇 |
无线电 | 210篇 |
一般工业技术 | 434篇 |
冶金工业 | 267篇 |
原子能技术 | 12篇 |
自动化技术 | 423篇 |
出版年
2023年 | 12篇 |
2022年 | 70篇 |
2021年 | 79篇 |
2020年 | 47篇 |
2019年 | 49篇 |
2018年 | 51篇 |
2017年 | 35篇 |
2016年 | 67篇 |
2015年 | 54篇 |
2014年 | 71篇 |
2013年 | 123篇 |
2012年 | 98篇 |
2011年 | 161篇 |
2010年 | 106篇 |
2009年 | 92篇 |
2008年 | 110篇 |
2007年 | 101篇 |
2006年 | 87篇 |
2005年 | 83篇 |
2004年 | 66篇 |
2003年 | 60篇 |
2002年 | 47篇 |
2001年 | 43篇 |
2000年 | 34篇 |
1999年 | 35篇 |
1998年 | 99篇 |
1997年 | 66篇 |
1996年 | 48篇 |
1995年 | 34篇 |
1994年 | 36篇 |
1993年 | 20篇 |
1992年 | 8篇 |
1991年 | 9篇 |
1990年 | 13篇 |
1989年 | 10篇 |
1988年 | 7篇 |
1987年 | 6篇 |
1986年 | 9篇 |
1985年 | 10篇 |
1984年 | 12篇 |
1983年 | 10篇 |
1982年 | 8篇 |
1981年 | 10篇 |
1980年 | 11篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 6篇 |
1976年 | 17篇 |
1975年 | 4篇 |
1968年 | 2篇 |
排序方式: 共有2257条查询结果,搜索用时 15 毫秒
991.
Davide Alberto Albertini Barbara Carminati Elena Ferrari 《International Journal of Information Security》2017,16(1):75-89
In general, access control mechanisms in DBMSs ensure that users access only those portions of data for which they have authorizations, according to a predefined set of access control policies. However, it has been shown that access control mechanisms might be not enough. A clear example is the inference problem due to functional dependencies, which might allow a user to discover unauthorized data by exploiting authorized data. In this paper, we wish to investigate data dependencies (e.g., functional dependencies, foreign key constraints, and knowledge-based implications) from a different perspective. In particular, the aim was to investigate data dependencies as a mean for increasing the DBMS utility, that is, the number of queries that can be safely answered, rather than as channels for releasing sensitive data. We believe that, under given circumstances, this unauthorized release may give more benefits than issues. As such, we present a query rewriting technique capable of extending defined access control policies by exploiting data dependencies, in order to authorize unauthorized but inferable data. 相似文献
992.
Interviews are the most common and effective means to perform requirements elicitation and support knowledge transfer between a customer and a requirements analyst. Ambiguity in communication is often perceived as a major obstacle for knowledge transfer, which could lead to unclear and incomplete requirements documents. In this paper, we analyze the role of ambiguity in requirements elicitation interviews, when requirements are still tacit ideas to be surfaced. To study the phenomenon, we performed a set of 34 customer–analyst interviews. This experience was used as a baseline to define a framework to categorize ambiguity. The framework presents the notion of ambiguity as a class of four main sub-phenomena, namely unclarity, multiple understanding, incorrect disambiguation and correct disambiguation. We present examples of ambiguities from our interviews to illustrate the different categories, and we highlight the pragmatic components that determine the occurrence of ambiguity. Along the study, we discovered a peculiar relation between ambiguity and tacit knowledge in interviews. Tacit knowledge is the knowledge that a customer has but does not pass to the analyst for any reason. From our experience, we have discovered that, rather than an obstacle, the occurrence of an ambiguity is often a resource for discovering tacit knowledge. Again, examples are presented from our interviews to support this vision. 相似文献
993.
Lília de S Silva Adriana C. Ferrari dos Santos Thiago Dias Mancilha Jos Demísio Simes da Silva Antonio Montes 《Expert systems with applications》2008,34(4):2326-2333
In this paper, an improved version of ANNIDA for detecting attack signatures in the payload of network packets is presented. The Hamming Net artificial neural network methodology was used with good results. A review of the application’s development is followed by a summary of the modifications made in the application in order to classify real data. Application improvements are reported, solving the problems of time delays in writing/reading data in the files and data collision effects when generating numeric keys used to model data for the neural network. Test results highlight the increased accuracy and efficiency of the new application when submitted to real data from HTTP network traffic containing actual traces of attacks and legitimate data. Finally, an evaluation of the application to detect signatures in real network traffic data is presented. 相似文献
994.
A new 3D parallel SPH scheme for free surface flows 总被引:3,自引:0,他引:3
We propose a new robust and accurate SPH scheme, able to track correctly complex three-dimensional non-hydrostatic free surface flows and, even more important, also able to compute an accurate and little oscillatory pressure field. It uses the explicit third order TVD Runge-Kutta scheme in time, following Shu and Osher [Shu C-W, Osher S. Efficient implementation of essentially non-oscillatory shock-capturing schemes. J Comput Phys 1988;89:439-71], together with the new key idea of introducing a monotone upwind flux for the density equation, thus removing any artificial viscosity term. For the discretization of the velocity equation, the non-diffusive central flux has been used. A new flexible approach to impose the boundary conditions at solid walls is also proposed. It can handle any moving rigid body with arbitrarily irregular geometry. It does neither produce oscillations in the fluid pressure in proximity of the interfaces, nor does it have a restrictive impact on the stability condition of the explicit time stepping method, unlike the repellent boundary forces of Monaghan [Monaghan JJ. Simulating free surface flows with SPH. J Comput Phys 1994;110:399-406]. To asses the accuracy of the new SPH scheme, a 3D mesh-convergence study is performed for the strongly deforming free surface in a 3D dam-break and impact-wave test problem providing very good results.Moreover, the parallelization of the new 3D SPH scheme has been carried out using the message passing interface (MPI) standard, together with a dynamic load balancing strategy to improve the computational efficiency of the scheme. Thus, simulations involving millions of particles can be run on modern massively parallel supercomputers, obtaining a very good performance, as confirmed by a speed-up analysis. The 3D applications consist of environmental flow problems, such as dam-break flows and impact flows against a wall. The numerical solutions obtained with our new 3D SPH code have been compared with either experimental results or with other numerical reference solutions, obtaining in all cases a very satisfactory agreement. 相似文献
995.
A new probabilistic roadmap method is presented for planning the path of a robotic sensor deployed in order to classify multiple fixed targets located in an obstacle-populated workspace. Existing roadmap methods have been successful at planning a robot path for the purpose of moving from an initial to a final configuration in a workspace by a minimum distance. But they are not directly applicable to robots whose primary objective is to gather target information with an on-board sensor. In this paper, a novel information roadmap method is developed in which obstacles, targets, sensor’s platform and field-of-view are represented as closed and bounded subsets of an Euclidean workspace. The information roadmap is sampled from a normalized information theoretic function that favors samples with a high expected value of information in configuration space. The method is applied to a landmine classification problem to plan the path of a robotic ground-penetrating radar, based on prior remote measurements and other geospatial data. Experiments show that paths obtained from the information roadmap exhibit a classification efficiency several times higher than that of existing search strategies. Also, the information roadmap can be used to deploy non-overpass capable robots that must avoid targets as well as obstacles. 相似文献
996.
Anatoly A. Gitelson Giorgio Dall'Olmo Wesley Moses Donald C. Rundquist Tadd Barrow Thomas R. Fisher Daniela Gurlin John Holz 《Remote sensing of environment》2008,112(9):3582-3593
Accurate assessment of phytoplankton chlorophyll-a (chla) concentrations in turbid waters by means of remote sensing is challenging due to the optical complexity of case 2 waters. We have applied a recently developed model of the form [Rrs? 1(λ1) ? Rrs? 1(λ2)] × Rrs(λ3) where Rrs(λi) is the remote-sensing reflectance at the wavelength λi, for the estimation of chla concentrations in turbid waters. The objectives of this paper are (a) to validate the three-band model as well as its special case, the two-band model Rrs? 1(λ1) × Rrs(λ3), using datasets collected over a considerable range of optical properties, trophic status, and geographical locations in turbid lakes, reservoirs, estuaries, and coastal waters, and (b) to evaluate the extent to which the three-band model could be applied to the Medium Resolution Imaging Spectrometer (MERIS) and two-band model could be applied to the Moderate Resolution Imaging Spectroradiometer (MODIS) to estimate chla in turbid waters.The three-band model was calibrated and validated using three MERIS spectral bands (660–670 nm, 703.75–713.75 nm, and 750?757.5 nm), and the 2-band model was tested using two MODIS spectral bands (λ1 = 662–672, λ3 = 743–753 nm). We assessed the accuracy of chla prediction in four independent datasets without re-parameterization (adjustment of the coefficients) after initial calibration elsewhere. Although the validation data set contained widely variable chla (1.2 to 236 mg m? 3), Secchi disk depth (0.18 to 4.1 m), and turbidity (1.3 to 78 NTU), chla predicted by the three-band algorithm was strongly correlated with observed chla (r2 > 0.96), with a precision of 32% and average bias across data sets of ? 4.9% to 11%. Chla predicted by the two-band algorithm was also closely correlated with observed chla (r2 > 0.92); however, the precision declined to 57%, and average bias across the data sets was 18% to 50.3%. These findings imply that, provided that an atmospheric correction scheme for the red and NIR bands is available, the extensive database of MERIS and MODIS imagery could be used for quantitative monitoring of chla in turbid waters. 相似文献
997.
Fumera G Fabio R Alessandra S 《IEEE transactions on pattern analysis and machine intelligence》2008,30(7):1293-1299
We apply an analytical framework for the analysis of linearly combined classifiers to ensembles generated by bagging. This provides an analytical model of bagging misclassification probability as a function of the ensemble size, which is a novel result in the literature. Experimental results on real data sets confirm the theoretical predictions. This allows us to derive a novel and theoretically grounded guideline for choosing bagging ensemble size. Furthermore, our results are consistent with explanations of bagging in terms of classifier instability and variance reduction, support the optimality of the simple average over the weighted average combining rule for ensembles generated by bagging, and apply to other randomization-based methods for constructing classifier ensembles. Although our results do not allow to compare bagging misclassification probability with the one of an individual classifier trained on the original training set, we discuss how the considered theoretical framework could be exploited to this aim. 相似文献
998.
Giorgio Zoppellaro Aristides Bakandritsos Jií Tu
ek Piotr Boski Toma Susi Petr Lazar Zdenk Bad'ura Tom Steklý Ariana Opletalov Michal Otyepka Radek Zboil 《Advanced materials (Deerfield Beach, Fla.)》2019,31(37)
The established application of graphene in organic/inorganic spin‐valve spintronic assemblies is as a spin‐transport channel for spin‐polarized electrons injected from ferromagnetic substrates. To generate and control spin injection without such substrates, the graphene backbone must be imprinted with spin‐polarized states and itinerant‐like spins. Computations suggest that such states should emerge in graphene derivatives incorporating pyridinic nitrogen. The synthesis and electronic properties of nitrogen‐doped graphene (N content: 9.8%), featuring both localized spin centers and spin‐containing sites with itinerant electron properties, are reported. This material exhibits spin‐switch behavior (on–off–on) controlled by microwave irradiation at X‐band frequency. This phenomenon may enable the creation of novel types of switches, filters, and spintronic devices using sp2‐only 2D systems. 相似文献
999.
Ling Ding Zhenbin Lyu Beatrice Louis Aura Tintaru Erik Laurini Domenico Marson Mengjie Zhang Wanxuan Shao Yifan Jiang Ahlem Bouhlel Laure Balasse Philippe Garrigue Eric Mas Suzanne Giorgio Juan Iovanna Yuanyu Huang Sabrina Pricl Benjamin Guillet Ling Peng 《Small (Weinheim an der Bergstrasse, Germany)》2020,16(37)