全文获取类型
收费全文 | 250篇 |
免费 | 8篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 2篇 |
综合类 | 1篇 |
化学工业 | 64篇 |
金属工艺 | 6篇 |
机械仪表 | 4篇 |
建筑科学 | 10篇 |
能源动力 | 11篇 |
轻工业 | 21篇 |
水利工程 | 1篇 |
无线电 | 61篇 |
一般工业技术 | 31篇 |
冶金工业 | 7篇 |
原子能技术 | 1篇 |
自动化技术 | 41篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 10篇 |
2020年 | 9篇 |
2019年 | 11篇 |
2018年 | 14篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 11篇 |
2014年 | 7篇 |
2013年 | 17篇 |
2012年 | 13篇 |
2011年 | 12篇 |
2010年 | 10篇 |
2009年 | 18篇 |
2008年 | 15篇 |
2007年 | 10篇 |
2006年 | 6篇 |
2005年 | 1篇 |
2004年 | 6篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 5篇 |
2000年 | 1篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有261条查询结果,搜索用时 15 毫秒
41.
Mounir Bousbia-Salah Maamar Bettayeb Allal Larbi 《Journal of Intelligent and Robotic Systems》2011,64(3-4):387-400
This paper presents a navigation aid for the blind based on a microcontroller with synthetic speech output. The system consists of two vibrators, two ultrasonic sensors mounted on the user??s shoulders and another one integrated into the cane. It is able to give information to the blind about urban walking routes and to provide real-time information on the distance of over-hanging obstacles within 6 m along the travel path ahead of the user. The suggested system can then sense the surrounding environment via sonar sensors and sending vibro-tactile feedback to the user of the position of the closest obstacles in range. For the ultrasonic cane, it is used to detect any obstacle on the ground. Experimental results show the effectiveness of the proposed system for blind navigation. 相似文献
42.
Hajer Thabet Mounir Ayadi Frédéric Rotella 《International Journal of Control, Automation and Systems》2016,14(6):1520-1527
This paper is devoted to an experimental comparison between two different methods of ultra-local model control. The concept of the first proposed technique is based on the linear system resolution technique to estimate the ultra-local model parameters. The second proposed method is based on the linear adaptive observer which allows the joint estimation of state and unknown system parameters. The closed-loop control is implemented via an adaptive PID controller. In order to show the efficiency of these two control strategies, experimental validations are carried out on a two-tank system. The experimental results show the effectiveness and robustness of the proposed controllers. 相似文献
43.
Anas El Husseini Abdallah M’Hamed Bachar El Hassan Mounir Mokhtari 《Personal and Ubiquitous Computing》2013,17(5):1013-1023
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people. 相似文献
44.
Ali Ouni Marouane Kessentini Houari Sahraoui Mounir Boukadoum 《Automated Software Engineering》2013,20(1):47-79
Software defects often lead to bugs, runtime errors and software maintenance difficulties. They should be systematically prevented, found, removed or fixed all along the software lifecycle. However, detecting and fixing these defects is still, to some extent, a difficult, time-consuming and manual process. In this paper, we propose a two-step automated approach to detect and then to correct various types of maintainability defects in source code. Using Genetic Programming, our approach allows automatic generation of rules to detect defects, thus relieving the designer from a fastidious manual rule definition task. Then, we correct the detected defects while minimizing the correction effort. A correction solution is defined as the combination of refactoring operations that should maximize as much as possible the number of corrected defects with minimal code modification effort. We use the Non-dominated Sorting Genetic Algorithm (NSGA-II) to find the best compromise. For six open source projects, we succeeded in detecting the majority of known defects, and the proposed corrections fixed most of them with minimal effort. 相似文献
45.
A new interconnection network is proposed for the construction of a massively parallel computer system. The systematic construction of this interconnection network, denoted RCC-FULL, is performed by methodically connecting together a number of basic atoms where a basic atom is a set of fully interconnected nodes. Key communication characteristics are derived and evaluated for RCC-FULL and efficient routing algorithms, which need only local information to route messages between any two nodes, are also derived. AnO(log (N)) sorting algorithm is shown for RCC-FULL and RCC-FULL is shown to emulate deterministically the CRCW PRAM model, with onlyO(log (N)) degradation in time performance. Finally, the hardware cost for the RCC-FULL is estimated as a function of its pin requirements and compared to that of the binary hypercube and most instances of RCC-FULL have substantially lower cost. Hence, RCC-FULL appears to be a particularly effective network for PRAM emulation, and might be considered as a universal network for future supercomputing systems. 相似文献
46.
Ramzi Guesmi Mohamed Amine Ben Farah Abdennaceur Kachouri Mounir Samet 《Multimedia Tools and Applications》2016,75(8):4753-4769
This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. 相似文献
47.
Lamia?Ben?HamoudaEmail author Mounir?Ayadi Nicolas?Langlois 《International Journal of Control, Automation and Systems》2016,14(2):443-451
This paper proposes a Fuzzy Fault Tolerant Predictive Control (FFTPC) with integral action method for a class of nonlinear systems. The Takagi-Sugeno (T-S) fuzzy approach is introduced as a modelling technique in order to consider the active control methods adapted to linear models. The proposed control strategy is based on a combination between Parallel Distributed Compensation (PDC) control law and Model Predictive Control (MPC) where the T-S fuzzy aspect uses the Unmeasurable Premise Variables (UPV). A T-S fuzzy observer provides an L2 norm estimation of system state vector and faults. The controller and observer gains are obtained by solving Linear Matrix Inequalities (LMIs) derived from the Lyapunov theory. The validity of the proposed Fault Tolerant Control (FTC) strategy is illustrated through an application to a Diesel Engine Air Path (DEAP) system. 相似文献
48.
Cindy K.Y. Ng Lawrence K.L. Pun Dixon M.C. Ip Mounir Hamdi Ishfaq Ahmad 《Journal of Parallel and Distributed Computing》1996,36(2):173
The pyramid architecture is a powerful topology in the area of computer vision. On the other hand, the 3D mesh architecture possesses rich topological features which make it suitable for building scalable parallel processor systems. The usefulness of these two architectures has led us to consider the problem of embedding pyramids into 3D meshes, for which we present two solutions. The first solution, termednatural embedding,maps a pyramid into a 3D mesh such that each level of the pyramid is mapped to a single level of the 3D mesh. The second solution, termedmultiple embedding,allows simultaneous embedding of multiple pyramids into a single 3D mesh. The quality of both solutions is evaluated using dilation and expansion measures. Using the multiple embedding, we are able to obtain an average dilation of 1.26 and a near-optimal expansion of 1.12. 相似文献
49.
Mounir Laroussi William T. Anderson 《Journal of Infrared, Millimeter and Terahertz Waves》1998,19(3):453-464
Plasma layers at atmospheric pressure, are good broad band absorbers of electromagnetic radiation. However, to get substantial attenuations, two parameters have to be optimized. These are the plasma number density, and the thickness of the plasma layer. It is found that in order to be an effective attenuator of microwave radiation, a plasma layer has to have a number density in the 1013 cm?3 range, and a thickness equal or larger than the wavelength of the incident wave. However, as the frequency increases, the amount of attenuation tends to reach a limiting value directly proportional to the number density. 相似文献
50.
Guillaume?GallieroEmail author Henri?Bataller Fabrizio?Croccolo Romain?Vermorel Pierre-Arnaud?Artola Bernard?Rousseau Velisa?Vesovic Mounir?Bou-Ali José?M.?Ortiz de Zárate Shenghua?Xu Ke?Zhang Fran?ois?Montel 《Microgravity science and technology》2016,28(2):79-86
In this work we propose a methodology, based on molecular dynamics simulations, to quantify the influence of segregation and thermodiffusion on the initial state distribution of the fluid species in hydrocarbon reservoirs. This convection-free approach has been applied to a synthetic oil composed of three normal alkanes and to a real acid gas. It has been found that the thermodiffusion effect induced by the geothermal gradient is similar (but opposite in sign) to that due to segregation for both mixtures. In addition, because of the combined effect of thermal expansion and thermodiffusion, it has been observed that the density gradient can be reversed, in the presence of a geothermal gradient. These numerical results emphasize the need of improving our quantification of thermodiffusion in multicomponent mixtures. The SCCO-SJ10 experiments will be a crucial step towards this goal. 相似文献