全文获取类型
收费全文 | 373篇 |
免费 | 23篇 |
专业分类
电工技术 | 7篇 |
化学工业 | 68篇 |
金属工艺 | 8篇 |
机械仪表 | 8篇 |
建筑科学 | 13篇 |
能源动力 | 13篇 |
轻工业 | 50篇 |
水利工程 | 3篇 |
石油天然气 | 1篇 |
无线电 | 51篇 |
一般工业技术 | 41篇 |
冶金工业 | 21篇 |
原子能技术 | 4篇 |
自动化技术 | 108篇 |
出版年
2023年 | 2篇 |
2022年 | 7篇 |
2021年 | 7篇 |
2020年 | 11篇 |
2019年 | 5篇 |
2018年 | 12篇 |
2017年 | 19篇 |
2016年 | 14篇 |
2015年 | 11篇 |
2014年 | 15篇 |
2013年 | 38篇 |
2012年 | 18篇 |
2011年 | 18篇 |
2010年 | 17篇 |
2009年 | 20篇 |
2008年 | 23篇 |
2007年 | 25篇 |
2006年 | 20篇 |
2005年 | 17篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 13篇 |
2001年 | 12篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有396条查询结果,搜索用时 468 毫秒
51.
Panagiotis G. Sismanis Stavros A. Argyropoulos 《Metallurgical and Materials Transactions B》1988,19(6):859-870
In this study an experimental method to measure convective heat transfer characteristics in liquid metals is presented. This
method involves the immersion into a metal bath of a solid specimen whose melting point is equal to or lower than that of
the metal or alloy in the metal bath, and which will not react chemically with the liquid metal or alloys used. The specimen
should have a hollow bore whose opening is held above the surface of the liquid metal; immersion continues until such a time
as the liquid metal penetrates the hollow bore. The apparent weight of the specimen is monitored to determine the rate at
which the net downward force changes. Experimental results are reported for liquid aluminum, liquid copper, and liquid steel.
Those experimental results were conducted under different fluid flow conditions. The applicability of this method to liquid
slags is also discussed.
Formerly Postdoctoral Research Fellow with the Department of Metallurgy and Materials Science, University of Toronto 相似文献
52.
Stavros?TripakisEmail author Sergio?Yovine Ahmed?Bouajjani 《Formal Methods in System Design》2005,26(3):267-292
This paper presents an on-the-fly and symbolic technique for efficiently checking timed automata emptiness. It is symbolic because it uses the simulation graph (instead of the region graph). It is on-the-fly because the simulation graph is generated during the test for emptiness. We have implemented a verification tool called Profounder based on this technique. To our knowledge, Profounder is the only available tool for checking emptiness of timed Büchi automata. To illustrate the practical interest of our approach, we show the performances of the tool on a non-trivial case study. 相似文献
53.
54.
55.
Ilias Politis Michail Tsagkaropoulos Tasos Dagiuklas Stavros Kotsopoulos 《Mobile Networks and Applications》2008,13(3-4):274-284
This paper proposes a power efficient multipath video packet scheduling scheme for minimum video distortion transmission (optimised Video QoS) over wireless multimedia sensor networks. The transmission of video packets over multiple paths in a wireless sensor network improves the aggregate data rate of the network and minimizes the traffic load handled by each node. However, due to the lossy behavior of the wireless channel the aggregate transmission rate cannot always support the requested video source data rate. In such cases a packet scheduling algorithm is applied that can selectively drop combinations of video packets prior to transmission to adapt the source requirements to the channel capacity. The scheduling algorithm selects the less important video packets to drop using a recursive distortion prediction model. This model predicts accurately the resulting video distortion in case of isolated errors, burst of errors and errors separated by a lag. Two scheduling algorithms are proposed in this paper. The Baseline scheme is a simplified scheduler that can only decide upon which packet can be dropped prior to transmission based on the packet’s impact on the video distortion. This algorithm is compared against the Power aware packet scheduling that is an extension of the Baseline capable of estimating the power that will be consumed by each node in every available path depending on its traffic load, during the transmission. The proposed Power aware packet scheduling is able to identify the available paths connecting the video source to the receiver and schedule the packet transmission among the selected paths according to the perceived video QoS (Peak Signal to Noise Ratio—PSNR) and the energy efficiency of the participating wireless video sensor nodes, by dropping packets if necessary based on the distortion prediction model. The simulation results indicate that the proposed Power aware video packet scheduling can achieve energy efficiency in the wireless multimedia sensor network by minimizing the power dissipation across all nodes, while the perceived video quality is kept to very high levels even at extreme network conditions (many sensor nodes dropped due to power consumption and high background noise in the channel). 相似文献
56.
Stavros Plessas Ann Fisher Katerina Koureta Costas Psarianos Poonam Nigam Athanasios A. Koutinas 《Food chemistry》2008
The application of Kluyveromyces marxianus (IFO 288), Lactobacillus delbrueckii ssp. bulgaricus (ATCC 11842) and Lactobacillus helveticus (ATCC 15009) as starter cultures for sourdough bread making was examined. Production of lactic and acetic acids, bread rising, volatile composition, shelf-life and organoleptic quality of the sourdough breads were evaluated. The amount of starter culture added to the flour, the dough fermentation temperature and the amount of sourdough used were examined in order to optimise the bread making process. The use of mixed cultures led to higher total titratable acidities and lactic acid concentrations compared to traditionally made breads. Highest acidity (3.41 g lactic acid/kg of bread) and highest resistance to mould spoilage were observed when bread was made using 50% sourdough containing 1% K. marxianus and 4% L. delbrueckii ssp. bulgaricus. The use of these cultures also improved the aroma of sourdough breads, as shown by sensory evaluations and as revealed by GC–MS analysis. 相似文献
57.
Journal of Computer Virology and Hacking Techniques - In this work we present a graph-based approach for behavior-based malware detection and classification utilizing the Group Relation Graphs... 相似文献
58.
59.
Simou Stavros Kalloniatis Christos Gritzalis Stefanos Katos Vasilios 《Requirements Engineering》2019,24(3):403-430
Requirements Engineering - Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two... 相似文献