全文获取类型
收费全文 | 159篇 |
免费 | 8篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 22篇 |
金属工艺 | 3篇 |
建筑科学 | 2篇 |
能源动力 | 5篇 |
轻工业 | 7篇 |
水利工程 | 7篇 |
无线电 | 33篇 |
一般工业技术 | 16篇 |
冶金工业 | 1篇 |
自动化技术 | 69篇 |
出版年
2023年 | 5篇 |
2022年 | 10篇 |
2021年 | 11篇 |
2020年 | 9篇 |
2019年 | 6篇 |
2018年 | 7篇 |
2017年 | 9篇 |
2016年 | 9篇 |
2015年 | 9篇 |
2014年 | 13篇 |
2013年 | 11篇 |
2012年 | 14篇 |
2011年 | 11篇 |
2010年 | 12篇 |
2009年 | 11篇 |
2008年 | 7篇 |
2007年 | 4篇 |
2006年 | 4篇 |
2005年 | 1篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
排序方式: 共有167条查询结果,搜索用时 15 毫秒
91.
The acceptance and use of computer based assessment 总被引:1,自引:0,他引:1
The effective development of a computer based assessment (CBA) depends on students’ acceptance. The purpose of this study is to build a model that demonstrates the constructs that affect students’ behavioral intention to use a CBA. The proposed model, Computer Based Assessment Acceptance Model (CBAAM) is based on previous models of technology acceptance such as Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), and the Unified Theory of Acceptance and Usage of Technology (UTAUT). Constructs from previous models were used such as Perceived Usefulness, Perceived Ease of Use, Computer Self Efficacy, Social Influence, Facilitating Conditions and Perceived Playfulness. Additionally, two new variables, Content and Goal Expectancy, were added to the proposed research model. Data were collected from 173 participants in an introductory informatics course using a survey questionnaire. Partial Least Squares (PLS) was used to test the measurement and the structural model. Results indicate that Perceived Ease of Use and Perceived Playfulness have a direct effect on CBA use. Perceived Usefulness, Computer Self Efficacy, Social Influence, Facilitating Conditions, Content and Goal Expectancy have only indirect effects. These eight variables explain approximately 50% of the variance of Behavioural Intention. 相似文献
92.
Ntovros Vasileios 《Nexus Network Journal》2009,11(3):471-488
This paper proposes a “reading” of the church of San Lorenzo in Turin, designed by Guarino Guarini, through the philosophical
notion of “fold” introduced by Gilles Deleuze. The paper consists of two parts. The first part contains an exploration of
the notion of “fold” in architecture and in philosophy and examines the use of the fold in the theory of Baroque architecture
as well as the range of this new tool in architectural practise in contemporary architecture and in philosophy and examines
the use of the fold as fundamental condition for understanding Baroque era. The second part contains the application of the
notion of fold as a philosophical and conceptual framework for the “reading” of the chapel. 相似文献
93.
Longin Jan Latecki Author Vitae Vasileios Megalooikonomou Author VitaeAuthor Vitae Deguang Yu Author Vitae 《Pattern recognition》2007,40(11):3069-3080
We consider the problem of partial shape matching. We propose to transform shapes into sequences and utilize an algorithm that determines a subsequence of a target sequence that best matches a query. In the proposed algorithm we map the problem of the best matching subsequence to the problem of a cheapest path in a directed acyclic graph (DAG). The approach allows us to compute the optimal scale and translation of sequence values, which is a nontrivial problem in the case of subsequence matching. Our experimental results demonstrate that the proposed algorithm outperforms the commonly used techniques in retrieval accuracy. 相似文献
94.
Jeff Offutt Vasileios Papadimitriou Upsorn Praphamontripong 《Empirical Software Engineering》2014,19(1):69-104
Society’s increasing reliance on services provided by web applications places a high demand on their reliability. The flow of control through web applications heavily depends on user inputs and interactions, so user inputs should be thoroughly validated before being passed to the back-end software. Although several techniques are used to validate inputs on the client, users can easily bypass this validation and submit arbitrary data to the server. This can cause unexpected behavior, and even allow unauthorized access. A test technique called bypass testing intentionally sends invalid data to the server by bypassing client-side validation. This paper reports results from a comprehensive case study on 16 deployed, widely used, commercial web applications. As part of this project, the theory behind bypass testing was extended and an automated tool, AutoBypass, was built. The case study found failures in 14 of the 16 web applications tested, some significant. This study gives evidence that bypass testing is effective, has positive return on investment, and scales to real applications. 相似文献
95.
Nicolaos Alachiotis Vasileios I. Kelefouras George S. Athanasiou Harris E. Michail Angeliki S. Kritikakou Costas E. Goutis 《The Journal of supercomputing》2012,59(2):830-851
Matrix-Matrix Multiplication (MMM) is a highly important kernel in linear algebra algorithms and the performance of its implementations
depends on the memory utilization and data locality. There are MMM algorithms, such as standard, Strassen–Winograd variant,
and many recursive array layouts, such as Z-Morton or U-Morton. However, their data locality is lower than that of the proposed
methodology. Moreover, several SOA (state of the art) self-tuning libraries exist, such as ATLAS for MMM algorithm, which
tests many MMM implementations. During the installation of ATLAS, on the one hand an extremely complex empirical tuning step
is required, and on the other hand a large number of compiler options are used, both of which are not included in the scope
of this paper. In this paper, a new methodology using the standard MMM algorithm is presented, achieving improved performance
by focusing on data locality (both temporal and spatial). This methodology finds the scheduling which conforms with the optimum
memory management. Compared with (Chatterjee et al. in IEEE Trans. Parallel Distrib. Syst. 13:1105, 2002; Li and Garzaran in Proc. of Lang. Compil. Parallel Comput., 2005; Bilmes et al. in Proc. of the 11th ACM Int. Conf. Super-comput., 1997; Aberdeen and Baxter in Concurr. Comput. Pract. Exp. 13:103, 2001), the proposed methodology has two major advantages. Firstly, the scheduling used for the tile level is different from the
element level’s one, having better data locality, suited to the sizes of memory hierarchy. Secondly, its exploration time
is short, because it searches only for the number of the level of tiling used, and between (1, 2) (Sect. 4) for finding the
best tile size for each cache level. A software tool (C-code) implementing the above methodology was developed, having the
hardware model and the matrix sizes as input. This methodology has better performance against others at a wide range of architectures.
Compared with the best existing related work, which we implemented, better performance up to 55% than the Standard MMM algorithm
and up to 35% than Strassen’s is observed, both under recursive data array layouts. 相似文献
96.
Ioannis Kanaris Vasileios Mylonakis Aristotelis Chatziioannou Ilias Maglogiannis John Soldatos 《Journal of Grid Computing》2009,7(3):395-416
Biologists, medical experts, biochemical engineers and researchers working on DNA microarray experiments are increasingly turning on Grid computing with the scope of leveraging the Grid’s computing power, immense storage resources, and quality of service to the expedient processing of a wide range of datasets. In this paper we present a combined experience of grid application experts and bioinformatics scientists in deploying a pilot service enabling computationally efficient processing and analysis of data stemming from microarray experiments. This pilot service is accessible over the Hellenic portion of the EGEE grid and has been demonstrated in the scope of several public events. We highlight the process of grid application enablement, grid deployment challenges, as well as lessons learnt from a bi-annual effort to port and deploy a MATLAB DNA microarray application on a production grid. In addition to describing the parallelization of the application, we also emphasize on the development of a distributed federated database for storing and post-processing the results of the microarray experiments. Overall we believe that our experience could be proven valuable not only to microarray data scientists but also to other Grid users that intend to Grid-enable and deploy their applications. 相似文献
97.
Moseke C Saratsis V Gbureck U 《Journal of materials science. Materials in medicine》2011,22(12):2591-2598
Up to now magnesium phosphate cements are mainly being utilized in wastewater treatment due to their adsorptive properties.
Recently they also have been shown to have a high potential as degradable biocements for application as replacement materials
for bone defects. In comparison to degradable calcium phosphate cements they have the advantage of setting at neutral pH,
which is favorable in biological environment. In this study two parameters of the cement composition, namely powder-to-liquid
ratio (PLR) and citrate content, were varied in order to optimize the injectability properties of the cement paste and the
mechanical properties of the reaction product. These properties were determined by means of testing setting time and temperature,
paste viscosity, and injectability as well as phase composition and compressive strength of the set cements. Best results
were obtained, when the cements were prepared with a PLR of 2.5 and a binder liquid consisting of an aqueous solution of 3 mol/l
diammonium hydrogen phosphate and 0.5 mol/l diammonium citrate. 相似文献
98.
Stamatios Arkoulis Evangelos Anifantis Vasileios Karyotis Symeon Papavassiliou Nikolaos Mitrou 《Computer Networks》2013,57(8):1739-1757
In this work, we focus on the Joint Channel Assignment and Routing (JCAR) problem in Cognitive Radio Networks (CRNs) and especially on the optimal reconfiguration of secondary networks under the presence of primary users. Secondary CRN users need to adapt their transmission channels promptly, while effectively limit additional or escalating system modifications triggered by the intertweaved primary user activity. Our approach takes into consideration the underlying spectrum switching dynamics and concurrently aims at a fair resource allocation among the active network flows. We take an optimization perspective and formulate the JCAR and network reconfiguration problems as mixed integer linear programs, addressing fairness concerns as well. We propose a heuristic approach which is based on a sequential reduced search space methodology, in order to obtain efficiently solutions of otherwise tough and demanding reconfiguration problems. The operation, effectiveness and performance of the proposed mechanisms are evaluated through analysis and simulations under various working conditions. The obtained numerical results indicate the benefits of the proposed schemes in terms of overhead performance and their scaling properties with respect to more realistic and thus demanding topologies. 相似文献
99.
Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD 总被引:1,自引:0,他引:1
Dimitrios?Simitopoulos Nikolaos?Zissis Panagiotis?Georgiadis Vasileios?Emmanouilidis Michael?G.?StrintzisEmail author 《Multimedia Systems》2003,9(3):217-227
This paper presents a complete system for the secure distribution of a copyrighted MPEG-1/2 video stored on a DVD-ROM disc. A combined selective watermarking and encryption method that operates in the compressed MPEG domain is introduced. Watermarking resistant to a number of attacks is used for copyright protection. The video quality deteriorates significantly due to encryption, thus restraining unauthorized viewers from viewing it. The video can only be viewed using the developed Secure MPEG Player, which performs real-time decryption of the encrypted video. The decryption requires a secret key that is extracted from the DVD-ROM disc in a cryptographically secure manner.This work was supported by the EU IST Project "ASPIS" 相似文献
100.
Vasileios Ziogas Georgia Tanou Athanassios Molassiotis Grigorios Diamantidis Miltiadis Vasilakakis 《Food chemistry》2010
The antioxidant ability of phenolic extracts of olive fruits during maturity in Chondrolia and Amfissis cultivars grown at 10 m and 300 m altitude showed that altitude affected phenol content, antioxidant and Fe2+/Fe3+ reduction/binding ability. The hydroxyl radical, peroxyl radical and peroxynitrite-induced DNA nicking assays have been used to evaluate the anti-radical activity of the extracts. Results showed that the ability of olive extracts to prevent radical-mediated DNA damage arises from the triple synergistic action of the genotype, the altitude and the maturation stage. 相似文献