全文获取类型
收费全文 | 2114篇 |
免费 | 111篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 32篇 |
综合类 | 5篇 |
化学工业 | 493篇 |
金属工艺 | 46篇 |
机械仪表 | 43篇 |
建筑科学 | 48篇 |
矿业工程 | 4篇 |
能源动力 | 104篇 |
轻工业 | 168篇 |
水利工程 | 12篇 |
石油天然气 | 21篇 |
无线电 | 249篇 |
一般工业技术 | 476篇 |
冶金工业 | 128篇 |
原子能技术 | 5篇 |
自动化技术 | 409篇 |
出版年
2024年 | 8篇 |
2023年 | 33篇 |
2022年 | 93篇 |
2021年 | 101篇 |
2020年 | 94篇 |
2019年 | 97篇 |
2018年 | 132篇 |
2017年 | 112篇 |
2016年 | 117篇 |
2015年 | 73篇 |
2014年 | 88篇 |
2013年 | 167篇 |
2012年 | 135篇 |
2011年 | 146篇 |
2010年 | 110篇 |
2009年 | 96篇 |
2008年 | 106篇 |
2007年 | 79篇 |
2006年 | 64篇 |
2005年 | 51篇 |
2004年 | 35篇 |
2003年 | 30篇 |
2002年 | 27篇 |
2001年 | 26篇 |
2000年 | 16篇 |
1999年 | 11篇 |
1998年 | 20篇 |
1997年 | 21篇 |
1996年 | 17篇 |
1995年 | 16篇 |
1994年 | 11篇 |
1993年 | 15篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 7篇 |
1989年 | 3篇 |
1988年 | 7篇 |
1987年 | 5篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 4篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1977年 | 4篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1974年 | 7篇 |
1973年 | 5篇 |
排序方式: 共有2243条查询结果,搜索用时 15 毫秒
31.
Amit GaurAuthor Vitae Abhinav PrakashAuthor VitaeSaugat JoshiAuthor Vitae Dharma P. Agrawal 《Journal of Parallel and Distributed Computing》2010
The varying degree of mobility of Mesh Clients has provided much more flexibility in Wireless Mesh Networks, and establishing an Authentic Association among entities is a non-trivial problem. In this paper, we introduce a Polynomial Based scheme which provides pair-wise connectivity, low communication, marginal storage overhead and high scalability while making on the fly Authentic Association feasible. The proposed scheme is also observed to be resilient against both traffic analysis and node capture attacks. 相似文献
32.
Santosh Biswas Dipankar Sarkar Siddhartha Mukhopadhyay Amit Patra 《Discrete Event Dynamic Systems》2010,20(3):349-376
Failure diagnosability has been widely studied for discrete event system (DES) models because of modeling simplicity and computational
efficiency due to abstraction. In the literature it is often held that for diagnosability, such models can be used not only
for systems that fall naturally in the class of DES but also for the ones traditionally treated as continuous variable dynamic
systems. A class of algorithms for failure diagnosability of DES models has been successfully developed for systems where
fairness is not a part of the model. These algorithms are based on detecting cycles in the normal and the failure model that
look identical. However, there exist systems with all transitions fair where the diagnosability condition that hinges upon
this feature renders many failures non-diagnosable although they may actually be diagnosable by transitions out of a cycle.
Hence, the diagnosability conditions based on cycle detection need to be modified to hold for many real-world systems where
all transitions are fair. In this work, however, it is shown by means of an example that a system may have some transitions
fair and some unfair. A new failure diagnosability mechanism is proposed for DES models with both fair and unfair transitions.
Time complexity for deciding diagnosability of DES models with fair and unfair transitions is analyzed and compared with the
time complexities of other DES diagnosability analysis methods reported in the literature. 相似文献
33.
In this paper, we consider the fundamental problem of frequency estimation of multiple sinusoidal signals with stationary errors. We propose genetic algorithm and outlier-insensitive criterion function based technique for the frequency estimation problem. In the simulation studies and real life data analysis, it is observed that the proposed genetic algorithm based robust frequency estimators are able to resolve frequencies of the sinusoidal model with high degree of accuracy. Among the proposed methods, the genetic algorithm based least squares estimator, in the no-outlier scenario, provides efficient estimates, in the sense that their mean square errors attain the corresponding Cramér-Rao lower bounds. In the presence of outliers, the proposed robust methods perform quite well and seem to have a fairly high breakdown point with respect to level of outlier contamination. The proposed methods significantly do not depend on the initial guess values required for other iterative frequency estimation methods. 相似文献
34.
Effect of geometry on droplet formation in the squeezing regime in a microfluidic T-junction 总被引:1,自引:0,他引:1
In the surface tension-dominated microchannel T-junction, droplets can be formed as a result of the mixing of two dissimilar,
immiscible fluids. This article presents results for very low Capillary numbers and different flow rates of the continuous
and dispersed phases. Through three-dimensional lattice Boltzmann-based simulations, the mechanism of the formation of “plugs”
in the squeezing regime has been examined and the size of the droplets quantified. Results for
Re\textc << 1 Re_{\text{c}} \ll 1 show the dependence of flow rates of the two fluids on the length of the droplets formed, which is compared with existing
experimental data. It is shown that the size of plugs formed decreases as the Capillary number increases in the squeezing
regime. This article clearly shows that the geometry effect, i.e., the widths of the two channels and the depth of the assembly,
plays an important role in the determination of the length of the plugs, a fact that was ignored in earlier experimental correlations. 相似文献
35.
A dynamic attribute-based data filtering and recovery scheme for web information processing 总被引:2,自引:2,他引:0
Web data being transmitted over a network channel on the Internet with excessive amount of data causes data processing problems,
which include selectively choosing useful information to be retained for various data applications. In this paper, we present
an approach for filtering less-informative attribute data from a source Website. A scheme for filtering attributes, instead
of tuples (records), from a Website becomes imperative, since filtering a complete tuple would lead to filtering some informative, as well as less-informative, attribute data in the tuple. Since filtered data at the source Website may be of interest to
the user at the destination Website, we design a data recovery approach that maintains the minimal amount of information for
data recovery purpose while imposing minimal overhead for data recovery at the source Website. Our data filtering and recovery
approach (1) handles a wide range of Web data in different application domains (such as weather, stock exchanges, Internet
traffic, etc.), (2) is dynamic in nature, since each filtering scheme adjusts the amount of data to be filtered as needed,
and (3) is adaptive, which is appealing in an ever-changing Internet environment. 相似文献
36.
Krishna Tushar Kumar Amit Peh Li-Shiuan Postman Jacob Chiang Patrick Erez Mattan 《Micro, IEEE》2009,29(4):48-61
Networks on chip must deliver high bandwidth at low latencies while keeping within a tight power envelope. Using express virtual channels for flow control improves energy-delay throughput by letting packets bypass intermediate routers, but EVCs have key limitations. Nochi (NoC with hybrid interconnect) overcomes these limitations by transporting data payloads and control information on separate planes, optimized for bandwidth and latency respectively. 相似文献
37.
Bhattacharya D Saha S Basu S Chakravarty S Chakravarty A Banerjee D Chakrabarti A 《Proteomics. Clinical applications》2010,4(5):480-488
Purpose: In (hemoglobin, Hb) HbEβ‐thalassemia, HbE (β‐26 Glu→Lys) interacts with β‐thalassemia to produce clinical manifestation of varying severity. This is the first proteomic effort to study changes in protein levels of erythrocytes isolated from HbEβ‐thalassemic patients compared to normal. Experimental design: We have used 2‐DE and MALDI‐MS/MS‐based techniques to investigate the differential proteome profiling of membrane and Hb‐depleted fraction of cytosolic proteins of erythrocytes isolated from the peripheral blood samples of HbEβ‐thalassemia patients and normal volunteers. Results: Our study showed that redox regulators such as peroxiredoxin 2, Cu‐Zn superoxide dismutase and thioredoxin and chaperones such as α‐hemoglobin stabilizing protein and HSP‐70 were upregulated in HbEβ‐thalassemia. We have also observed larger amounts of membrane associated globin chains and indications of disruption of spectrin‐based junctional complex in the membrane skeleton of HbEβ‐thalassemic erythrocytes upon detection of low molecular weight fragments of β‐spectrin and decrease in β‐actin and dematin content. Conclusion and clinical relevance: We have observed interesting changes in the proteomic levels of redox regulators and chaperons in the thalassemic hemolysates and have observed strong correlation or association of the extent of such proteomic changes with HbE levels. This could be important in understanding the role of HbE in disease progression and pathophysiology. 相似文献
38.
Perceptrons, proposed in the seminal paper McCulloch–Pitts of 1943, have remained of interest to neural network community because of their simplicity and usefulness in classifying linearly separable data and can be viewed as implementing iterative procedures for “solving” linear inequalities. Gradient descent and conjugate gradient methods, normally used for linear equalities, can be used to solve linear inequalities by simple modifications that have been proposed in the literature but not been analyzed completely. This paper applies a recently proposed control-inspired approach to the design of iterative steepest descent and conjugate gradient algorithms for perceptron training in batch mode, by regarding certain parameters of the training/algorithm as controls and then using a control Liapunov technique to choose appropriate values of these parameters. 相似文献
39.
The accurate and early detection of epileptic seizures in continuous electroencephalographic (EEG) data has a growing role in the management of patients with epilepsy. Early detection allows for therapy to be delivered at the start of seizures and for caregivers to be notified promptly about potentially debilitating events. The challenge to detecting epileptic seizures, however, is that seizure morphologies exhibit considerable inter-patient and intra-patient variability. While recent work has looked at addressing the issue of variations across different patients (inter-patient variability) and described patient-specific methodologies for seizure detection, there are no examples of systems that can simultaneously address the challenges of inter-patient and intra-patient variations in seizure morphology. In our study, we address this complete goal and describe a multi-task learning approach that trains a classifier to perform well across many kinds of seizures rather than potentially overfitting to the most common seizure types. Our approach increases the generalizability of seizure detection systems and improves the tradeoff between latency and sensitivity versus false positive rates. When compared against the standard approach on the CHB–MIT multi-channel scalp EEG data, our proposed method improved discrimination between seizure and non-seizure EEG for almost 83 % of the patients while reducing false positives on nearly 70 % of the patients studied. 相似文献
40.
Amit K. Awasthi Keerti Srivastava R.C. MittalAuthor vitae 《Computers & Electrical Engineering》2011,37(6):869-874
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme. 相似文献