全文获取类型
收费全文 | 1024篇 |
免费 | 56篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 8篇 |
化学工业 | 312篇 |
金属工艺 | 5篇 |
机械仪表 | 19篇 |
建筑科学 | 36篇 |
矿业工程 | 7篇 |
能源动力 | 43篇 |
轻工业 | 149篇 |
水利工程 | 12篇 |
石油天然气 | 4篇 |
无线电 | 50篇 |
一般工业技术 | 172篇 |
冶金工业 | 45篇 |
原子能技术 | 5篇 |
自动化技术 | 214篇 |
出版年
2023年 | 9篇 |
2022年 | 28篇 |
2021年 | 53篇 |
2020年 | 27篇 |
2019年 | 46篇 |
2018年 | 33篇 |
2017年 | 41篇 |
2016年 | 44篇 |
2015年 | 36篇 |
2014年 | 38篇 |
2013年 | 78篇 |
2012年 | 51篇 |
2011年 | 72篇 |
2010年 | 65篇 |
2009年 | 63篇 |
2008年 | 46篇 |
2007年 | 54篇 |
2006年 | 32篇 |
2005年 | 37篇 |
2004年 | 32篇 |
2003年 | 20篇 |
2002年 | 24篇 |
2001年 | 13篇 |
2000年 | 12篇 |
1999年 | 13篇 |
1998年 | 14篇 |
1997年 | 16篇 |
1996年 | 7篇 |
1995年 | 10篇 |
1994年 | 8篇 |
1993年 | 9篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1973年 | 2篇 |
排序方式: 共有1081条查询结果,搜索用时 15 毫秒
51.
The availability of multicore processors and programmable NICs, such as TOEs (TCP/IP Offloading Engines), provides new opportunities for designing efficient network interfaces to cope with the gap between the improvement rates of link bandwidths and microprocessor performance. This gap poses important challenges related with the high computational requirements associated to the traffic volumes and wider functionality that the network interface has to support. This way, taking into account the rate of link bandwidth improvement and the ever changing and increasing application demands, efficient network interface architectures require scalability and flexibility. An opportunity to reach these goals comes from the exploitation of the parallelism in the communication path by distributing the protocol processing work across processors which are available in the computer, i.e. multicore microprocessors and programmable NICs.Thus, after a brief review of the different solutions that have been previously proposed for speeding up network interfaces, this paper analyzes the onloading and offloading alternatives. Both strategies try to release host CPU cycles by taking advantage of the communication workload execution in other processors present in the node. Nevertheless, whereas onloading uses another general-purpose processor, either included in a chip multiprocessor (CMP) or in a symmetric multiprocessor (SMP), offloading takes advantage of processors in programmable network interface cards (NICs). From our experiments, implemented by using a full-system simulator, we provide a fair and more complete comparison between onloading and offloading. Thus, it is shown that the relative improvement on peak throughput offered by offloading and onloading depends on the rate of application workload to communication overhead, the message sizes, and on the characteristics of the system architecture, more specifically the bandwidth of the buses and the way the NIC is connected to the system processor and memory. In our implementations, offloading provides lower latencies than onloading, although the CPU utilization and interrupts are lower for onloading. Taking into account the conclusions of our experimental results, we propose a hybrid network interface that can take advantage of both, programmable NICs and multicore processors. 相似文献
52.
53.
Standard process monitoring and traceability programming in collaborative CAD/CAM/CNC manufacturing scenarios 总被引:1,自引:0,他引:1
Julio Garrido CamposAuthor Vitae Luis Rodriguez MiguezAuthor Vitae 《Computers in Industry》2011,62(3):311-322
The paper focuses on collaborative STEP-based CAD/CAM/CNC supply chains to program and automate machining process data monitoring and traceability activities. A traceability interface (traceability nc_functions) is defined for the new CNC programming standard ISO STEP-NC. CAM systems will be able to program monitoring and data access activities by inserting traceability nc_function calls in CNC programs. On the shop floor, controllers will automatically interpret these nc_functions to access process data while machining and will relate data records with the corresponding machining operations in a STEP-NC part program. With both types of information—process data and standard machining program (STEP-NC part program)—spread and technologically heterogeneous engineering systems will have full knowledge about what has happened in production. Traceability data access automation will assure data reliability. The paper describes a traceability scenario where standards such as MTConnect and ISA-95 support, rather than interfere with, the STEP-NC traceability proposal. 相似文献
54.
Jorge Blasco Julio Cesar Hernandez-Castro 《Journal of Network and Computer Applications》2012,35(1):491-501
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process. 相似文献
55.
56.
Ernesto A. Heredia Zavoni Juan J. Bariola Bernales Julio Vargas Neumann Povindar K. Mehta 《Materials and Structures》1988,21(3):213-221
Mud plasters or soil stuccos are commonly used to protect adobe walls from water erosion. Due to drying shrinkage cracks and
high permeability, the commonly used soil stuccos are not durable. Stucco stabilizers such as Portland cement, lime and asphalt
are expensive. An experimental study undertaken to evaluate some of the locally available, inexpensive, stucco stabilizers
is reported here. Crack-resistant stucco compositions made with a cactus solution are described and techniques to make the
stucco surface impervious to water are discussed. The results of durability tests involving simulated rainfall on stucco panels,
and stucco applied to adobe walls, are presented. Recommendations for field practice are also given. 相似文献
57.
Raúl Baños Julio Ortega Consolación Gil Antonio L. Márquez Francisco de Toro 《Computers & Industrial Engineering》2013
The Capacitated Vehicle Routing Problem with Time Windows is an important combinatorial optimization problem consisting in the determination of the set of routes of minimum distance to deliver goods, using a fleet of identical vehicles with restricted capacity, so that vehicles must visit customers within a time frame. A large number of algorithms have been proposed to solve single-objective formulations of this problem, including meta-heuristic approaches, which provide high quality solutions in reasonable runtimes. Nevertheless, in recent years some authors have analyzed multi-objective variants that consider additional objectives to the distance travelled. This paper considers not only the minimum distance required to deliver goods, but also the workload imbalance in terms of the distances travelled by the used vehicles and their loads. Thus, MMOEASA, a Pareto-based hybrid algorithm that combines evolutionary computation and simulated annealing, is here proposed and analyzed for solving these multi-objective formulations of the VRPTW. The results obtained when solving a subset of Solomon’s benchmark problems show the good performance of this hybrid approach. 相似文献
58.
Roberto Sanchis Julio A. Romero Pedro Balaguer 《International journal of control》2013,86(9):1785-1798
A simple method to design PID controllers in the frequency domain based on a simplified constrained optimisation is proposed. The method is based on the use of a single tuning parameter, defined as the quotient between the final crossover frequency and the zero of the controller. The tuning procedure is based on the maximisation of the controller gain subject to an equality constraint in the phase margin and an inequality constraint in the gain margin. The main advantage of the proposed method is that, even though the maximisation of the controller gain is straightforward, since there is only one parameter to be tuned, the solution is close to the optimal tuning obtained with direct numerical optimisation methods. Moreover the method is applicable to any linear model structure, including dead time and non-minimum phase systems. 相似文献
59.
David F. Barrero Julio César Hernández‐Castro Pedro Peris‐Lopez David Camacho María D. R‐Moreno 《Expert Systems》2014,31(1):9-19
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack. 相似文献
60.
Julio Cesar dos Reis Rodrigo Bonacin M. Cecília C. Baranauskas 《Universal Access in the Information Society》2014,13(2):125-145
Social network services (SNSs) have brought new possibilities and challenges to the design of software environments that respect people’s cultural differences. These systems may represent an opportunity for social and digital inclusion. However, search mechanisms in these systems impose serious barriers for people in the process of acquiring digital literacy. One of the barriers is the difficulty of using the adequate terms/keywords to perform content searches. This paper presents an approach to allow ordinary, non-technology proficient people to access the content of a network through the use of search parameters that make sense to them. The proposal is grounded on Semantic Web technologies (Web ontology) combined with Organizational Semiotics concepts and methods to identify the users’ profile and language. A case study was conducted with the search mechanism integrated into a SNS, and a preliminary evaluation reveals the advantages and drawbacks of the approach. 相似文献