全文获取类型
收费全文 | 690篇 |
免费 | 41篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 14篇 |
综合类 | 1篇 |
化学工业 | 123篇 |
金属工艺 | 8篇 |
机械仪表 | 21篇 |
建筑科学 | 7篇 |
能源动力 | 34篇 |
轻工业 | 73篇 |
水利工程 | 7篇 |
石油天然气 | 1篇 |
无线电 | 102篇 |
一般工业技术 | 128篇 |
冶金工业 | 78篇 |
原子能技术 | 6篇 |
自动化技术 | 132篇 |
出版年
2024年 | 4篇 |
2023年 | 8篇 |
2022年 | 20篇 |
2021年 | 36篇 |
2020年 | 25篇 |
2019年 | 28篇 |
2018年 | 33篇 |
2017年 | 31篇 |
2016年 | 37篇 |
2015年 | 24篇 |
2014年 | 23篇 |
2013年 | 46篇 |
2012年 | 30篇 |
2011年 | 26篇 |
2010年 | 21篇 |
2009年 | 26篇 |
2008年 | 36篇 |
2007年 | 30篇 |
2006年 | 21篇 |
2005年 | 11篇 |
2004年 | 4篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 5篇 |
2000年 | 14篇 |
1999年 | 7篇 |
1998年 | 14篇 |
1997年 | 19篇 |
1996年 | 17篇 |
1995年 | 7篇 |
1994年 | 7篇 |
1993年 | 13篇 |
1992年 | 4篇 |
1991年 | 10篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 7篇 |
1985年 | 8篇 |
1984年 | 8篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 6篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 11篇 |
1974年 | 2篇 |
1972年 | 3篇 |
排序方式: 共有735条查询结果,搜索用时 15 毫秒
21.
Mona Gupta Happy Mittal Parag Singla Amitabha Bagchi 《Electronic Commerce Research》2017,17(3):521-551
In this work we characterize the session-level behavior of users on an Indian mobile phone comparison shopping website. We also correlate the popularity of handset on various news sources to its popularity on the shopping website. There are three aspects to our study: data analysis, correlation between news sources of product information and popularity of a handset, and behavior prediction. We have used KL divergence to show that a time-homogeneous Markov chain is observed when the number of clicks varies from 5 to 30. Our results depict that Markov chain model does not hold in entirety for comparison shopping setting but tells us how far the Markov chain model holds for this setting. Our analysis corroborates intuition that increasing price leads to decrease in popularity. After the strong correlation between various variables and user behavior was found, we predict the users macro (the overall sales of handset) and micro behavior (whether a user will convert or exit the site) using Markov logic networks. Our predictive model validates the intuition that past browsing behavior is an important predictor for future behavior. Methodology of combining data analysis with machine learning is, in our opinion, a new approach to the empirical study of such data sets. 相似文献
22.
Amit K. Awasthi Keerti Srivastava R.C. MittalAuthor vitae 《Computers & Electrical Engineering》2011,37(6):869-874
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme. 相似文献
23.
Fructose-2,6-bisphosphatase (FBPase-2) is a switch between gluconeogenesis and glycolysis in the hepatic cells. The structural features required for inhibitory activity of FBPase-2 were unidentified; no leads are available for inhibiting this important enzyme. In this paper pharmacophore mapping, molecular docking methods were employed in a virtual screening strategy to identify leads for FBPase-2. A receptor based pharmacophore map was modeled which comprised of important interactions as observed in co-crystal of rat liver isozyme with the product inhibitor fructose-6-phosphate. The pharmacophore model was validated against two databases of best docked structural analogues of fructose-2,6-bisphosphate and fructose-6-phosphate. The query generated was submitted for flexible search of ligands in chemical databases, namely LeadQuest, Maybridge and NCI. The hits obtained were further screened by molecular docking using FlexX. 相似文献
24.
Determining order relationship between events of a distributed computation is a fundamental problem in distributed systems
which has applications in many areas including debugging, visualization, checkpointing and recovery. Fidge/Mattern’s vector-clock
mechanism captures the order relationship using a vector of size N in a system consisting of N processes. As a result, it incurs message and space overhead of N integers. Many distributed applications use synchronous messages for communication. It is therefore natural to ask whether it is possible to reduce the timestamping overhead for such applications.
In this paper, we present a new approach for timestamping messages and events of a synchronously ordered computation, that is, when processes communicate using synchronous messages. Our approach depends on decomposing edges in the communication
topology into mutually disjoint edge groups such that each edge group either forms a star or a triangle. We show that, to accurately capture the order relationship between
synchronous messages, it is sufficient to use one component per edge group in the vector instead of one component per process.
Timestamps for events are only slightly bigger than timestamps for messages. Many common communication topologies such as
ring, grid and hypercube can be decomposed into edge groups, resulting in almost 50% improvement in both space and communication overheads. We prove that the problem of
computing an optimal edge decomposition of a communication topology is NP-complete in general. We also present a heuristic
algorithm for computing an edge decomposition whose size is within a factor of two of the optimal. We prove that, in the worst
case, it is not possible to timestamp messages of a synchronously ordered computation using a vector containing fewer than
components when N ≥ 2. Finally, we show that messages in a synchronously ordered computation can always be timestamped in an offline manner
using a vector of size at most .
An earlier version of this paper appeared in 2002 Proceedings of the IEEE International Conference on Distributed Computing
Systems (ICDCS).
The author V. K. Garg was supported in part by the NSF Grants ECS-9907213, CCR-9988225, an Engineering Foundation Fellowship.
This work was done while the author C. Skawratananond was a Ph.D. student at the University of Texas at Austin. 相似文献
25.
A study was made of thermoplastically extruded products prepared from soy grits incorporating varying percentages of offal. Beyond 35% incorporation no satisfactory extrudate could be prepared. A comparison was therefore made of the expansion ratio, density and hydratability of extrudates prepared from mixes containing 20% and 35% of bovine or porcine offal with those containing soy grit alone. The offal sources consisted of untreated or alkali-extracted bovine and porcine lung and bovine tripe (rumen and reticulum) and bovine tripe extracted by sodium dodecyl sulphate (SDS). Under the determined optimum operating conditions, extrudates from all offal/soy mixtures had lower expansion ratios and rehydratability than those from soy grits alone. Nevertheless, mixtures containing 20% or 35% alkali-extracted offal protein expanded more (greatest expansion at 170°C), had lower density and greater hydratability than those containing these proportions of untreated offal or SDS-extracted offal protein. (The latter expanded most between 175-180°C.) Whereas the incorporation of SDS-extracted bovine or porcine lung protein failed to yield textured extrudates, the incorporation of SDS-extracted bovine tripe protein at the 20% level did so. Effects due to source were otherwise small. 相似文献
26.
A simplified two-term model was developed to predict the weight loss of frankfurters during thermal processing at various process conditions and with various product compositions. The model was validated with the experimental data. The moisture loss rate was found to be proportional to product temperature and inversely proportional to the fat-protein ratio of the product. 相似文献
27.
Surface ultrastructures of gill filaments and secondary lamellae of Rita rita and Cirrhinus mrigala, inhabiting different ecological habitat, were investigated to unravel adaptive modifications. R. rita is a sluggish, bottom dwelling carnivorous catfish, which inhabits regions of river with accumulations of dirty water. It retains its viability for long time if taken out of water. C. mrigala is an active bottom dwelling Indian major carp, which lives in relatively clean water and dies shortly after taken out of water. In R. rita, gill septa between gill filaments are reduced. Microridges on epithelial cells covering gill filaments are often continuous and arranged concentrically. Secondary lamellae are extensive. The epithelium appears corrugated, show irregular elevations and shallow depressions, and microridges on epithelial cells appear fragmented. In C. mrigala, in contrast, the gill septa are extensive. Microridges on epithelial cells covering gill filaments are fragmented. Secondary lamellae are less extensive. The epithelium appears smooth and microridges on epithelial cells are relatively inconspicuous. These differences have been considered adaptive modification in relation to habit and ecological niches inhabited by two fish species. Presence of mucous goblet cells on gill filaments is discussed in relation to their functions including precipitation of the sediments and preventing clogging of gill filaments. Infrequent mucous goblet cells in the epithelium of secondary lamellae in two fish species are considered an adaptation, minimizing thickness of the epithelium to reduce barrier between blood and water for favoring gasses exchange with increased efficiency. 相似文献
28.
Most geometric computer vision problems involve orthogonality constraints. An important subclass of these problems is subspace estimation, which can be equivalently formulated into an optimization problem on Grassmann manifolds. In this paper, we propose to use the conjugate gradient algorithm on Grassmann manifolds for robust subspace estimation in conjunction with the recently introduced generalized projection based M-Estimator (gpbM). The gpbM method is an elemental subset-based robust estimation algorithm that can process heteroscedastic data without any user intervention. We show that by optimizing the orthogonal parameter matrix on Grassmann manifolds, the performance of the gpbM algorithm improves significantly. Results on synthetic and real data are presented. 相似文献
29.
M2Tracker: A Multi-View Approach to Segmenting and Tracking People in a Cluttered Scene 总被引:1,自引:0,他引:1
When occlusion is minimal, a single camera is generally sufficient to detect and track objects. However, when the density of objects is high, the resulting occlusion and lack of visibility suggests the use of multiple cameras and collaboration between them so that an object is detected using information available from all the cameras in the scene.In this paper, we present a system that is capable of segmenting, detecting and tracking multiple people in a cluttered scene using multiple synchronized surveillance cameras located far from each other. The system is fully automatic, and takes decisions about object detection and tracking using evidence collected from many pairs of cameras. Innovations that help us tackle the problem include a region-based stereo algorithm capable of finding 3D points inside an object knowing only the projections of the object (as a whole) in two views, a segmentation algorithm using bayesian classification and the use of occlusion analysis to combine evidence from different camera pairs.The system has been tested using different densities of people in the scene. This helps us determine the number of cameras required for a particular density of people. Experiments have also been conducted to verify and quantify the efficacy of the occlusion analysis scheme. 相似文献
30.