全文获取类型
收费全文 | 5563篇 |
免费 | 276篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 79篇 |
综合类 | 13篇 |
化学工业 | 1154篇 |
金属工艺 | 127篇 |
机械仪表 | 164篇 |
建筑科学 | 121篇 |
矿业工程 | 29篇 |
能源动力 | 292篇 |
轻工业 | 462篇 |
水利工程 | 59篇 |
石油天然气 | 43篇 |
无线电 | 635篇 |
一般工业技术 | 1258篇 |
冶金工业 | 548篇 |
原子能技术 | 66篇 |
自动化技术 | 842篇 |
出版年
2024年 | 24篇 |
2023年 | 117篇 |
2022年 | 287篇 |
2021年 | 438篇 |
2020年 | 265篇 |
2019年 | 295篇 |
2018年 | 311篇 |
2017年 | 267篇 |
2016年 | 260篇 |
2015年 | 174篇 |
2014年 | 221篇 |
2013年 | 432篇 |
2012年 | 257篇 |
2011年 | 284篇 |
2010年 | 191篇 |
2009年 | 159篇 |
2008年 | 151篇 |
2007年 | 135篇 |
2006年 | 119篇 |
2005年 | 85篇 |
2004年 | 65篇 |
2003年 | 79篇 |
2002年 | 61篇 |
2001年 | 52篇 |
2000年 | 49篇 |
1999年 | 64篇 |
1998年 | 154篇 |
1997年 | 128篇 |
1996年 | 98篇 |
1995年 | 74篇 |
1994年 | 61篇 |
1993年 | 56篇 |
1992年 | 36篇 |
1991年 | 43篇 |
1990年 | 35篇 |
1989年 | 31篇 |
1988年 | 25篇 |
1987年 | 29篇 |
1986年 | 35篇 |
1985年 | 32篇 |
1984年 | 26篇 |
1983年 | 29篇 |
1982年 | 13篇 |
1981年 | 13篇 |
1980年 | 11篇 |
1978年 | 16篇 |
1977年 | 17篇 |
1976年 | 24篇 |
1973年 | 8篇 |
1972年 | 8篇 |
排序方式: 共有5892条查询结果,搜索用时 11 毫秒
51.
K. Geihs P. Barone F. Eliassen J. Floch R. Fricke E. Gjorven S. Hallsteinsen G. Horn M. U. Khan A. Mamelli G. A. Papadopoulos N. Paspallis R. Reichle E. Stav 《Software》2009,39(4):385-422
Driven by the emergence of mobile and pervasive computing there is a growing demand for context‐aware software systems that can dynamically adapt to their run‐time environment. We present the results of project MADAM that has delivered a comprehensive solution for the development and operation of context‐aware, self‐adaptive applications. The main contributions of MADAM are (a) a sophisticated middleware that supports the dynamic adaptation of component‐based applications, and (b) an innovative model‐driven development methodology that is based on abstract adaptation models and corresponding model‐to‐code transformations. MADAM has demonstrated the viability of a general, integrated approach to application‐level adaptation. We discuss our experiences with two real‐world case studies that were built using the MADAM approach. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
52.
Mohamed Sahli Christine Millot Claude Roques-Carmes Chantal Khan Malek 《Microsystem Technologies》2009,15(6):827-835
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing. 相似文献
53.
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
Abdul Hameed Alireza Khoshkbarforoushha Rajiv Ranjan Prem Prakash Jayaraman Joanna Kolodziej Pavan Balaji Sherali Zeadally Qutaibah Marwan Malluhi Nikos Tziritas Abhinav Vishnu Samee U. Khan Albert Zomaya 《Computing》2016,98(7):751-774
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability. 相似文献
54.
Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal placement of wind turbines. Due to complex nature of micrositing of wind turbines, the wind farm layout design problem is considered a complex optimization problem. In the recent past, various techniques and algorithms have been developed for optimization of energy output from wind farms. The present study proposes an optimization approach based on the cuckoo search (CS) algorithm, which is relatively a recent technique. A variant of CS is also proposed that incorporates a heuristic-based seed solution for a better performance. The proposed CS algorithms are compared with genetic and particle swarm optimization (PSO) algorithms, which have been extensively applied to wind farm layout design. Empirical results indicate that the proposed CS algorithms outperformed the genetic and PSO algorithms for the given test scenarios in terms of yearly power output and efficiency. 相似文献
55.
Muhammad Umer Khan Shuai Li Qixin Wang Zili Shao 《Journal of Intelligent and Robotic Systems》2016,82(1):163-174
This paper mainly addresses formation control problem of non-holonomic systems in an optimized manner. Instead of using linearization to solve this problem approximately, we designed control laws with guaranteed global convergence by leveraging nonlinear transformations. Under this nonlinear transformation, consensus of non-holonomic robots can be converted into a stabilization problem, to which optimal treatment applies. This concept is then extended to the formation control and tracking problem for a team of robots following leader-follower strategy. A trajectory generator prescribes the feasible motion of virtual reference robot, a decentralized control law is used for each robot to track the reference while maintaining the formation. The asymptotic convergence of follower robots to the position and orientation of the reference robot is ensured using the Lyapunov function which is also generated using chained form differential equations. In order to witness the efficacy of the scheme, simulations results are presented for Unicycle and Car-like robots. 相似文献
56.
Muhammad Sajjad Khan Muhammad Sung Wook Baik Seungmin Rho Zahoor Jan Sang-Soo Yeo Irfan Mehmood 《Multimedia Tools and Applications》2017,76(3):3519-3536
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers. 相似文献
57.
Murad Khan Awais Ahmad Shehzad Khalid Syed Hassan Ahmed Sohail Jabbar Jamil Ahmad 《Multimedia Tools and Applications》2017,76(23):24649-24674
Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these enhancements are limited to specific scenarios and hence do not provide support for generic mobility. Similarly, various schemes are proposed based on these mobility models but most of them are suffered from the high packet loss, frequent handovers, too early and late handovers, inappropriate network selection, etc. To address these challenges, a generic vertical handover management scheme for heterogeneous wireless networks is proposed in this article. The proposed scheme works in three phases. In the first phase, a handover triggering approach is designed to identify the appropriate place for initiating handover based on the estimated coverage area of a WLAN access point or cellular base station. In the second phase, fuzzy rule based system is designed to eliminate the inappropriate networks before deciding an optimal network for handover. In the third phase, a network selection scheme is developed based on the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) decision mechanism. Various parameters such as delay, jitter, Bit Error Rate (BER), packet loss, communication cost, response time, and network load are considered for selecting an optimal network. The proposed scheme is tested in a mobility scenario with different speeds of a mobile node ranging from very low to very high. The simulation results are compared with the existing decision models used for network selection and handover triggering approaches. The proposed scheme outperforms these schemes in terms of energy consumption, handover delay and time, packet loss, good put, etc. 相似文献
58.
59.
In the recent years, we have seen that Grover search algorithm (Proceedings, 28th annual ACM symposium on the theory of computing, pp. 212–219, 1996) by using quantum parallelism has revolutionized the field of solving huge class of NP problems in comparisons to classical systems. In this work, we explore the idea of extending Grover search algorithm to approximate algorithms. Here we try to analyze the applicability of Grover search to process an unstructured database with a dynamic selection function in contrast to the static selection function used in the original work (Grover in Proceedings, 28th annual ACM symposium on the theory of computing, pp. 212–219, 1996). We show that this alteration facilitates us to extend the application of Grover search to the field of randomized search algorithms. Further, we use the dynamic Grover search algorithm to define the goals for a recommendation system based on which we propose a recommendation algorithm which uses binomial similarity distribution space giving us a quadratic speedup over traditional classical unstructured recommendation systems. Finally, we see how dynamic Grover search can be used to tackle a wide range of optimization problems where we improve complexity over existing optimization algorithms. 相似文献
60.
大量的研究行为识别方法集中在检测简单的动作,如:步行,慢跑或者跳跃等;针对于打斗或者动作复杂的攻击性行为则研究较少;而这些研究在某些监控场景下非常有用,如:监狱,自助银行,商场等. 传统的暴力行为识别研究方法主要利用先验知识来手动设计特征,而本文提出了一种基于3D-CNN结构的暴力检测方法,通过三维深度神经网络直接对输入进行操作,能够很好的提取暴力行为的时空特征信息,从而进行检测. 从实验结果可以看出,本文方法能较好地识别出暴力行为,准确率要高于人工设计特征的方法. 相似文献