全文获取类型
收费全文 | 954篇 |
免费 | 68篇 |
专业分类
电工技术 | 13篇 |
综合类 | 2篇 |
化学工业 | 244篇 |
金属工艺 | 5篇 |
机械仪表 | 12篇 |
建筑科学 | 34篇 |
矿业工程 | 1篇 |
能源动力 | 47篇 |
轻工业 | 105篇 |
水利工程 | 10篇 |
石油天然气 | 1篇 |
无线电 | 130篇 |
一般工业技术 | 141篇 |
冶金工业 | 23篇 |
原子能技术 | 1篇 |
自动化技术 | 253篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 45篇 |
2021年 | 46篇 |
2020年 | 31篇 |
2019年 | 19篇 |
2018年 | 36篇 |
2017年 | 43篇 |
2016年 | 46篇 |
2015年 | 33篇 |
2014年 | 40篇 |
2013年 | 63篇 |
2012年 | 64篇 |
2011年 | 81篇 |
2010年 | 50篇 |
2009年 | 63篇 |
2008年 | 61篇 |
2007年 | 47篇 |
2006年 | 39篇 |
2005年 | 34篇 |
2004年 | 21篇 |
2003年 | 14篇 |
2002年 | 16篇 |
2001年 | 9篇 |
2000年 | 7篇 |
1999年 | 8篇 |
1998年 | 6篇 |
1997年 | 15篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有1022条查询结果,搜索用时 15 毫秒
71.
Dimitrios Georgakopoulos Donald Baker Marian Nodine Andrzej Cichoki 《World Wide Web》2007,10(1):85-109
The Video Event Awareness Workbench (VEAW) analyzes surveillance video from thousands of video cameras and automatically detects complex events in near-real-time-at pace with their input video streams. For events of interest to security personnel, VEAW generates and routes alerts and related video evidence to subscribing security personnel. Complex event processing in VEAW is driven by user-authored awareness specifications comprised of inter-connected spatio-temporal stream and statistical operators that consume and produce events described in VEAW’s surveillance ontology. In this paper we introduce VEAW’s event driven architecture and describe its solutions for automating video surveillance, including the orchestration of continuous and tasked video analysis algorithms (e.g., for entity tracking and identification), fusion of events from multiple sources in an installation-specific “world” model, and proactive information gathering to deal with missing or incomplete information (this is done by tasking video analysis algorithms and security personnel to provide it). We also discuss how VEAW deals with late arriving information (due to out-of-band video analysis tasks and overhead), as well as a related resource optimization aimed at minimizing computation costs. We illustrate the benefits of VEAW by illustrating its application on the automation of real-world security policies. 相似文献
72.
Sharmila Subramaniam Vana Kalogeraki Dimitrios Gunopulos Fabio Casati Malu Castellanos Umeshwar Dayal Mehmet Sayal 《Information Systems》2007
Workflow management systems (WfMS) are widely used by business enterprises as tools for administrating, automating and scheduling the business process activities with the available resources. Since the control flow specifications of workflows are manually designed, they entail assumptions and errors, leading to inaccurate workflow models. Decision points, the XOR nodes in a workflow graph model, determine the path chosen toward completion of any process invocation. In this work, we show that positioning the decision points at their earliest points can improve process efficiency by decreasing their uncertainties and identifying redundant activities. We present novel techniques to discover the earliest positions by analyzing workflow logs and to transform the model graph. The experimental results show that the transformed model is more efficient with respect to its average execution time and uncertainty, when compared to the original model. 相似文献
73.
Nikolaos Athanasiadis George E. Chatzarakis Efstathios Athanasiadis Dimitrios Fourlaris 《Electrical Engineering (Archiv fur Elektrotechnik)》2007,89(6):509-517
This paper presents an analysis of current and potential cross-border congestion management methods for the EU electricity
market. Many currently used techniques are reported and the main aspects of possible future are presented. The main steps
of the newly established coordinated auction technique will be reported and an example of a real case for the South European
Region will be implemented. Moreover, in order to eliminate loop flows, avoid congestions at the day ahead stage and increase
the total transfer capacity of the south UCTE region (countries Greece, Albania and FYROM), it will be shown that Flexible
Ac Transmission Systems technology can help market players to get access to more transfer capacity for their transactions,
while security margins are being maintained. 相似文献
74.
The crystallization of calcium carbonate was investigated on pristine and non-covalently modified carbon nanotubes (CNTs) using the vapor diffusion technique in a calcium chloride solution. Non-covalent modification was accomplished by treating the carbon nanostructures with the amphiphilic copolymer poly(isoprene-b-acrylic acid). Calcium carbonate crystals grown on the surface and in the interstitial channels of CNT buckypapers were observed in both cases. Scanning electron microscopy analysis of the untreated CNTs showed the characteristic rhombohedral morphology of calcite crystals, while in the case of modified material spherical and ellipsoidal crystals, consisted of nanocrystallites, were observed. X-ray diffraction analysis showed the presence of calcite crystals in both cases. 相似文献
75.
Nikos Komninos Dimitrios D. Vergados Christos Douligeris 《International Journal of Communication Systems》2007,20(12):1391-1406
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
76.
Motion estimation in the spatiotemporal domain has been extensively studied and many methodologies have been proposed, which, however, cannot handle both time-varying and multiple motions. Extending previously published ideas, we present an efficient method for estimating multiple, linearly time-varying motions. It is shown that the estimation of accelerated motions is equivalent to the parameter estimation of superpositioned chirp signals. From this viewpoint, one can exploit established signal processing tools such as the chirp-Fourier transform. It is shown that accelerated motion results in energy concentration along planes in the 4-D space: spatial frequencies-temporal frequency-chirp rate. Using fuzzy c-planes clustering, we estimate the plane/motion parameters. The effectiveness of our method is verified on both synthetic as well as real sequences and its advantages are highlighted. 相似文献
77.
Assessment of a modification to the Brinell method for determining solid wood hardness 总被引:1,自引:0,他引:1
Charalampos Lykidis Miltiadis Nikolakakos Evaggelos Sakellariou Dimitrios Birbilis 《Materials and Structures》2016,49(3):961-967
Purpose of this study was to assess a modification to the hardness determination method in order to mitigate the effect of visual measurements on the consistency of Brinell method and accuracy of the results. The amendment has been previously proposed by other researchers and refers to the automated determination of indentation diameter and relies on the ability of modern testing machines to accurately measure indentation depth, through which the calculation of indentation diameter is possible. From the results of this study it was shown that the hardness values acquired by the proposed modification presented statistically significant difference compared to those acquired using the visual method described in EN1534 (Wood and parquet flooring—determination of resistance to indentation (Brinell)—test method, 2000). Moreover, compared to the standard methodology, the application of the proposed amendment led to hardness values which are better correlated to density as well as Janka hardness for the six different solid wood species tested. Furthermore, the proposed modification resulted to hardness values which seem to be less affected by the presence of varnish coatings. 相似文献
78.
Christos Giatsidis Dimitrios M. Thilikos Michalis Vazirgiannis 《Knowledge and Information Systems》2013,35(2):311-343
Community detection and evaluation is an important task in graph mining. In many cases, a community is defined as a subgraph characterized by dense connections or interactions between its nodes. A variety of measures are proposed to evaluate different quality aspects of such communities—in most cases ignoring the directed nature of edges. In this paper, we introduce novel metrics for evaluating the collaborative nature of directed graphs—a property not captured by the single node metrics or by other established community evaluation metrics. In order to accomplish this objective, we capitalize on the concept of graph degeneracy and define a novel D-core framework, extending the classic graph-theoretic notion of $k$ -cores for undirected graphs to directed ones. Based on the D-core, which essentially can be seen as a measure of the robustness of a community under degeneracy, we devise a wealth of novel metrics used to evaluate graph collaboration features of directed graphs. We applied the D-core approach on large synthetic and real-world graphs such as Wikipedia, DBLP, and ArXiv and report interesting results at the graph as well at the node level. 相似文献
79.
A Smart Grid is the modernization of the electricity grid using communication technology with the prime goals of reducing energy consumption as well as cost increasing reliability and creating new services for all participants. It comprises key components such as the Advanced Metering Infrastructure (AMI), which includes Neighborhood area network (NAN). When multi-hopping is considered in wireless communication, especially in WiFi and ZigBee, the range of the communication can be extended to communicate with the gateway collector in AMI network. Wireless mesh AMI network may have smart meters, a NAN gateway, and fixed as well as mobile repeaters. Though many techniques have been developed to secure on-demand routing protocols in wireless multi-hop ad-hoc networks, these protocols have shortcomings. In this paper, we propose two robust and secure multipath routing protocols for wireless mesh AMI networks. We have analyzed their robustness to various attacks. The simulation results show that the proposed protocols are better than existing secure routing protocols. 相似文献
80.
Athos Agapiou Diofantos G. Hadjimitsis Dimitrios D. Alexakis 《International journal of remote sensing》2013,34(16):5979-5996
Remote sensing has been successfully used for the exposure of shallow buried relics such as archaeological remains. The detection is mainly based on photointerpretation of high-resolution satellite or aerial images. Photointerpretation for archaeological purposes is focused on the identification of crop marks using visible and near infrared (VNIR) spectrum (e.g. vegetation indices) response, which is sensitive to vegetation stress. Detection of such marks is always performed through images of adequate spatial resolution, and therefore this procedure might be problematic in cases when there is a lack of accessibility to such kinds of data. This paper addresses this problem and illustrates an image-based method intended for the detection of crop marks using satellite data of inadequate spatial resolution. The overall methodology consists of seven separate steps. The method needs two areas of interest to be selected in the image, preferably in close proximity to one another. The first area is characterized as the ‘archaeological area under investigation'while the second is a vegetated non-archaeological area. These two areas are simultaneously examined in detail using spectral signatures, soil lines, and their phenological cycle characteristics. The proposed methodology has been successfully applied in three different areas in Cyprus and Greece, where the authors have already used the technique for validation purposes. 相似文献