全文获取类型
收费全文 | 778篇 |
免费 | 18篇 |
专业分类
电工技术 | 7篇 |
综合类 | 1篇 |
化学工业 | 184篇 |
金属工艺 | 9篇 |
机械仪表 | 10篇 |
建筑科学 | 36篇 |
矿业工程 | 1篇 |
能源动力 | 52篇 |
轻工业 | 46篇 |
水利工程 | 11篇 |
石油天然气 | 2篇 |
无线电 | 101篇 |
一般工业技术 | 87篇 |
冶金工业 | 14篇 |
自动化技术 | 235篇 |
出版年
2024年 | 5篇 |
2023年 | 13篇 |
2022年 | 45篇 |
2021年 | 41篇 |
2020年 | 38篇 |
2019年 | 25篇 |
2018年 | 33篇 |
2017年 | 38篇 |
2016年 | 44篇 |
2015年 | 26篇 |
2014年 | 46篇 |
2013年 | 48篇 |
2012年 | 40篇 |
2011年 | 61篇 |
2010年 | 51篇 |
2009年 | 45篇 |
2008年 | 31篇 |
2007年 | 42篇 |
2006年 | 23篇 |
2005年 | 16篇 |
2004年 | 12篇 |
2003年 | 6篇 |
2002年 | 8篇 |
2001年 | 4篇 |
2000年 | 5篇 |
1999年 | 9篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 6篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1980年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有796条查询结果,搜索用时 15 毫秒
71.
Georgios Kontaxis Michalis Polychronakis Evangelos P. Markatos 《International Journal of Information Security》2012,11(5):321-332
Over the past few years, a large and ever increasing number of Web sites have incorporated one or more social login platforms and have encouraged users to log in with their Facebook, Twitter, Google, or other social networking identities. Research results suggest that more than two million Web sites have already adopted Facebook’s social login platform, and the number is increasing sharply. Although one might theoretically refrain from such social login features and cross-site interactions, usage statistics show that more than 250 million people might not fully realize the privacy implications of opting-in. To make matters worse, certain Web sites do not offer even the minimum of their functionality unless users meet their demands for information and social interaction. At the same time, in a large number of cases, it is unclear why these sites require all that personal information for their purposes. In this paper, we mitigate this problem by designing and developing a framework for minimum information disclosure in social login interactions with third-party sites. Our example case is Facebook, which combines a very popular single sign-on platform with information-rich social networking profiles. Whenever users want to browse to a Web site that requires authentication or social interaction using a Facebook identity, our system employs, by default, a Facebook session that reveals the minimum amount of information necessary. Users have the option to explicitly elevate that Facebook session in a manner that reveals more or all of the information tied to their social identity. This enables users to disclose the minimum possible amount of personal information during their browsing experience on third-party Web sites. 相似文献
72.
Ouzounis GK Wilkinson MH 《IEEE transactions on pattern analysis and machine intelligence》2011,33(2):224-239
In this paper, we present a new method for attribute filtering, combining contrast and structural information. Using hyperconnectivity based on k-flat zones, we improve the ability of attribute filters to retain internal details in detected objects. Simultaneously, we improve the suppression of small, unwanted detail in the background. We extend the theory of attribute filters to hyperconnectivity and provide a fast algorithm to implement the new method. The new version is only marginally slower than the standard Max-Tree algorithm for connected attribute filters, and linear in the number of pixels or voxels. It is two orders of magnitude faster than anisotropic diffusion. The method is implemented in the form of a filtering rule suitable for handling both increasing (size) and nonincreasing (shape) attributes. We test this new framework on nonincreasing shape filters on both 2D images from astronomy, document processing, and microscopy, and 3D CT scans, and show increased robustness to noise while maintaining the advantages of previous methods. 相似文献
73.
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security when compared to 2G systems, UMTS still has weaknesses that can lead to security incidents. In this paper, we investigate the vulnerabilities of the UMTS security architecture that can be exploited by a malicious individual to mount Denial of Service (DoS) attacks. Our focus is on signaling-oriented attacks above the physical layer. We describe and analyze several novel attacks that can be triggered against both core UMTS architecture as well as hybrid UMTS/WLAN realms. An additional contribution of this paper is the presentation of an extensive survey of similar attacks in UMTS and related protocol infrastructures such as IP Multimedia Subsystem (IMS). Finally, we offer some suggestions that would provide greater tolerance to the system against DoS attacks. 相似文献
74.
手动式电磁定位及图像导航的短径癌症放射治疗系统 总被引:1,自引:0,他引:1
提出一个用于高剂量短径癌症放射治疗的手动式电磁定们及图像导航系统,该系统主要由4个模块组成:预处理、术前规划、术内导航和术后计划,它们分别对应高剂量短径癌症放射治疗的4个流程:在术前规划阶段,用户可交互地设计探针放置位置以及三维重建病灶轮廓;在手术进行过程中,六自由度的电磁式定位技术实时而精确地跟踪探针位置,高质量的可视化技术指引医生完成手术探针放置任务;手术探针全部放置完毕后,术后计划模板计算剂量分布并利用后装机设备进行放射治疗。初步实验表明,计算机辅助的探针定位比手工定位精度提高2-3倍,手术时间减少5倍以上,同时也减轻了病人所承受的放射剂量。 相似文献
75.
Vangelis Karkaletsis Georgios Paliouras Georgios Petasis Natasa Manousopoulou Constantine D. Spyropoulos 《Journal of Intelligent and Robotic Systems》1999,26(2):123-135
Named-entity recognition (NER) involves the identification and classification of named entities in text. This is an important subtask in most language engineering applications, in particular information extraction, where different types of named entity are associated with specific roles in events. In this paper, we present a prototype NER system for Greek texts that we developed based on a NER system for English. Both systems are evaluated on corpora of the same domain and of similar size. The time-consuming process for the construction and update of domain-specific resources in both systems led us to examine a machine learning method for the automatic construction of such resources for a particular application in a specific language. 相似文献
76.
Various synchronization algorithms have been introduced in literature during the last decades to deal with the firing squad synchronization problem on cellular automata (CA). Among others defective CA algorithms, where the CA cell is able to transmit information without previous processing, have been also presented. In our case, originating from the classical Mazoyer’s paper, where a minimum-time solution is presented with 6 states, a one-dimensional CA where one cell may permanently fail is presented. In the proposed algorithm, the defective cell can neither process nor transmit information any longer, while it is considered that such dynamic defects may become apparent in any time step of computation. A thorough analysis of the synchronization, in terms of location and time at which cell fails, for the cells found in both sides of defective cell is delivered to decipher the corresponding maximal possible number of synchronized cells in each part of the cut, due to defect, CA array. The proposed algorithm is properly extended to consider more than one defective cells that may occur in the under study one-dimensional CA. Based on the aforementioned analysis, we provide the generalization of synchronization with multiple totally defective cells, while application examples of the generalized CA algorithm in case of two defective cells are also presented. Finally, another intriguing aspect refers to handling of states that could be tentatively characterized as unknown, in a confrontation similar to the previous defective state but also different, since now this(these) cell(s) are not stated as faulty but unknown. As a result, a new one-dimensional CA with less states, compared to the previous CA defective algorithms, able to synchronize the maximal possible number of cells in each part occurs. 相似文献
77.
Georgios Chondrogiannis Pedro Réu Mahiar M. Hamedi 《Advanced Materials Technologies》2023,8(4):2201004
Nucleic acid amplification testing (NAAT) is the gold standard for infectious disease diagnostics. Currently NAATs are mainly limited to centralized laboratories, while paper-based antigen tests are used for rapid home-based diagnostics. DNA extraction, the initial sample preparation step in NAATs, remains a bottleneck that hinders its development toward home-based kits. This step requires the use of compounds detrimental to the enzymes in downstream DNA amplification. Here, this work overcomes this bottleneck by immobilizing the enzyme achromopeptidase (ACP) on nitrocellulose, to both store and enable the separation of the enzymes from the other steps. This work provides proof-of-concept that immobilized ACP is effective at lysis and release of amplifiable DNA from gram-positive Staphylococcus epidermidis and enables the use of the lysate directly for DNA amplification, without the need for heat deactivation of the enzyme. This sample preparation method requires only incubation at 37 °C and mild agitation, which allows to implement it with fully disposable and affordable equipment. Consequently, this work enables to combine the paper-based DNA extraction method with the isothermal recombinase polymerase amplification (RPA) followed by lateral flow detection to demonstrate a sample-to-answer NAAT packaged as an instrument free self-test kit expanding the capabilities of home-testing beyond antigen tests. 相似文献
78.
Stathis Mavridopoulos Petros Nicopolitidis Georgios Papadimitriou 《International Journal of Communication Systems》2018,31(13)
In ad hoc wireless networks, devices that normally cannot directly communicate route their messages through intermediate nodes. The number of those nodes is called hop count, a useful metric in estimating the distance between 2 nodes. Current methods usually depend on special nodes, called anchors, that need accurate localization information, in order to calculate an estimate for the average distance traversed per hop. The drawback of this approach is that anchor nodes increase the overall cost and complexity of the system. To address this problem, this letter proposes a novel, anchor node–free algorithm that can achieve a useful estimate for actual distance between 2 nodes, by analytically finding an estimate for the average maximum distance traveled per hop and multiplying with the hop count. The only requirement is the a priori knowledge of the networks' node density and the node range. The performance of our method is compared with a recent anchor node–based method and is shown to yield similar location estimation accuracy, despite the fact that it does not use anchor nodes. 相似文献
79.
Lukas Spree Fupin Liu Volker Neu Marco Rosenkranz Georgios Velkos Yaofeng Wang Sandra Schiemenz Jan Dreiser Pierluigi Gargiani Manuel Valvidares Chia-Hsiang Chen Bernd Büchner Stanislav M. Avdoshenko Alexey A. Popov 《Advanced functional materials》2021,31(48):2105516
The chemical functionalization of fullerene single molecule magnet Tb2@C80(CH2Ph) enables the facile preparation of robust monolayers on graphene and highly oriented pyrolytic graphite from solution without impairing their magnetic properties. Monolayers of endohedral fullerene functionalized with pyrene exhibit magnetic bistability up to a temperature of 28 K. The use of pyrene terminated linker molecules opens the way to devise integration of spin carrying units encapsulated by fullerene cages on graphitic substrates, be it single-molecule magnets or qubit candidates. 相似文献
80.