全文获取类型
收费全文 | 589篇 |
免费 | 25篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 153篇 |
金属工艺 | 2篇 |
机械仪表 | 10篇 |
建筑科学 | 19篇 |
能源动力 | 11篇 |
轻工业 | 88篇 |
石油天然气 | 1篇 |
无线电 | 29篇 |
一般工业技术 | 123篇 |
冶金工业 | 25篇 |
原子能技术 | 6篇 |
自动化技术 | 138篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 20篇 |
2021年 | 20篇 |
2020年 | 12篇 |
2019年 | 11篇 |
2018年 | 19篇 |
2017年 | 12篇 |
2016年 | 29篇 |
2015年 | 19篇 |
2014年 | 22篇 |
2013年 | 36篇 |
2012年 | 41篇 |
2011年 | 44篇 |
2010年 | 35篇 |
2009年 | 31篇 |
2008年 | 31篇 |
2007年 | 42篇 |
2006年 | 17篇 |
2005年 | 16篇 |
2004年 | 20篇 |
2003年 | 15篇 |
2002年 | 12篇 |
2001年 | 8篇 |
2000年 | 6篇 |
1999年 | 11篇 |
1998年 | 2篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 6篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1986年 | 2篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 4篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有615条查询结果,搜索用时 15 毫秒
31.
Romolo Marcelli Giancarlo Bartolucci George Papaioannu Giorgio De Angelis Andrea Lucibello Emanuela Proietti Benno Margesin Flavio Giacomozzi François Deborgies 《Microsystem Technologies》2010,16(7):1111-1118
The reliability of RF MEMS switches is typically reduced by charging effects occurring in the dielectrics. The aim of this paper is to discuss these effects, and to propose analytical and equivalent circuit models which account for most of the physical contributions present in the structure. 相似文献
32.
Paola Bonizzoni Gianluca Della Vedova Riccardo Dondi Giancarlo Mauri 《Algorithmica》2010,58(2):282-303
The problem of clustering fingerprint vectors with missing values is an interesting problem in Computational Biology that has been proposed in Figueroa et al. (J. Comput. Biol. 11(5):887–901, 2004). In this paper we show some improvements in closing the gaps between the known lower bounds and upper bounds on the approximability of variants of the biological problem. Moreover, we have studied two additional variants of the original problem proposed in Figueroa et al. (Proc. 11th Computing: The Australasian Theory Symposium (CATS), CRPIT, vol. 41, pp. 57–60, 2005). We prove that all such problems are APX-hard even when each fingerprint contains only two unknown positions and we present a greedy algorithm that has constant approximation factors for these variants. Despite the hardness of these restricted versions of the problem, we show that the general clustering problem on an unbounded number of missing values such that they occur for every fixed position of an input vector in at most one fingerprint is polynomial time solvable. 相似文献
33.
In this paper, we report some comparative simulations between lattice BGK and lattice Bolzmann schemes for two-dimensional fluid flows. A quantitative assessment of the validity of the lattice BGK and lattice Bolzmann schemes is presented for the two-dimensional weakly compressibleKolmogorov flow. We use this flow to study the difference of the two schemes at small scales. A lowReynolds (R
e 300) number simulation shows the almost identical energy spectra for both schemes except for the small-scale dynamics of lattice Bolzmann which is more noisy. Because of the intrinsic difficulties of nonlinear stability analysis, we use numerical simulations to investigate which scheme is more stable. It turns out the lattice BGK is more stable. It turns out the lattice BGK is more robust than lattice Bolzmann by increasing theReynolds numbers. Detailed comparison with other methods (e.g., spectral method) remains to be done in the near future. 相似文献
34.
Flora Amato Aniello Castiglione Vincenzo Moscato Antonio Picariello Giancarlo Sperlì 《Multimedia Tools and Applications》2018,77(14):17803-17827
In this work, we propose a novel multimedia summarization technique from Online Social Networks (OSNs). In particular, we model each Multimedia Social Network (MSN)—i.e. an OSN focusing on the management and sharing of multimedia information—using an hypergraph based approach and exploit influence analysis methodologies to determine the most important multimedia objects with respect to one or more topics of interest. Successively, we obtain from the list of candidate objects a multimedia summary using a summarization model together with an heuristics that aims to generate summaries with priority (with respect to some user keywords), continuity, variety and not receptiveness features. The performed experiments on Flickr shows the effectiveness of proposed approach. 相似文献
35.
P systems and Brane calculi are two (families of) computational models inspired by the structure and the functioning of living cells. Although they have different goals there is a recent growing of interests in results that bridge the two research areas.Here we consider an important kind of communication based on the natural budding of mobile membranes (e.g., Golgi apparatus) that is already defined for P systems and we show how to construct an analogous communication in the basic Phago/Exo/Pino Brane calculus. 相似文献
36.
Su Hang Sandoval Juan Vieyres Pierre Poisson Gérard Ferrigno Giancarlo De Momi Elena 《International Journal of Control, Automation and Systems》2018,16(6):2915-2923
International Journal of Control, Automation and Systems - In this paper, a safety-enhanced collaborative control framework is proposed for tele-operated minimally invasive surgery (MIS) using a... 相似文献
37.
Bruno Rossi Barbara Russo Giancarlo Succi 《Information and Software Technology》2011,53(11):1209-1226
Context
Adopting IT innovation in organizations is a complex decision process driven by technical, social and economic issues. Thus, those organizations that decide to adopt innovation take a decision of uncertain success of implementation, as the actual use of a new technology might not be the one expected. The misalignment between planned and effective use of innovation is called assimilation gap.Objective
This research aims at defining a quantitative instrument for measuring the assimilation gap and applying it to the case of the adoption of OSS.Method
In this paper, we use the theory of path dependence and increasing returns of Arthur. In particular, we model the use of software applications (planned or actual) by stochastic processes defined by the daily amounts of files created with the applications. We quantify the assimilation gap by comparing the resulting models by measures of proximity.Results
We apply and validate our method to a real case study of introduction of OpenOffice. We have found a gap between the planned and the effective use despite well-defined directives to use the new OS technology. These findings suggest a need of strategy re-calibration that takes into account environmental factors and individual attitudes.Conclusions
The theory of path dependence is a valid instrument to model the assimilation gap provided information on strategy toward innovation and quantitative data on actual use are available. 相似文献38.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms. 相似文献
39.
40.
Chiara Damiani Dario Pescini Riccardo Colombo Sara Molinari Lilia Alberghina Marco Vanoni Giancarlo Mauri 《Natural computing》2014,13(3):321-331
Constraint-based modeling is largely used in computational studies of metabolism. We propose here a novel approach that aims to identify ensembles of flux distributions that comply with one or more target phenotype(s). The methodology has been tested on a small-scale model of yeast energy metabolism. The target phenotypes describe the differential pattern of ethanol production and O2 consumption observed in “Crabtree-positive” and “Crabtree-negative” yeasts in changing environment (i.e., when the upper limit of glucose uptake is varied). The ensembles were obtained either by selection among sampled flux distributions or by means of a search heuristic (genetic algorithm). The former approach provided indication about the probability to observe a given phenotype, but the resulting ensembles could not be unambiguously partitioned into “Crabtree-positive” and “Crabtree-negative” clusters. On the contrary well-separated clusters were obtained with the latter method. The cluster analysis further allowed identification of distinct groups within each target phenotype. The method may thus prove useful in characterizing the design principles underlying metabolic plasticity arising from evolving physio-pathological or developmental constraints. 相似文献