全文获取类型
收费全文 | 928篇 |
免费 | 40篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 18篇 |
化学工业 | 251篇 |
金属工艺 | 11篇 |
机械仪表 | 13篇 |
建筑科学 | 31篇 |
矿业工程 | 3篇 |
能源动力 | 30篇 |
轻工业 | 97篇 |
水利工程 | 10篇 |
石油天然气 | 4篇 |
无线电 | 98篇 |
一般工业技术 | 133篇 |
冶金工业 | 31篇 |
自动化技术 | 239篇 |
出版年
2024年 | 3篇 |
2023年 | 8篇 |
2022年 | 34篇 |
2021年 | 25篇 |
2020年 | 24篇 |
2019年 | 32篇 |
2018年 | 38篇 |
2017年 | 26篇 |
2016年 | 35篇 |
2015年 | 27篇 |
2014年 | 31篇 |
2013年 | 57篇 |
2012年 | 75篇 |
2011年 | 59篇 |
2010年 | 45篇 |
2009年 | 41篇 |
2008年 | 52篇 |
2007年 | 60篇 |
2006年 | 45篇 |
2005年 | 25篇 |
2004年 | 38篇 |
2003年 | 17篇 |
2002年 | 22篇 |
2001年 | 13篇 |
2000年 | 10篇 |
1999年 | 13篇 |
1998年 | 6篇 |
1997年 | 15篇 |
1996年 | 9篇 |
1995年 | 7篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 8篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1977年 | 3篇 |
1976年 | 2篇 |
排序方式: 共有969条查询结果,搜索用时 15 毫秒
71.
72.
Dimitris Giakoumis Nikolaos Kaklanis Konstantinos Votis Dimitrios Tzovaras 《Universal Access in the Information Society》2014,13(2):227-248
His paper presents a tool facilitating developers of user interfaces (UIs) to experience accessibility limitations that can be posed from various disabilities during the interaction of impaired users with their developments. In this respect, various aspects of visual, hearing, physical and cognitive impairments have been modelled through filters providing approximate, yet, realistic simulations over them. These filters have formed the basis for the developed tool, which can be used either on its own (as a standalone application), or be embedded in the NetBeans Integrated Development Environment. The tool, named DIAS, allows for impairment simulations to be performed over Java, mobile and web applications. Moreover, it integrates two of the most common assistive technologies (ATs), namely a screen reader and a magnifier. As a result, developers of UIs can not only experience how interaction would be affected from various impairments, but they can also understand how their developments would be perceived by impaired users through an AT. This work aims to provide an integrated, practical solution for impairment simulation, which could be easily adopted by developers, thus realistically increasing the possibilities for the future development of interactive applications that are more accessible to users with disabilities. 相似文献
73.
We study a simple technique, originally presented by Herlihy (ACM Trans. Program. Lang. Syst. 15(5):745–770, 1993), for executing concurrently, in a wait-free manner, blocks of code that have been programmed for sequential execution and require significant synchronization in order to be performed in parallel. We first present an implementation of this technique, called Sim, which employs a collect object. We describe a simple implementation of a collect object from a single shared object that supports atomic Add (or XOR) in addition to read; this implementation has step complexity O(1). By plugging in to Sim this implementation, Sim exhibits constant step complexity as well. This allows us to derive lower bounds on the step complexity of implementations of several shared objects, like Add, XOR, collect, and snapshot objects, from LL/SC objects. We then present a practical version of Sim, called PSim, which is implemented in a real shared-memory machine. From a theoretical perspective, PSim has worse step complexity than Sim, its theoretical analog; in practice though, we experimentally show that PSim is highly-efficient: it outperforms several state-of-the-art lock-based and lock-free synchronization techniques, and this given that it is wait-free, i.e. that it satisfies a stronger progress condition than all the algorithms that it outperforms. We have used PSim to get highly-efficient wait-free implementations of stacks and queues. 相似文献
74.
Nikolaos Kazantzis Author Vitae Author Vitae Costas Tseronis Author Vitae Author Vitae 《Automatica》2005,41(1):79-86
The present work proposes a systematic methodology for the optimal selection of controller parameters in the sense of minimizing a performance index, which is a quadratic function of the tracking error and the control effort. The performance index is calculated explicitly as an algebraic function of the controller parameters by solving Zubov's partial differential equation (PDE). Standard optimization techniques are then employed for the calculation of the optimal values of the controller parameters. The solution of Zubov's PDE is also used to estimate the closed-loop stability region for the chosen values of the controller parameters. The proposed approach is finally illustrated in a chemical reactor control problem. 相似文献
75.
76.
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs. 相似文献
77.
Janice L. Pearce Bob Powers Chistopher Hess Paul E. Rybski Sascha A. Stoeter Nikolaos Papanikolopoulos 《Journal of Intelligent and Robotic Systems》2006,45(4):307-321
To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. Using the concept of ‘repellent virtual pheromones’ inspired by insect colony coordination behaviors, miniature robots can be quickly dispersed to survey a disaster site. Assisted by visual servoing, dispersion of the miniature robots can quickly cover an area. An external observer such as another robot or an overhead camera is brought into the control loop to provide each miniature robot estimations of the positions of all of the other near-by robots in the robotic team. These miniature robots can then move away from the other near-by robots on the team, resulting in the robot collective becoming swiftly distributed through the local area. The technique has been simulated with differing pheromone persistence levels and implemented using the miniature Scout robots, developed by the Center for Distributed Robotics at the University of Minnesota, which are well-suited to surveillance and reconnaissance missions. 相似文献
78.
Nikos Nikolaou Michael Makridis Basilis Gatos Nikolaos Stamatopoulos Nikos Papamarkos 《Image and vision computing》2010
In this paper, we strive towards the development of efficient techniques in order to segment document pages resulting from the digitization of historical machine-printed sources. This kind of documents often suffer from low quality and local skew, several degradations due to the old printing matrix quality or ink diffusion, and exhibit complex and dense layout. To face these problems, we introduce the following innovative aspects: (i) use of a novel Adaptive Run Length Smoothing Algorithm (ARLSA) in order to face the problem of complex and dense document layout, (ii) detection of noisy areas and punctuation marks that are usual in historical machine-printed documents, (iii) detection of possible obstacles formed from background areas in order to separate neighboring text columns or text lines, and (iv) use of skeleton segmentation paths in order to isolate possible connected characters. Comparative experiments using several historical machine-printed documents prove the efficiency of the proposed technique. 相似文献
79.
Alexandros Iosifidis Anastasios Tefas Nikolaos Nikolaidis Ioannis Pitas 《Computer Vision and Image Understanding》2012,116(3):347-360
In this paper, a novel multi-view human movement recognition method is presented. A novel representation of multi-view human movement videos is proposed that is based on learning basic multi-view human movement primitives, called multi-view dynemes. The movement video is represented in a new feature space (called dyneme space) using these multi-view dynemes, thus producing a time invariant multi-view movement representation. Fuzzy distances from the multi-view dynemes are used to represent the human body postures in the dyneme space. Three variants of Linear Discriminant Analysis (LDA) are evaluated to achieve a discriminant movement representation in a low dimensionality space. The view identification problem is solved either by using a circular block shift procedure followed by the evaluation of the minimum Euclidean distance from any dyneme, or by exploiting the circular shift invariance property of the Discrete Fourier Transform (DFT). The discriminant movement representation combined with camera viewpoint identification and a nearest centroid classification step leads to a high human movement classification accuracy. 相似文献
80.
The resonant properties of a closed and symmetric cyclic array of N coupled microring resonators (coupled-microring resonator regular N-gon) are for the first time determined analytically by applying the transfer matrix approach and Floquet theorem for periodic propagation in cylindrically symmetric structures. By solving the corresponding eigenvalue problem with the field amplitudes in the rings as eigenvectors, it is shown that, for even or odd N, this photonic molecule possesses 1 + N/2 or 1+N resonant frequencies, respectively. The condition for resonances is found to be identical to the familiar dispersion equation of the infinite coupled-microring resonator waveguide with a discrete wave vector. This result reveals the so far latent connection between the two optical structures and is based on the fact that, for a regular polygon, the field transfer matrix over two successive rings is independent of the polygon vertex angle. The properties of the resonant modes are discussed in detail using the illustration of Brillouin band diagrams. Finally, the practical application of a channel-dropping filter based on polygons with an even number of rings is also analyzed. 相似文献