全文获取类型
收费全文 | 17391篇 |
免费 | 214篇 |
国内免费 | 145篇 |
专业分类
电工技术 | 196篇 |
综合类 | 4篇 |
化学工业 | 1251篇 |
金属工艺 | 500篇 |
机械仪表 | 207篇 |
建筑科学 | 336篇 |
矿业工程 | 11篇 |
能源动力 | 178篇 |
轻工业 | 698篇 |
水利工程 | 73篇 |
石油天然气 | 37篇 |
无线电 | 983篇 |
一般工业技术 | 1258篇 |
冶金工业 | 2386篇 |
原子能技术 | 167篇 |
自动化技术 | 9465篇 |
出版年
2023年 | 34篇 |
2022年 | 72篇 |
2021年 | 127篇 |
2020年 | 85篇 |
2019年 | 120篇 |
2018年 | 103篇 |
2017年 | 104篇 |
2016年 | 101篇 |
2015年 | 98篇 |
2014年 | 352篇 |
2013年 | 465篇 |
2012年 | 937篇 |
2011年 | 3358篇 |
2010年 | 1361篇 |
2009年 | 1219篇 |
2008年 | 959篇 |
2007年 | 856篇 |
2006年 | 680篇 |
2005年 | 798篇 |
2004年 | 720篇 |
2003年 | 757篇 |
2002年 | 471篇 |
2001年 | 140篇 |
2000年 | 146篇 |
1999年 | 213篇 |
1998年 | 641篇 |
1997年 | 406篇 |
1996年 | 298篇 |
1995年 | 162篇 |
1994年 | 153篇 |
1993年 | 161篇 |
1992年 | 79篇 |
1991年 | 87篇 |
1990年 | 70篇 |
1989年 | 79篇 |
1988年 | 95篇 |
1987年 | 63篇 |
1986年 | 69篇 |
1985年 | 77篇 |
1984年 | 104篇 |
1983年 | 71篇 |
1982年 | 62篇 |
1981年 | 70篇 |
1980年 | 62篇 |
1979年 | 59篇 |
1978年 | 55篇 |
1977年 | 91篇 |
1976年 | 150篇 |
1974年 | 48篇 |
1973年 | 42篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Pedro SánchezAuthor Vitae Manuel JiménezAuthor VitaeFrancisca RosiqueAuthor Vitae Bárbara ÁlvarezAuthor VitaeAndrés IborraAuthor Vitae 《Journal of Systems and Software》2011,84(6):1008-1021
This article presents an integrated framework for the development of home automation systems following the model-driven approach. By executing model transformations the environment allows developers to generate executable code for specific platforms. The tools presented in this work help developers to model home automation systems by means of a domain specific language which is later transformed into code for home automation specific platforms. These transformations have been defined by means of graph grammars and template engines extended with traceability capabilities. Our framework also allows the models to be reused for different applications since a catalogue of requirements is provided. This framework enables the development of home automation applications with techniques for improving the quality of both the process and the models obtained. In order to evaluate the benefits of the approach, we conducted a survey among developers that used the framework. The analysis of the outcome of this survey shows which conditions should be fulfilled in order to increase reusability. 相似文献
992.
993.
994.
D.R.W. HoltonAuthor Vitae M. YounasAuthor Vitae 《Journal of Systems and Software》2011,84(8):1373-1378
Web portals work as a point of access to a large volume of information on the web. This paper focuses on the performance of Web portals in an E-commerce environment which involves the processing of a large number of users’ requests. It proposes a class-based priority scheme which classifies users’ requests into high and low priorities. In E-commerce, some requests (e.g. buy) are generally considered more important than others (e.g. search or browse). We contend that the requests received from a Web portal should generally get higher priority as such requests are more likely to lead to purchases. We believe that assigning such priorities at multiple service levels can improve the performance of Web portals’ requests of higher priority. The proposed scheme is formally specified and implemented, and performance results are obtained and compared to a server that does not prioritise requests. The results show significant performance improvements in the processing of high priority requests. 相似文献
995.
Tao-Ku ChangAuthor Vitae Gwan-Hwan HwangAuthor Vitae 《Journal of Systems and Software》2011,84(8):1292-1305
XQuery is a query and functional programming language that is designed for querying the data in XML documents. This paper addresses how to efficiently query encrypted XML documents using XQuery, with the key point being how to eliminate redundant decryption so as to accelerate the querying process. We propose a processing model that can automatically translate the XQuery statements for encrypted XML documents. The implementation and experimental results demonstrate the practicality of the proposed model. 相似文献
996.
Ching-Nung YangAuthor Vitae Yu-Ying ChuAuthor Vitae 《Journal of Systems and Software》2011,84(10):1726-1733
A novel (k, n) scalable secret image sharing (SSIS) scheme was proposed to encrypt a secret image into n shadow images. One can gradually reconstruct a secret image by stacking k or more shadows, but he/she cannot conjecture any information from fewer than k shadows. The advantage of a (k, n)-SSIS scheme is that it provides the threshold property (i.e., k is a threshold value necessary to start in to reveal the secret) as well as the scalability (i.e., the information amount of a reconstructed secret is proportional to the number of shadows used in decryption). All previous (k, n)-SSIS schemes did not have the smooth scalability so that the information amount can be “smoothly” proportional to the number of shadows. In this paper, we consider the smooth scalability in (k, n)-SSIS scheme. 相似文献
997.
998.
Faramarz Safi EsfahaniAuthor Vitae Masrah Azrifah Azmi MuradAuthor Vitae 《Journal of Systems and Software》2011,84(10):1591-1617
In the Service Oriented Architecture (SOA), BPEL specified business processes are executed by non-scalable centralized orchestration engines. In order to address the scalability issue, decentralized orchestration engines are applied, which decentralize BPEL processes into static fragments at design time without considering runtime requirements. The fragments are then encapsulated into runtime components such as agents. There are a variety of attitudes towards workflow decentralization; however, only a few of them produce adaptable fragments with runtime environment. In this paper, producing runtime adaptable fragments is presented in two aspects. The first one is frequent-path adaptability that is equal to finding closely interrelated activities and encapsulating them in the same fragment to omit the communication cost of the activities. Another aspect is proportional-fragment adaptability, which is analogous to the proportionality of produced fragments with number of workflow engine machines. It extenuates the internal communication among the fragments on the same machine. An ever-changing runtime environment along with the mentioned adaptability aspects may result in producing a variety of process versions at runtime. Thus, an Adaptable and Decentralized Workflow Execution Framework (ADWEF) is introduced that proposes an abstraction of adaptable decentralization in the SOA orchestration layer. Furthermore, ADWEF architectures Type-1 and Type-2 are presented to support the execution of fragments created by two decentralization methods, which produce customized fragments known as Hierarchical Process Decentralization (HPD) and Hierarchical Intelligent Process Decentralization (HIPD). However, mapping the current system conditions to a suitable decentralization method is considered as future work. Evaluations of the ADWEF decentralization methods substantiate both adaptability aspects and demonstrate a range of improvements in response-time, throughput, and bandwidth-usage compared to previous methods. 相似文献
999.
Ali A. PouyanAuthor Vitae Heydar Toossian ShandizAuthor VitaeSoheil ArastehfarAuthor Vitae 《Computers in Industry》2011,62(5):501-508
Petri nets have been recognised as a high level formal and graphical specification language for modelling, analysis, and control of concurrent asynchronous distributed systems. This paper presents a PN model, synthesised by an extended version of the knitting synthesis technique. This method, as an incremental design approach, establishes the conditions under which the fundamental behavioural properties of the synthesised systems are fulfilled and preserved. That is, the synthesised models are live, bounded, and reversible (cyclic). A Petri net with the aforementioned properties is called a well-behaved Petri net system which is guaranteed to operate in a deadlock-free, stable, and cyclic fashion. Well-behaved Petri net models, synthesised using the proposed method can be compiled into control codes and implemented as real-time controllers for flexible manufacturing systems. The significance of this paper is due to the application of an extended version of knitting synthesis technique to a real life example of a flexible manufacturing system. 相似文献
1000.
Karim JaballiAuthor Vitae Alain BellaciccoAuthor VitaeJamel LouatiAuthor Vitae Alain RiviereAuthor VitaeMohamed HaddarAuthor Vitae 《Computers in Industry》2011,62(5):541-554
During the production of new part in an industrial environment, it results in a high percentage of scrap if manufacturing planning is not carried out properly. One of the major factors responsible for this phenomenon is tolerance synthesis. In this paper, we deal with tolerance synthesis, and especially tolerance type identified after transfer. An algorithmic Rational method for 3D Manufacturing Tolerancing Synthesis (R3DMTSyn), which is based on the use of the Technologically and Topologically Related Surface (TTRS) rules, is developed. The TTRS concept helps to generate only the necessary manufacturing specification needed to guarantee the respect of the functional specification studied.The manufacturing project is modeled by a graphical representation called the SPIDER GRAPH. With the SPIDER GRAPH, all active surfaces can be detected (machined and positioning surfaces), so it is possible to identify the location of the functional surfaces used in each functional specification. The construction or the determination of the tolerancing torsor, belonging to each active surface, contributes to the selection of the adequate case of associations. A semantic study is already done to identify all possible combinations or associations needed to locate surfaces during each phases.Finally, referring to the developed TTRS_Cars_Process and in every phase, one or more manufacturing specifications are generated until finishing the treatment of all surfaces (surface belonging to the functional condition, or intermediate surfaces). 相似文献