全文获取类型
收费全文 | 9362篇 |
免费 | 10篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 136篇 |
综合类 | 1篇 |
化学工业 | 311篇 |
金属工艺 | 282篇 |
机械仪表 | 47篇 |
建筑科学 | 33篇 |
能源动力 | 53篇 |
轻工业 | 51篇 |
水利工程 | 1篇 |
石油天然气 | 14篇 |
无线电 | 298篇 |
一般工业技术 | 135篇 |
冶金工业 | 41篇 |
原子能技术 | 99篇 |
自动化技术 | 7872篇 |
出版年
2023年 | 3篇 |
2022年 | 10篇 |
2021年 | 7篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 8篇 |
2017年 | 5篇 |
2016年 | 26篇 |
2015年 | 9篇 |
2014年 | 221篇 |
2013年 | 187篇 |
2012年 | 783篇 |
2011年 | 2304篇 |
2010年 | 1123篇 |
2009年 | 949篇 |
2008年 | 681篇 |
2007年 | 590篇 |
2006年 | 457篇 |
2005年 | 580篇 |
2004年 | 523篇 |
2003年 | 583篇 |
2002年 | 276篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 8篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有9374条查询结果,搜索用时 15 毫秒
991.
João Gustavo PrudêncioAuthor Vitae Leonardo MurtaAuthor Vitae 《Journal of Systems and Software》2012,85(2):277-289
Mechanisms to control concurrent access over project artefacts are needed to execute the software development process in an organized way. These mechanisms are implemented by concurrency control policies in version control systems that may inhibit (i.e. ‘to lock’) or allow (i.e., ‘not to lock’) parallel development. This work presents a novel approach named Orion that analyzes the project's historical changes and suggests the most appropriate concurrency control policy for each software element. This suggestion aims at minimizing conflict situations and thus improving the productivity of the development team. In addition, it identifies critical elements that do not work well with any of these policies and are candidates to refactoring. We evaluated Orion through two experimental studies and the results, which indicated it was effective, led us to a prototype implementation. Apart from the Orion approach this paper also presents the planning, execution, and analysis stages of the evaluation, and details of prototype internals. 相似文献
992.
Reducing congestion in bulk-service finite-buffer queueing system using batch-size-dependent service
In the design and analysis of any queueing system, one of the main objectives is to reduce congestion which can be achieved by controlling either arrival-rates or service-rates. This paper adopts the latter approach and analyzes a single-server finite-buffer queue where customers arrive according to the Poisson process and are served in batches of minimum size a with a maximum threshold limit b. The service times of the batches are arbitrarily distributed and depends on the size of the batches undergoing service. We obtain the joint distribution of the number of customers in the queue and the number with the server, and distributions of the number of customers in the queue, in the system, and the number with the server. Various performance measures such as the average number of customers in the queue (system) and with the server etc. are obtained. Several numerical results are presented in the form of tables and graphs and it is observed that batch-size-dependent service rule is more effective in reducing the congestion as compared to the one when service rates of the batches remain same irrespective of the size of the batch. This model has potential application in manufacturing, computer-communication network, telecommunication systems and group testing. 相似文献
993.
Michael MaurerAuthor Vitae Vincent C. EmeakarohaAuthor Vitae 《Future Generation Computer Systems》2012,28(1):39-47
Due to the large variety in computing resources and, consequently, the large number of different types of service level agreements (SLAs), computing resource markets face the problem of a low market liquidity. Restricting the number of different resource types to a small set of standardized computing resources seems to be the appropriate solution to counteract this problem. Standardized computing resources are defined through an SLA template. An SLA template defines the structure of an SLA, the service attributes, the names of the service attributes, and the service attribute values. However, since existing research results have only introduced static SLA templates so far, the SLA templates cannot reflect changes in user needs and market structures. To address this shortcoming, we present a novel approach of adaptive SLA matching. This approach adapts SLA templates based on SLA mappings of users. It allows Cloud users to define mappings between a public SLA template, which is available in the Cloud market, and their private SLA templates, which are used for various in-house business processes of the Cloud user. Besides showing how public SLA templates are adapted to the demand of Cloud users, we also analyze the costs and benefits of this approach. Costs are incurred every time a user has to define a new SLA mapping to a public SLA template due to its adaptation. In particular, we investigate how the costs differ with respect to the public SLA template adaptation method. The simulation results show that the use of heuristics within adaptation methods allows balancing the costs and benefits of the SLA mapping approach. 相似文献
994.
Gregory S. LeeAuthor Vitae Bhavani ThuraisinghamAuthor Vitae 《Computer Standards & Interfaces》2012,34(1):225-229
Researchers in telesurgical robotics and security collaborated to develop the Secure ITP, a security enhancement to the Interoperable Telesurgery Protocol (ITP). The ITP defines the structure for communication between telesurgery robots and controllers and has been adopted and tested by fourteen research groups in telesurgical robotics. The Secure ITP uses open source software tools and follows guidelines in Federal Information Processing Standards (FIPS) documents published by the National Institute of Standards and Technology (NIST) to create asecurity enhancement prototype for demonstration purposes and tofacilitate the development of new security technologies which addressthe stringent requirements of telesurgery. 相似文献
995.
C. DorofteiAuthor Vitae P.D. PopaAuthor VitaeF. IacomiAuthor Vitae 《Sensors and actuators. A, Physical》2012,173(1):24-29
In the present work, we report the results of the influence of the Ni ions which partly substitute the Ba ions in the barium stannate (Ba1−xNixSnO3, where x = 0; 0.1; 0.2; 0.5), on the structural and electronic properties, as well as on the sensitivity to humidity. With the view to obtain a porous and finer structure, thus providing a high specific surface, these materials were obtained through the precursor method of self-combustion (co-precipitation in a colloidal environment and self-combustion), followed by heat treatments. The phase composition and morphology were studied by XRD and SEM. The pure sample, as well as that with the substitution x = 0.1, are single phased after 40 min sintering at 1000 °C. For substitutions with x > 0.1 secondary phases appear, which favorably influence the humidity sensitivity. All the samples show a significant sensitivity to humidity within 22% RH and 75% RH for the substitution with x = 0 and 0.1, and 22% RH - 98% RH for the substitution with x = 0.5. For this interval, the material resistivity logarithmically decreases by over four orders. The sample with the substitution x = 0.5 is characterized by a very fine structure (∼250 nm) and a high effective porosity (47%). This sample presents a shorter absorption response time than the other samples. Its high sensitivity, its sensitivity range, linearity of the sensitivity characteristic and the quick response time recommend the material with the composition Ba0.5Ni0.5SnO3 for the realization of a very good resistive humidity sensor. 相似文献
996.
Koyo WatanabeAuthor Vitae 《Sensors and actuators. A, Physical》2012,173(1):36-40
A sensitivity optimization method for the detection of an intermediate layer using a surface plasmon sensor is presented. The dependence of detection sensitivity on distance from the metal surface and the average refractive index over the sensing region are considered. Based on the calculated results, the sensitivity for detecting an intermediate layer in a multilayered sample is determined by varying the refractive index and thickness of each layer. It is shown that, in particular cases, controlling the refractive index and thickness increases the detection sensitivity. The proposed method is useful for designing multilayered samples. 相似文献
997.
Amit GaurAuthor Vitae Abhinav PrakashAuthor VitaeSaugat JoshiAuthor Vitae Dharma P. Agrawal 《Journal of Parallel and Distributed Computing》2010
The varying degree of mobility of Mesh Clients has provided much more flexibility in Wireless Mesh Networks, and establishing an Authentic Association among entities is a non-trivial problem. In this paper, we introduce a Polynomial Based scheme which provides pair-wise connectivity, low communication, marginal storage overhead and high scalability while making on the fly Authentic Association feasible. The proposed scheme is also observed to be resilient against both traffic analysis and node capture attacks. 相似文献
998.
Ahmet Zengin Author Vitae 《Information Sciences》2011,181(5):1028-1043
Scalability in simulation tools is one of the most important traits to measure performance of software. The reason is that today’s Internet is the main instance of a large-scale and highly complex system. Simulation of Internet-scale network systems has to be supported by any simulation tool. Despite this fact, many network simulators lacks support for building large models. In this work, in order to propose a new approach for scalability issue in network simulation tools, a network simulator is developed based on behavior of honeybees and high performance DEVS, modular and hierarchical system theoretic approach. A biologically-inspired discrete event modeling approach is described for studying networks’ scalability and performance traits. Since natural systems can offer important concepts for modeling network systems, key adaptive and emergent attributes of honeybees and their societal properties are incorporated into a set of simulation models that are developed using the discrete event system specification approach. Large-scale network models are simulated and evaluated to show the benefits of nature-inspired network models. 相似文献
999.
Elnaz Barshan Author Vitae Mansoor Zolghadri Jahromi Author Vitae 《Pattern recognition》2011,44(7):1357-1371
We propose “supervised principal component analysis (supervised PCA)”, a generalization of PCA that is uniquely effective for regression and classification problems with high-dimensional input data. It works by estimating a sequence of principal components that have maximal dependence on the response variable. The proposed supervised PCA is solvable in closed-form, and has a dual formulation that significantly reduces the computational complexity of problems in which the number of predictors greatly exceeds the number of observations (such as DNA microarray experiments). Furthermore, we show how the algorithm can be kernelized, which makes it applicable to non-linear dimensionality reduction tasks. Experimental results on various visualization, classification and regression problems show significant improvement over other supervised approaches both in accuracy and computational efficiency. 相似文献
1000.
The current discriminant analysis method design is generally independent of classifiers, thus the connection between discriminant analysis methods and classifiers is loose. This paper provides a way to design discriminant analysis methods that are bound with classifiers. We begin with a local mean based nearest neighbor (LM-NN) classifier and use its decision rule to supervise the design of a discriminator. Therefore, the derived discriminator, called local mean based nearest neighbor discriminant analysis (LM-NNDA), matches the LM-NN classifier optimally in theory. In contrast to that LM-NNDA is a NN classifier induced discriminant analysis method, we further show that the classical Fisher linear discriminant analysis (FLDA) is a minimum distance classifier (i.e. nearest Class-mean classifier) induced discriminant analysis method. The proposed LM-NNDA method is evaluated using the CENPARMI handwritten numeral database, the NUST603 handwritten Chinese character database, the ETH80 object category database and the FERET face image database. The experimental results demonstrate the performance advantage of LM-NNDA over other feature extraction methods with respect to the LM-NN (or NN) classifier. 相似文献