全文获取类型
收费全文 | 29026篇 |
免费 | 1425篇 |
国内免费 | 353篇 |
专业分类
电工技术 | 819篇 |
技术理论 | 2篇 |
综合类 | 2726篇 |
化学工业 | 1251篇 |
金属工艺 | 253篇 |
机械仪表 | 454篇 |
建筑科学 | 19047篇 |
矿业工程 | 531篇 |
能源动力 | 1009篇 |
轻工业 | 571篇 |
水利工程 | 337篇 |
石油天然气 | 184篇 |
武器工业 | 52篇 |
无线电 | 597篇 |
一般工业技术 | 1410篇 |
冶金工业 | 303篇 |
原子能技术 | 70篇 |
自动化技术 | 1188篇 |
出版年
2024年 | 61篇 |
2023年 | 205篇 |
2022年 | 506篇 |
2021年 | 507篇 |
2020年 | 549篇 |
2019年 | 427篇 |
2018年 | 360篇 |
2017年 | 588篇 |
2016年 | 656篇 |
2015年 | 828篇 |
2014年 | 3313篇 |
2013年 | 1824篇 |
2012年 | 2140篇 |
2011年 | 2224篇 |
2010年 | 1901篇 |
2009年 | 2039篇 |
2008年 | 1805篇 |
2007年 | 2091篇 |
2006年 | 1544篇 |
2005年 | 1351篇 |
2004年 | 1117篇 |
2003年 | 937篇 |
2002年 | 779篇 |
2001年 | 719篇 |
2000年 | 533篇 |
1999年 | 496篇 |
1998年 | 314篇 |
1997年 | 236篇 |
1996年 | 194篇 |
1995年 | 127篇 |
1994年 | 96篇 |
1993年 | 89篇 |
1992年 | 64篇 |
1991年 | 44篇 |
1990年 | 27篇 |
1989年 | 14篇 |
1988年 | 10篇 |
1987年 | 20篇 |
1986年 | 9篇 |
1985年 | 15篇 |
1984年 | 7篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 21篇 |
1979年 | 2篇 |
1975年 | 2篇 |
1954年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Ultrasonic sensors have been widely applied in mobile robots to obtain environmental information and avoid obstacles. In general, a typical domestic environment consists of planes, edges and corners. It is usually difficult to distinguish a plane from a corner directly with a single ultrasonic sensor. To overcome this difficulty, a corner differentiation algorithm for a single ultrasonic sensor is proposed in this paper. The algorithm is based on the features of all of the actual reflection points from the environment obtained by a reflection search algorithm from which the corners are realized by a corner differentiation algorithm. The experimental results show that the developed algorithm can successfully detect all planes and corners. Furthermore, an environmental map can be built based on the information obtained on planes and corners. Copyright © 2008 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
82.
83.
An accurate and compact map is essential to an autonomous mobile robot system. A topological map, one of the most popular
map types, can be used to represent the environment in terms of discrete nodes with edges connecting them. It is usually constructed
by Voronoi-like graphs, but in this paper the topological map is incrementally built based on the local grid map by using
a thinning algorithm. This algorithm, when combined with the application of the C-obstacle, can easily extract only the meaningful
topological information in real-time and is robust to environment change, because this map is extracted from a local grid
map generated based on the Bayesian update formula. In this paper, position probability is defined to evaluate the quantitative
reliability of the end node extracted by the thinning process. Since the thinning process builds only local topological maps,
a global topological map should be constructed by merging local topological maps according to nodes with high position probability.
For real and complex environments, experiments showed that the proposed map building method based on the thinning process
can accurately build a local topological map in real-time, with which an accurate global topological map can be incrementally
constructed. 相似文献
84.
工艺设计知识库的建造与维护 总被引:5,自引:0,他引:5
肖伟跃 《计算机工程与设计》2001,22(2):77-80
文中根据工艺设计知识的特点,构造了层次化的知识表达、组织与知识库模型,分析了工艺知识库不一致的表现形式,并给出了相应的一致性验证算法,提出了基于广义决策表的知识库完备性检查方法。 相似文献
85.
86.
针对目前智能建筑中几种常见的中央空调机组单元配置及其运行机制,简要分析了采用网络化数字监控技术的空调机组的工作原理,并说明了此类空调配置方案的控制系统结构及其性能特点和应用场合。 相似文献
87.
The emerging multi-layer functional model for network operations decomposes management functions into several layers:Service Management Layer, Network Management Layer, Element Management Layer, andElement Layer. To realize the full benefits of this functional distribution, a reference architecture for operations applications is needed. This architecture should enable flexible placement of functions in computing systems or nodes, enable hiding of the complexities of distribution from applications, and prescribe principles for the specification of application interfaces to facilitate application interoperability. This paper describes such a framework architecture. In this framework, applications are deployed in software units calledbuilding blocks, each of which is independently installed and administered. Building blocks interact via interfaces calledcontracts. A contract is an open interface that is specified according to some principles, such as adherence to standard communication paradigms, separation of engineering aspects from functional aspects, and support for previous interface versions. The infrastructure, called theDistributed Processing Environment (DPE), provides communication and security services that enable building blocks to interact via contracts. The DPE provides access and location transparency to applications. The paper presents details of this architecture framework and an example to illustrate specification of contracts for network management functions. 相似文献
88.
Green sand moulding machines for cast iron foundries are presently unable to uniquely identify individual castings. An insert tool concept is developed and tested via incremental mock-up development. The tool is part of the pattern plate and changes shape between each moulding, thus giving each mould a unique ID by embossing a Data Matrix symbol into the sand. In the process of producing the mould, each casting can be given a unique (DPM), enabling part tracking throughout the casting's life cycle. Sand embossing is achieved with paraffin-actuated reconfigurable pin-type tooling under simulated processing conditions. The marker geometry limitations have been tested using static symbol patterns, both for sand embossing and actual casting marking. The marked castings have successfully been identified with decoding software. The study shows that the function of each element of this technology can be successfully applied within the foundry industry. 相似文献
89.
Distributed computing for carbon footprint reduction by exploiting low-footprint energy availability
Ward Van HeddeghemAuthor Vitae Willem VereeckenAuthor VitaeDidier ColleAuthor Vitae Mario PickavetAuthor VitaePiet DemeesterAuthor Vitae 《Future Generation Computer Systems》2012,28(2):405-414
Low carbon footprint energy sources such as solar and wind power typically suffer from unpredictable or limited availability. By globally distributing a number of these renewable sources, these effects can largely be compensated for. We look at the feasibility of this approach for powering already distributed data centers in order to operate at a reduced total carbon footprint. From our study we show that carbon footprint reductions are possible, but that these are highly dependent on the approach and parameters involved. Especially the manufacturing footprint and the geographical region are critical parameters to consider. Deploying additional data centers can help in reducing the total carbon footprint, but substantial reductions can be achieved when data centers with nominal capacity well below maximum capacity redistribute processing to sites based on renewable energy availability. 相似文献
90.
Jianxin LiAuthor Vitae Bo LiAuthor Vitae K.P. LamAuthor Vitae 《Future Generation Computer Systems》2012,28(2):379-390
As the sizes of IT infrastructure continue to grow, cloud computing is a natural extension of virtualisation technologies that enable scalable management of virtual machines over a plethora of physically connected systems. The so-called virtualisation-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasise the construction and deployment of scalable, energy-efficient network software applications (NetApp) by virtue of improved utilisation of the underlying resources. The latter is typically achieved through increased sharing of hardware and data in a multi-tenant cloud architecture/environment and, as such, accentuates the critical requirement for enhanced security services as an integrated component of the virtual infrastructure management strategy. This paper analyses the key security challenges faced by contemporary green cloud computing environments, and proposes a virtualisation security assurance architecture, CyberGuarder, which is designed to address several key security problems within the ‘green’ cloud computing context. In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service. Specifically, the proposed virtual machine security service incorporates a number of new techniques which include (1) a VMM-based integrity measurement approach for NetApp trusted loading, (2) a multi-granularity NetApp isolation mechanism to enable OS user isolation, and (3) a dynamic approach to virtual machine and network isolation for multiple NetApp’s based on energy-efficiency and security requirements. Secondly, a virtual network security service has been developed successfully to provide an adaptive virtual security appliance deployment in a NetApp execution environment, whereby traditional security services such as IDS and firewalls can be encapsulated as VM images and deployed over a virtual security network in accordance with the practical configuration of the virtualised infrastructure. Thirdly, a security service providing policy based trust management is proposed to facilitate access control to the resources pool and a trust federation mechanism to support/optimise task privacy and cost requirements across multiple resource pools. Preliminary studies of these services have been carried out on our iVIC platform, with promising results. As part of our ongoing research in large-scale, energy-efficient/green cloud computing, we are currently developing a virtual laboratory for our campus courses using the virtualisation infrastructure of iVIC, which incorporates the important results and experience of CyberGuarder in a practical context. 相似文献