全文获取类型
收费全文 | 639篇 |
免费 | 35篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 24篇 |
综合类 | 103篇 |
化学工业 | 89篇 |
金属工艺 | 16篇 |
机械仪表 | 10篇 |
建筑科学 | 74篇 |
矿业工程 | 12篇 |
能源动力 | 19篇 |
轻工业 | 75篇 |
水利工程 | 12篇 |
石油天然气 | 40篇 |
武器工业 | 4篇 |
无线电 | 56篇 |
一般工业技术 | 19篇 |
冶金工业 | 51篇 |
原子能技术 | 3篇 |
自动化技术 | 87篇 |
出版年
2024年 | 1篇 |
2023年 | 7篇 |
2022年 | 13篇 |
2021年 | 16篇 |
2020年 | 14篇 |
2019年 | 14篇 |
2018年 | 11篇 |
2017年 | 12篇 |
2016年 | 15篇 |
2015年 | 17篇 |
2014年 | 34篇 |
2013年 | 31篇 |
2012年 | 44篇 |
2011年 | 37篇 |
2010年 | 35篇 |
2009年 | 50篇 |
2008年 | 30篇 |
2007年 | 35篇 |
2006年 | 43篇 |
2005年 | 35篇 |
2004年 | 37篇 |
2003年 | 53篇 |
2002年 | 31篇 |
2001年 | 33篇 |
2000年 | 18篇 |
1999年 | 10篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1957年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有694条查询结果,搜索用时 0 毫秒
81.
We present second steps in the construction of formal models of NAND flash memory, based on a recently emerged open standard for such devices. The model is intended as a key part of a pilot project to develop a verified file store system based on flash memory. The project was proposed by Joshi and Holzmann as a contribution to the Grand Challenge in Verified Software, and involves constructing a highly assured flash file store for use in space-flight missions. The model is at a level of abstraction that captures the internal architecture of NAND flash devices. In this paper, we focus on mechanising the state model and its initialisation operation, where most of the conceptual complexity resides. 相似文献
82.
Ben C. Juricek Dale E. Seborg Wallace E. Larimore 《Control Engineering Practice》2001,9(12):1337-1351
The Tennessee Eastman challenge process is a realistic simulation of a chemical process that has been widely used in process control studies. In this case study, several identification methods are examined and used to develop MIMO models that contain seven inputs and ten outputs. ARX and finite impulse response models are identified using reduced-rank regression techniques (PLS and CCR) and state-space models identified with prediction error methods and subspace algorithms. For a variety of reasons, the only successful models are the state-space models produced by two popular subspace algorithms, N4SID and canonical variate analysis (CVA). The CVA model is the most accurate. Important issues for identifying the Tennessee Eastman challenge process and comparisons between the subspace algorithms are also discussed. 相似文献
83.
84.
文章首先介绍基于SMS的移动电子商务工作模式和安全需求,以此提出了移动电子商务系统的总体安全架构,然后分别从终端接入层、通信链路层、网关协议层、应用服务层四个层面分析了移动电子商务常见的安全问题,最后提出了以动态口令与"挑战"文本相结合的认证方式,以Hash算法实现签名,端到端的SMS移动电子商务安全技术方案。 相似文献
85.
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
Qiqi LAI Yuan CHEN Yupu HU Baocang WANG Mingming JIANG 《Frontiers of Computer Science》2014,8(3):469-477
Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encryption, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks. 相似文献
86.
Egon Börger 《Formal Aspects of Computing》2007,19(2):225-241
We explain why for the verified software challenge proposed in Hoare (J ACM 50(1): 63–69, 2003), Hoare and Misra (Verified
software: theories, tools, experiments. Vision of a Grand Challenge project. In: [Meyer05]) to gain practical impact, one
needs to include rigorous definitions and analysis, prior to code development and comprising both experimental validation
and mathematical verification, of ground models, i.e., blueprints that describe the required application-content of programs. This implies the need to link via successive
refinements the relevant properties of such high-level models in a traceable and checkable way to code a compiler can verify.
We outline the Abstract State Machines (ASM) method, a discipline for reliable system development which allows one to bridge
the gap between informal requirements and executable code by combining application-centric experimentally validatable system modelling with mathematically verifiable stepwise detailing of abstract models to compile-time-verifiable code. 相似文献
87.
Resource discovery is one of the most important services that significantly affects the efficiency of grid computing systems. The inherent dynamic and large-scale characteristics of grid environments make their resource discovery a challenging task. In recent years, different approaches have been proposed for resource discovery, attempting to tackle the challenges of grid environments and improve the efficiency. Being aware of these challenges and approaches is worthwhile in order to choose an appropriate approach according to the application in different organizations. This study reviews the most important factors that should be considered and challenges to be tackled in order to develop an efficient grid resource discovery system. 相似文献
88.
近年来,以移动互联、云计算、数据挖掘等技术为基础的大数据技术迅猛发展,已逐渐应用到科技、信息化等各
个行业,成为驱动经济发展的重要引擎。随着教育信息化的不断深入,将新兴的大数据技术应用到教育领域已是大势所趋。
本文对大数据技术进行介绍,分析了大数据教育应用前景及风险挑战,提出可行的建议和措施,以促进大数据技术教育应用的
快速发展。 相似文献
89.
This paper presents the concept of color space normalization (CSN) and two CSN techniques, i.e., the within-color-component normalization technique (CSN-I) and the across-color-component normalization technique (CSN-II), for enhancing the discriminating power of color spaces for face recognition. Different color spaces usually display different discriminating power, and our experiments on a large scale face recognition grand challenge (FRGC) problem reveal that the RGB and XYZ color spaces are weaker than the I1I2I3, YUV, YIQ, and LSLM color spaces for face recognition. We therefore apply our CSN techniques to normalize the weak color spaces, such as the RGB and the XYZ color spaces, the three hybrid color spaces XGB, YRB and ZRG, and 10 randomly generated color spaces. Experiments using the most challenging FRGC version 2 Experiment 4 with 12,776 training images, 16,028 controlled target images, and 8,014 uncontrolled query images, show that the proposed CSN techniques can significantly and consistently improve the discriminating power of the weak color spaces. Specifically, the normalized RGB, XYZ, XGB, and ZRG color spaces are more effective than or as effective as the I1I2I3, YUV, YIQ and LSLM color spaces for face recognition. The additional experiments using the AR database validate the generalization of the proposed CSN techniques. We finally explain why the CSN techniques can improve the recognition performance of color spaces from the color component correlation point of view. 相似文献
90.
近年来,我国对外经济吸力不断增强,在华外企的作用愈来愈显重要。然而,随着全球化市场变化,外企在华出现了贸易垄断、相互结盟、资本转移、本土挖才和技术壁垒等“逆动’’行为。中国企业应通过提升国际直销经营力、外向渗透力、利用外资聚合力与知识产权创新力等核心竞争能力,实现外向经济更快发展。 相似文献