全文获取类型
收费全文 | 8532篇 |
免费 | 405篇 |
国内免费 | 412篇 |
专业分类
电工技术 | 520篇 |
综合类 | 140篇 |
化学工业 | 188篇 |
金属工艺 | 101篇 |
机械仪表 | 398篇 |
建筑科学 | 258篇 |
矿业工程 | 57篇 |
能源动力 | 399篇 |
轻工业 | 124篇 |
水利工程 | 29篇 |
石油天然气 | 16篇 |
武器工业 | 32篇 |
无线电 | 800篇 |
一般工业技术 | 751篇 |
冶金工业 | 32篇 |
原子能技术 | 30篇 |
自动化技术 | 5474篇 |
出版年
2024年 | 11篇 |
2023年 | 73篇 |
2022年 | 94篇 |
2021年 | 121篇 |
2020年 | 204篇 |
2019年 | 196篇 |
2018年 | 242篇 |
2017年 | 300篇 |
2016年 | 307篇 |
2015年 | 274篇 |
2014年 | 455篇 |
2013年 | 855篇 |
2012年 | 310篇 |
2011年 | 491篇 |
2010年 | 346篇 |
2009年 | 374篇 |
2008年 | 462篇 |
2007年 | 507篇 |
2006年 | 487篇 |
2005年 | 475篇 |
2004年 | 432篇 |
2003年 | 409篇 |
2002年 | 330篇 |
2001年 | 250篇 |
2000年 | 193篇 |
1999年 | 221篇 |
1998年 | 147篇 |
1997年 | 153篇 |
1996年 | 104篇 |
1995年 | 98篇 |
1994年 | 81篇 |
1993年 | 61篇 |
1992年 | 40篇 |
1991年 | 44篇 |
1990年 | 32篇 |
1989年 | 20篇 |
1988年 | 21篇 |
1987年 | 17篇 |
1986年 | 18篇 |
1985年 | 18篇 |
1984年 | 17篇 |
1983年 | 11篇 |
1982年 | 7篇 |
1981年 | 9篇 |
1980年 | 9篇 |
1979年 | 5篇 |
1978年 | 7篇 |
1977年 | 9篇 |
1976年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有9349条查询结果,搜索用时 15 毫秒
101.
In traditional networks special efforts are put to secure the perimeter with firewalls: particular routers that analyze and filter the traffic to separate zones with different levels of trust. In wireless multi-hop networks the perimeter is a concept extremely hard to identify, thus, it is much more effective to enforce control on the nodes that will route more traffic. But traffic filtering and traffic analysis are costly activities for the limited resources of mesh nodes, so a trade-off must be reached limiting the number of nodes that enforce them. This work shows how, using the OLSR protocol, the centrality of groups of nodes with reference to traffic can be estimated with high accuracy independently of the network topology or size. We also show how this approach greatly limits the impact of an attack to the network using a number of firewalls that is only a fraction of the available nodes. 相似文献
102.
《Pattern recognition》2014,47(2):588-602
Fingerprint matching has emerged as an effective tool for human recognition due to the uniqueness, universality and invariability of fingerprints. Many different approaches have been proposed in the literature to determine faithfully if two fingerprint images belong to the same person. Among them, minutiae-based matchers highlight as the most relevant techniques because of their discriminative capabilities, providing precise results. However, performing a fingerprint identification over a large database can be an inefficient task due to the lack of scalability and high computing times of fingerprint matching algorithms.In this paper, we propose a distributed framework for fingerprint matching to tackle large databases in a reasonable time. It provides a general scheme for any kind of matcher, so that its precision is preserved and its time of response can be reduced.To test the proposed system, we conduct an extensive study that involves both synthetic and captured fingerprint databases, which have different characteristics, analyzing the performance of three well-known minutiae-based matchers within the designed framework. With the available hardware resources, our distributed model is able to address up to 400 000 fingerprints in approximately half a second. Additional details are provided at http://sci2s.ugr.es/ParallelMatching. 相似文献
103.
As additive manufacturing (AM) evolves to become a common method of producing final parts, further study of this computer integrated technology is necessary. The purpose of this research is to evaluate the potential impact of additive manufacturing improvements on the configuration of spare parts supply chains. This goal has been accomplished through scenario modeling of a real-life spare parts supply chain in the aeronautics industry. The spare parts supply chain of the F-18 Super Hornet fighter jet was selected as the case study because the air-cooling ducts of the environmental control system are produced using AM technology. In total, four scenarios are investigated that vary the supply chain configurations and additive manufacturing machine specifications. The reference scenario is based on the spare parts supplier's current practice and the possible future decentralization of production and likely improvements in AM technology. Total operating cost, including downtime cost, is used to compare the scenarios. We found that using current AM technology, centralized production is clearly the preferable supply chain configuration in the case example. However, distributed spare parts production becomes practical as AM machines become less capital intensive, more autonomous and offer shorter production cycles. This investigation provides guidance for the development of additive manufacturing machines and their possible deployment in spare parts supply chains. This study contributes to the emerging literature on AM deployment in supply chains with a real-world case setting and scenario model illustrating the cost trade-offs and critical requirements for technology development. 相似文献
104.
Geographically distributed cloud platforms enable an attractive approach to large-scale content delivery. Storage at various sites can be dynamically acquired from (and released back to) the cloud provider so as to support content caching, according to the current demands for the content from the different geographic regions. When storage is sufficiently expensive that not all content should be cached at all sites, two issues must be addressed: how should requests for content be routed to the cloud provider sites, and what policy should be used for caching content using the elastic storage resources obtained from the cloud provider. Existing approaches are typically designed for non-elastic storage and little is known about the optimal policies when minimizing the delivery costs for distributed elastic storage.In this paper, we propose an approach in which elastic storage resources are exploited using a simple dynamic caching policy, while request routing is updated periodically according to the solution of an optimization model. Use of pull-based dynamic caching, rather than push-based placement, provides robustness to unpredicted changes in request rates. We show that this robustness is provided at low cost. Even with fixed request rates, use of the dynamic caching policy typically yields content delivery cost within 10% of that with the optimal static placement. We compare request routing according to our optimization model to simpler baseline routing policies, and find that the baseline policies can yield greatly increased delivery cost relative to optimized routing. Finally, we present a lower-cost approximate solution algorithm for our routing optimization problem that yields content delivery cost within 2.5% of the optimal solution. 相似文献
105.
In the last years focus has been put in the development of distributed Model Predictive Control (MPC) algorithms. With a few exceptions, they have been mostly developed in the discrete-time framework. However, discretization of large-scale systems may destroy the sparsity of the original continuous-time models, making distributed control design and implementation more difficult. Also, more in general, discrete-time control of continuous-time systems does not allow to consider the process inter-sampling behavior. In this paper we present a novel non-cooperative distributed predictive control algorithm for continuous-time systems based on robust MPC concepts. The convergence properties of the proposed control scheme are stated, and its realizability is tested through a simulation case study. 相似文献
106.
It has been recently shown in Ren et al. (2010) that by collecting noise-contaminated time series generated by a coupled-oscillator system at each node of a network, it is possible to robustly reconstruct its topology, i.e. determine the graph Laplacian. Restricting ourselves to linear consensus dynamics over undirected communication networks, in this paper we introduce a new dynamic average consensus least-squares algorithm to locally estimate these time series at each node, thus making the reconstruction process fully distributed and more easily applicable in the real world. We also propose a novel efficient method for separating the off-diagonal entries of the reconstructed Laplacian, and examine several concepts related to the trace of the dynamic correlation matrix of the coupled single integrators, which is a distinctive element of our network reconstruction method. The theory is illustrated with examples from computer, power and transportation systems. 相似文献
107.
《International journal of human-computer studies》2014,72(3):284-297
Analysis of the usability of an interactive system requires both an understanding of how the system is to be used and a means of assessing the system against that understanding. Such analytic assessments are particularly important in safety-critical systems as latent vulnerabilities may exist which have negative consequences only in certain circumstances. Many existing approaches to assessment use tasks or scenarios to provide explicit representation of their understanding of use. These normative user behaviours have the advantage that they clarify assumptions about how the system will be used but have the disadvantage that they may exclude many plausible deviations from these norms. Assessments of how a design fails to support these user behaviours can be a matter of judgement based on individual experience rather than evidence. We present a systematic formal method for analysing interactive systems that is based on constraints rather than prescribed behaviour. These constraints capture precise assumptions about what information resources are used to perform action. These resources may either reside in the system itself or be external to the system. The approach is applied to two different medical device designs, comparing two infusion pumps currently in common use in hospitals. Comparison of the two devices is based on these resource assumptions to assess consistency of interaction within the design of each device. 相似文献
108.
Selection of strategies that help reduce riverine inputs requires numerical models that accurately quantify hydrologic processes. While numerous models exist, information on how to evaluate and select the most robust models is limited. Toward this end, we developed a comprehensive approach that helps evaluate watershed models in their ability to simulate flow regimes critical to downstream ecosystem services. We demonstrated the method using the Soil and Water Assessment Tool (SWAT), the Hydrological Simulation Program–FORTRAN (HSPF) model, and Distributed Large Basin Runoff Model (DLBRM) applied to the Maumee River Basin (USA). The approach helped in identifying that each model simulated flows within acceptable ranges. However, each was limited in its ability to simulate flows triggered by extreme weather events, owing to algorithms not being optimized for such events and mismatched physiographic watershed conditions. Ultimately, we found HSPF to best predict river flow, whereas SWAT offered the most flexibility for evaluating agricultural management practices. 相似文献
109.
《Journal of Systems Architecture》2014,60(2):221-233
Software-based reconfiguration of distributed real-time systems is a complex problem with many sides to it ranging from system-wide concerns down to the intrinsic non-robust nature of the specific middleware layer and the used programming techniques. In a completely open distributed system, mixing reconfiguration and real-time is not possible; the set of possible target states can be very large threatening the temporal predictability of the reconfiguration process. Over the last years, middle ware solutions have appeared mainly for general purpose systems where efficient state transitions are sought for, but real-time properties are not considered. One of the few contributions to run-time software reconfiguration in distributed real-time environments has been the iLAND middleware, where the germ of a solution with high potential has been conceived and delivered in practice.1 The key idea has been the fact that a set of bounds and limitations to the structure of systems and to their open nature needs to be imposed in order to come up with practical solutions. In this paper, the authors present the different sides of the problem of software reconfiguration from two complementary middleware perspectives comparing two strategies built inside distribution middleware. We highlight the lessons learned in the iLAND project aimed at service-based reconfiguration and compare it to our experience in the development of distributed real-time Java reconfiguration based on distributed tasks rescheduling. Authors also provide a language view of both solutions. Lastly, empirical results are shown that validate these solutions and compare them on the basis of different programming language realizations. 相似文献
110.
The novel distributed mobility management trend is a promising direction to cope with the increasing mobile data traffic and flatten network architectures. Most of the novel mobility approaches distribute the mobility anchors through the access level, as opposed to the centralized mobility anchoring model. Other recent approaches argue that mobility anchors closer to the content servers may be the solution to optimize the mobility performance. However, none of the mobility anchoring models is ideal for all scenarios, since it depends on the user, the session and the network. Hence, we propose an IP mobility approach driven by the context of the user, sessions and the network, where the mobility anchors for IP address allocation and for routing/forwarding are distributed through the network nodes, while the mobility context is managed by the mobile devices. Although each session is properly anchored in the establishment phase, the routing/forwarding is adapted over time, according to the user, the session and the network context: the proposed approach is able to signal different mobility anchors to optimize the routing path to new and ongoing sessions of the user. The outcome of the evaluation shows that the proposed approach overall reduces the data cost, the data delay, the tunneled packets and the tunnel length, when compared with other anchoring models. 相似文献