全文获取类型
收费全文 | 545篇 |
免费 | 42篇 |
专业分类
电工技术 | 18篇 |
化学工业 | 170篇 |
金属工艺 | 1篇 |
机械仪表 | 3篇 |
建筑科学 | 14篇 |
能源动力 | 23篇 |
轻工业 | 62篇 |
无线电 | 58篇 |
一般工业技术 | 102篇 |
冶金工业 | 24篇 |
自动化技术 | 112篇 |
出版年
2023年 | 7篇 |
2022年 | 6篇 |
2021年 | 9篇 |
2020年 | 15篇 |
2019年 | 10篇 |
2018年 | 15篇 |
2017年 | 15篇 |
2016年 | 18篇 |
2015年 | 23篇 |
2014年 | 38篇 |
2013年 | 28篇 |
2012年 | 35篇 |
2011年 | 29篇 |
2010年 | 29篇 |
2009年 | 37篇 |
2008年 | 31篇 |
2007年 | 27篇 |
2006年 | 24篇 |
2005年 | 19篇 |
2004年 | 17篇 |
2003年 | 16篇 |
2002年 | 19篇 |
2001年 | 12篇 |
2000年 | 8篇 |
1999年 | 11篇 |
1998年 | 14篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1980年 | 3篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有587条查询结果,搜索用时 15 毫秒
1.
The results of a comprehensive experimental program, aimed at providing a fundamental understanding of the behavior of shear-critical exterior reinforced concrete (RC) joints strengthened with fiber reinforced polymers (FRP) under simulated seismic load, are presented in this study. The role of various parameters on the effectiveness of FRP is examined through 2/3-scale testing of 18 exterior RC joints. Conclusions are drawn on the basis of certain load versus imposed displacement response characteristics, comprising the strength (maximum lateral load), the stiffness, and the cumulative energy dissipation capacity. The results demonstrate the important role of mechanical anchorages in limiting premature debonding, and they provide important information on the role of various parameters, including: area fraction of FRP; distribution of FRP between the beam and the column; column axial load; internal joint (steel) reinforcement; initial damage; carbon versus glass fibers; sheets versus strips; and effect of transverse beams. 相似文献
2.
Costas Chaikalis 《Wireless Personal Communications》2007,41(1):77-97
Reconfiguration concept represents reconfigurable functionalities of the radio interface for mobile radio systems. Particularly
for the physical layer, some possible reconfigurable architectures can be identified. We focus on outer interleaving for turbo
codes, which can improve their performance in flat Rayleigh fading environment. The larger the number of columns in the outer
interleaver, the better is the performance, but with the penalty of more complexity and delay. Furthermore, an incorrect choice
of the number of columns can increase the bit and frame error rates. Therefore, it would be advantageous to reconfigure the
outer interleaver in different operating environments with the optimum number of columns. Using two different data frame lengths,
in this contribution simulation results are presented for the four possible outer block interleaver configurations specified
for the 3GPP mobile standard in the case of flat Rayleigh fading channel. It is shown that different operating environments
require an optimum number of columns in terms of bit error rate and frame error rate performance. Finally, frame fade duration
is considered and the effect of the product of the Doppler frequency with the frame duration on the performance for the four
different 3GPP outer block interleaver configurations is discussed.
Costas Chaikalis was born in Athens, Greece, on March 7, 1973. He received the B.Sc. degree in electrical engineering in 1995 from Technological
Educational Institute of Lamia, Greece. He also received the M.Sc. and Ph.D. degrees from Department of Electronics and Telecommunications,
University of Bradford, Bradford, UK in 1999 and 2003, respectively. During his doctoral studies he worked as a Research Assistant
for Mobile Virtual Center of Excellence (Mobile VCE), Terminals Group, UK. Since 2003, he is a lecturer in the Department
of Electrical Engineering, Technological Educational Institute of Lamia, Greece. His research interests are in all areas of
mobile communications but especially in forward error correction coding, reconfigurable (software radio) architectures, cross
layer architectures and DSP applications. 相似文献
3.
JA Gogos M Morgan V Luine M Santha S Ogawa D Pfaff M Karayiorgou 《Canadian Metallurgical Quarterly》1998,95(17):9991-9996
Catechol-O-methyltransferase (COMT) is one of the major mammalian enzymes involved in the metabolic degradation of catecholamines and is considered a candidate for several psychiatric disorders and symptoms, including the psychopathology associated with the 22q11 microdeletion syndrome. By means of homologous recombination in embryonic stem cells, a strain of mice in which the gene encoding the COMT enzyme has been disrupted was produced. The basal concentrations of brain catecholamines were measured in the striatum, frontal cortex, and hypothalamus of adult male and female mutants. Locomotor activity, anxiety-like behaviors, sensorimotor gating, and aggressive behavior also were analyzed. Mutant mice demonstrated sexually dimorphic and region-specific changes of dopamine levels, notably in the frontal cortex. In addition, homozygous COMT-deficient female (but not male) mice displayed impairment in emotional reactivity in the dark/light exploratory model of anxiety. Furthermore, heterozygous COMT-deficient male mice exhibited increased aggressive behavior. Our results provide conclusive evidence for an important sex- and region-specific contribution of COMT in the maintenance of steady-state levels of catecholamines in the brain and suggest a role for COMT in some aspects of emotional and social behavior in mice. 相似文献
4.
A discrete-time, model-based output feedback control structure for nonlinear processes is developed in the present work. The structure makes use of a closed-loop observer, while at the same time it guarantees that the overall feedback controller possesses integral action. An algebraic transformation is applied on the observer states to insure that the input/output gain of the observer matches the model upon which the static state feedback control law is based. The resulting control algorithm is a two-degree-of-freedom control law, in the sense that the output and the set point are processed in different ways. The control structure is shown not only to have the same properties as the standard model-state feedback structure, but also that it emerges from a model algorithmic control framework. Finally, a simulation example using an exothermic CSTR operating at an open-loop unstable steady state is used to evaluate the closed-loop performance of the proposed method. 相似文献
5.
Vasilios Kelefouras Angeliki Kritikakou Costas Goutis 《The Journal of supercomputing》2014,68(3):1418-1440
In this paper, a new methodology for speeding up Matrix–Matrix Multiplication using Single Instruction Multiple Data unit, at one and more cores having a shared cache, is presented. This methodology achieves higher execution speed than ATLAS state of the art library (speedup from 1.08 up to 3.5), by decreasing the number of instructions (load/store and arithmetic) and the data cache accesses and misses in the memory hierarchy. This is achieved by fully exploiting the software characteristics (e.g. data reuse) and hardware parameters (e.g. data caches sizes and associativities) as one problem and not separately, giving high quality solutions and a smaller search space. 相似文献
6.
In this work sufficient conditions for uniform input‐to‐output stability and uniform input‐to‐state stability are presented for finite‐dimensional systems under feedback control with zero‐order hold. The conditions are expressed by means of single and vector Lyapunov functions. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
7.
Themis P. Exarchos Markos G. Tsipouras Costas Papaloukas Dimitrios I. Fotiadis 《Knowledge and Information Systems》2009,19(2):249-264
In this paper we present a novel methodology for sequence classification, based on sequential pattern mining and optimization
algorithms. The proposed methodology automatically generates a sequence classification model, based on a two stage process.
In the first stage, a sequential pattern mining algorithm is applied to a set of sequences and the sequential patterns are
extracted. Then, the score of every pattern with respect to each sequence is calculated using a scoring function and the score
of each class under consideration is estimated by summing the specific pattern scores. Each score is updated, multiplied by
a weight and the output of the first stage is the classification confusion matrix of the sequences. In the second stage an
optimization technique, aims to finding a set of weights which minimize an objective function, defined using the classification
confusion matrix. The set of the extracted sequential patterns and the optimal weights of the classes comprise the sequence
classification model. Extensive evaluation of the methodology was carried out in the protein classification domain, by varying
the number of training and test sequences, the number of patterns and the number of classes. The methodology is compared with
other similar sequence classification approaches. The proposed methodology exhibits several advantages, such as automated
weight assignment to classes using optimization techniques and knowledge discovery in the domain of application.
相似文献
Dimitrios I. FotiadisEmail: |
8.
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero. 相似文献
9.
Michael Karantzikis Catherine G. Papanicolaou Costas P. Antonopoulos Thanasis C. Triantafillou 《Canadian Metallurgical Quarterly》2005,9(6):480-487
The present study investigates experimentally the behavior of concrete confined with fiber reinforced polymers (FRP) in the form of jackets which are applied according to a number of nonconventional techniques. First, the effectiveness of various jacketing configurations combined with anchors as a measure of increasing the strength and deformability of L-shaped columns is investigated. It is concluded that easy to install and low-cost anchors made of resin impregnated fibers properly placed at the reentrant corner of L-shaped columns enable excellent mobilization of confining stresses supplied by the FRP jackets. Next, a number of alternative confinement methods are investigated on concrete cylinders, aimed at quantifying the effectiveness of (1) unbonded jacketing, (2) spirally applied strips attached only at their ends, and (3) jacketing directly on concrete with mortar plastering. Although the study may be regarded as preliminary, it provides useful experimental support to a number of techniques which have the potential to open new horizons in the field of externally applied FRP for enhancing concrete confinement. 相似文献
10.
Michalis Christou Maxime Crochemore Tomáš Flouri Costas S. Iliopoulos Jan Janoušek Bořivoj Melichar Solon P. Pissis 《Information Processing Letters》2012,112(24):958-962
We consider the problem of computing all subtree repeats in a given labeled ordered tree. We first transform the tree to a string representing its postfix notation, and then present an algorithm based on the bottom-up technique to solve it. The proposed algorithm consists of two phases: the preprocessing phase and the phase where all subtree repeats are computed. The linear time and space complexity of the proposed algorithm are important parts of its quality. 相似文献