全文获取类型
收费全文 | 1158篇 |
免费 | 36篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 42篇 |
化学工业 | 248篇 |
金属工艺 | 51篇 |
机械仪表 | 31篇 |
建筑科学 | 15篇 |
能源动力 | 53篇 |
轻工业 | 39篇 |
石油天然气 | 1篇 |
无线电 | 182篇 |
一般工业技术 | 271篇 |
冶金工业 | 110篇 |
原子能技术 | 13篇 |
自动化技术 | 147篇 |
出版年
2023年 | 10篇 |
2022年 | 35篇 |
2021年 | 51篇 |
2020年 | 26篇 |
2019年 | 30篇 |
2018年 | 34篇 |
2017年 | 37篇 |
2016年 | 26篇 |
2015年 | 22篇 |
2014年 | 34篇 |
2013年 | 58篇 |
2012年 | 49篇 |
2011年 | 49篇 |
2010年 | 43篇 |
2009年 | 45篇 |
2008年 | 52篇 |
2007年 | 50篇 |
2006年 | 46篇 |
2005年 | 39篇 |
2004年 | 21篇 |
2003年 | 28篇 |
2002年 | 27篇 |
2001年 | 19篇 |
2000年 | 13篇 |
1999年 | 23篇 |
1998年 | 49篇 |
1997年 | 28篇 |
1996年 | 24篇 |
1995年 | 21篇 |
1994年 | 12篇 |
1993年 | 21篇 |
1992年 | 9篇 |
1991年 | 14篇 |
1990年 | 15篇 |
1989年 | 14篇 |
1988年 | 13篇 |
1987年 | 6篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 11篇 |
1983年 | 10篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 8篇 |
1977年 | 7篇 |
1976年 | 6篇 |
1974年 | 5篇 |
1973年 | 7篇 |
排序方式: 共有1203条查询结果,搜索用时 15 毫秒
1.
Sanghoon Lee Chris Podilchuk Vidhya Krishnan Alan C. Bovik 《The Journal of VLSI Signal Processing》2003,34(1-2):149-166
By exploiting new human-machine interface techniques, such as visual eyetrackers, it should be possible to develop more efficient visual multimedia services associated with low bandwidth, dynamic channel adaptation and robust visual data transmission. In this paper, we introduce foveation-based error resilience and unequal error protection techniques over highly error-prone mobile networks. Each frame is spatially divided into foveated and background layers according to perceptual importance. Perceptual importance is determined either through an eye tracker or by manually selecting a region of interest. We attempt to improve reconstructed visual quality by maintaining the high visual source throughput of the foveated layer using foveation-based error resilience and error correction using a combination of turbo codes and ARQ (automatic reQuest). In order to alleviate the degradation of visual quality, a foveation based bitstream partitioning is developed. In an effort to increase the source throughput of the foveated layer, we develop unequal delay-constrained ARQ (automatic reQuest) and rate compatible punctured turbo codes where the punctual pattern of RCPC (rate compatible punctured convolutional) codes in H.223 Annex C is used. In the simulation, the visual quality is significantly increased in the area of interest using foveation-based error resilience and unequal error protection; (as much as 3 dB FPSNR (foveal peak signal to noise ratio) improvement) at 40% packet error rate. Over real-fading statistics measured in the downtown area of Austin, Texas, the visual quality is increased up to 1.5 dB in PSNR and 1.8 dB in FPSNR at a channel SNR of 5 dB. 相似文献
2.
Acoustic emission technique for leak detection in an end shield of a pressurised heavy water reactor
P. Kalyanasundaram T. Jayakumar B. Raj C.R.L. Murthy A. Krishnan 《Nuclear Engineering and Design》1989,116(2)
This paper discusses the successful application of the Acoustic Emission Technique (AET) for detection and location of leak paths present on the inaccessible side of an end shield of a Pressurised Heavy Water Reactor (PHWR). The methodology was based on the fact that air and water leak AE signals have different characteristic features. Baseline data was generated from a sound end-shield of a PHWR for characterizing the background noise. A mock up end-shield system with saw cut leak paths was used to verify the validity of the methodology. It was found that air leak signals under pressurisation (as low as 3 psi) could be detected by frequency domain analysis. Signals due to air leaks from various locations of a defective end-shield were acquired and analysed. It was possible to detect and locate leak paths. Presence of detected leak paths were further confirmed by alternate test. 相似文献
3.
Writing project reports is an important part of the engineering curriculum at Singapore universities. One important section of the formal report is the literature review. Most universities around the world provide guidelines on writing reviews, emphasizing that plagiarism is unethical. However, these guidelines do not offer explicit training on how to avoid plagiarism. In order to write academically acceptable reviews while avoiding copying from source materials, students face a major challenge and resort to employing various strategies to cope with the task. In this study, we examined the literature review sections of final year project reports to find out how engineering undergraduates in a Singapore university cope with writing reviews and to suggest ways in which they can extend their skills to improve their literature reviews. 相似文献
4.
The paper describes the synthesis of N-2/4-toluyl methacrylatoethyl carbamates using 2/4-toluyl isocyanate and 2-hydroxyethyl methacrylate. Homopolymerisation and copolymerisation of these novel monomers with methyl methacrylate was carried out using benzoyl peroxide as an initiator and tetrahydrofuran as solvent. Photopolymerisation of N-4-toluyl methacrylatoethyl carbamate could be carried out without the use of photosensitiser. Structural characterisation of copolymers was done using 1H-NMR. Thermal stability of copolymers was evaluated in a nitrogen atmosphere by dynamic thermogravimetry. 相似文献
5.
6.
Victoria J. Hodge Rajesh Krishnan Jim Austin John Polak Tom Jackson 《Neural computing & applications》2014,25(7-8):1639-1655
This paper introduces a binary neural network-based prediction algorithm incorporating both spatial and temporal characteristics into the prediction process. The algorithm is used to predict short-term traffic flow by combining information from multiple traffic sensors (spatial lag) and time series prediction (temporal lag). It extends previously developed Advanced Uncertain Reasoning Architecture (AURA) k-nearest neighbour (k-NN) techniques. Our task was to produce a fast and accurate traffic flow predictor. The AURA k-NN predictor is comparable to other machine learning techniques with respect to recall accuracy but is able to train and predict rapidly. We incorporated consistency evaluations to determine whether the AURA k-NN has an ideal algorithmic configuration or an ideal data configuration or whether the settings needed to be varied for each data set. The results agree with previous research in that settings must be bespoke for each data set. This configuration process requires rapid and scalable learning to allow the predictor to be set-up for new data. The fast processing abilities of the AURA k-NN ensure this combinatorial optimisation will be computationally feasible for real-world applications. We intend to use the predictor to proactively manage traffic by predicting traffic volumes to anticipate traffic network problems. 相似文献
7.
Logan Molyneux Krishnan Vasudevan Homero Gil de Zúñiga 《Journal of Computer-Mediated Communication》2015,20(4):381-399
Recent research suggests that social interactions in video games may lead to the development of community bonding and prosocial attitudes. Building on this line of research, a national survey of U.S. adults finds that gamers who develop ties with a community of fellow gamers possess gaming social capital, a new gaming‐related community construct that is shown to be a positive antecedent in predicting both face‐to‐face social capital and civic participation. 相似文献
8.
In this paper, we establish a set of sufficient conditions for the controllability of damped second-order impulsive neutral integrodifferential systems with nonlocal initial conditions in Banach spaces. The approach used is the Sadovskii fixed point theorem combined with a noncompact condition on the cosine family of operators. An example is presented to illustrate the result. 相似文献
9.
S. Shanmuga Priya D. Yuvaraj T. Satyanarayana Murthy Varghese S. Chooralil S. Navaneetha Krishnan P. Banumathy P. SundaraVadivel 《计算机系统科学与工程》2022,43(3):887-896
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table. 相似文献
10.
Michael?DeBoleEmail author Ramakrishnan?Krishnan Varsha?Balakrishnan Wenping?Wang Hong?Luo Yu?Wang Yuan?Xie Yu?Cao N.?Vijaykrishnan 《International journal of parallel programming》2009,37(4):417-431
Degradation of device parameters over the lifetime of a system is emerging as a significant threat to system reliability.
Among the aging mechanisms, wearout resulting from Negative Bias Temperature Instability (NBTI) is of particular concern in
deep submicron technology generations. While there has been significant effort at the device and circuit level to model and
characterize the impact of NBTI, the analysis of NBTI’s impact at the architectural level is still at its infancy. To facilitate
architectural level aging analysis, a tool capable of evaluating NBTI vulnerabilities early in the design cycle has been developed
that evaluates timing degradation due to NBTI. The tool includes workload-based temperature and performance degradation analysis
across a variety of technologies and operating conditions, revealing a complex interplay between factors influencing NBTI
timing degradation. 相似文献