首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1269篇
  免费   103篇
  国内免费   2篇
电工技术   9篇
综合类   2篇
化学工业   354篇
金属工艺   13篇
机械仪表   43篇
建筑科学   51篇
矿业工程   9篇
能源动力   42篇
轻工业   175篇
水利工程   6篇
石油天然气   10篇
无线电   77篇
一般工业技术   210篇
冶金工业   83篇
原子能技术   9篇
自动化技术   281篇
  2024年   3篇
  2023年   21篇
  2022年   41篇
  2021年   65篇
  2020年   51篇
  2019年   38篇
  2018年   50篇
  2017年   55篇
  2016年   60篇
  2015年   47篇
  2014年   60篇
  2013年   113篇
  2012年   89篇
  2011年   107篇
  2010年   69篇
  2009年   70篇
  2008年   54篇
  2007年   48篇
  2006年   48篇
  2005年   43篇
  2004年   28篇
  2003年   24篇
  2002年   28篇
  2001年   14篇
  2000年   10篇
  1999年   10篇
  1998年   25篇
  1997年   14篇
  1996年   20篇
  1995年   8篇
  1994年   6篇
  1993年   14篇
  1992年   2篇
  1991年   5篇
  1990年   7篇
  1989年   3篇
  1988年   2篇
  1987年   2篇
  1986年   3篇
  1985年   3篇
  1984年   2篇
  1982年   2篇
  1981年   2篇
  1977年   2篇
  1976年   5篇
  1972年   1篇
排序方式: 共有1374条查询结果,搜索用时 0 毫秒
1.
Abstract

Industry 4.0 aims at providing a digital representation of a production landscape, but the challenges in building, maintaining, optimizing, and evolving digital models in inter-organizational production chains have not been identified yet in a systematic manner. In this paper, various Industry 4.0 research and technical challenges are addressed, and their present scenario is discussed. Moreover, in this article, the novel concept of developing experience-based virtual models of engineering entities, process, and the factory is presented. These models of production units, processes, and procedures are accomplished by virtual engineering object (VEO), virtual engineering process (VEP), and virtual engineering factory (VEF), using the knowledge representation technique of Decisional DNA. This blend of the virtual and physical domains permits monitoring of systems and analysis of data to foresee problems before they occur, develop new opportunities, prevent downtime, and even plan for the future by using simulations. Furthermore, the proposed virtual model concept not only has the capability of Query Processing and Data Integration for Industrial Data but also real-time visualization of data stream processing.  相似文献   
2.
3.
4.
5.
This work aims at evaluating a graphical notation for modelling software (and other kinds of) development methodologies, thus demonstrating how useful the graphical aspects can be for sharing knowledge between the people responsible for documenting information and those responsible for understanding and putting it into practice. We acknowledge the importance of having a common set of symbols that can be used to create, use and disseminate information for a larger audience than is possible today with a variety of alternatives and lack of a common ground. Using a cognitive dimensions framework, we make a standard evaluation of the elements and diagrams of the notation proposed to support the ISO/IEC 24744 methodology metamodel standard, considering the trade-offs between different dimensions. We suggest improvements to this existing notation based on this analysis, in the context of improving communication between creators and users of methodologies.  相似文献   
6.
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process.  相似文献   
7.
The aerospace industry still uses fault trees to perform reliability analysis. This is because fault-tree modeling and analysis (FTA) seems easier to practical engineers when compared with Markov models, even though FTA provides a weaker form of analysis. In this paper, we propose an automatic strategy for generating Markov-based models and corresponding analysis formulations, according to ARP 4761, directly from Simulink diagrams annotated with failure information. The generated Markov-based models are expressed in the formal language PRISM, and the analysis is carried out by the PRISM model checker. The strategy is compositional and based on a comprehensive set of translation rules from Simulink to PRISM. We briefly address soundness and completeness of the rules and, to illustrate the application of the strategy, we apply it to a classical avionics case study: an actuator control system.  相似文献   
8.
For heterogeneous distributed computing systems, important design issues are scalability and system optimization. Given such systems, it is crucial to develop low computational complexity algorithms to schedule tasks in a manner that exploits the heterogeneity of the resources and applications. In this paper, we report and evaluate three scalable, and fast scheduling heuristics for highly heterogeneous distributed computing systems. We conduct a comprehensive performance evaluation study using simulation. The benchmarking outlines the performance of the schedulers, representing scalability, makespan, flowtime, computational complexity, and memory utilization. The set of experimental results shows that our heuristics perform as good as the traditional approaches, for makespan and flowtime, while featuring lower complexity, lower running time, and lower used memory. The experimental results also detail the various scenarios under which certain algorithms excel and fail.  相似文献   
9.
Plants are commonly attacked by more than one species of herbivore, potentially causing the induction of multiple, and possibly competing, plant defense systems. In the present paper, we determined the interaction between feeding by the phloem feeder silverleaf whitefly (SWF), Bemisia tabaci Gennadius (B-biotype = B. argentifolii Bellows and Perring), and the leaf-chewing beet armyworm (BAW), Spodoptera exigua Hübner, with regard to the induction of volatile compounds from cotton plants. Compared to undamaged control plants, infestation with SWF did not induce volatile emissions or affect the number and density of pigment glands that store volatile and nonvolatile terpenoid compounds, whereas infestation by BAW strongly induced plant volatile emission. When challenged by the two insect herbivores simultaneously, volatile emission was significantly less than for plants infested with only BAW. Our results suggest that tritrophic level interactions between cotton, BAW, and natural enemies of BAW, that are known to be mediated by plant volatile emissions, may be perturbed by simultaneous infestation by SWF. Possible mechanisms by which the presence of whiteflies may attenuate volatile emissions from caterpillar-damaged cotton plants are discussed.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号