全文获取类型
收费全文 | 1269篇 |
免费 | 103篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 9篇 |
综合类 | 2篇 |
化学工业 | 354篇 |
金属工艺 | 13篇 |
机械仪表 | 43篇 |
建筑科学 | 51篇 |
矿业工程 | 9篇 |
能源动力 | 42篇 |
轻工业 | 175篇 |
水利工程 | 6篇 |
石油天然气 | 10篇 |
无线电 | 77篇 |
一般工业技术 | 210篇 |
冶金工业 | 83篇 |
原子能技术 | 9篇 |
自动化技术 | 281篇 |
出版年
2024年 | 3篇 |
2023年 | 21篇 |
2022年 | 41篇 |
2021年 | 65篇 |
2020年 | 51篇 |
2019年 | 38篇 |
2018年 | 50篇 |
2017年 | 55篇 |
2016年 | 60篇 |
2015年 | 47篇 |
2014年 | 60篇 |
2013年 | 113篇 |
2012年 | 89篇 |
2011年 | 107篇 |
2010年 | 69篇 |
2009年 | 70篇 |
2008年 | 54篇 |
2007年 | 48篇 |
2006年 | 48篇 |
2005年 | 43篇 |
2004年 | 28篇 |
2003年 | 24篇 |
2002年 | 28篇 |
2001年 | 14篇 |
2000年 | 10篇 |
1999年 | 10篇 |
1998年 | 25篇 |
1997年 | 14篇 |
1996年 | 20篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 14篇 |
1992年 | 2篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1977年 | 2篇 |
1976年 | 5篇 |
1972年 | 1篇 |
排序方式: 共有1374条查询结果,搜索用时 0 毫秒
1.
AbstractIndustry 4.0 aims at providing a digital representation of a production landscape, but the challenges in building, maintaining, optimizing, and evolving digital models in inter-organizational production chains have not been identified yet in a systematic manner. In this paper, various Industry 4.0 research and technical challenges are addressed, and their present scenario is discussed. Moreover, in this article, the novel concept of developing experience-based virtual models of engineering entities, process, and the factory is presented. These models of production units, processes, and procedures are accomplished by virtual engineering object (VEO), virtual engineering process (VEP), and virtual engineering factory (VEF), using the knowledge representation technique of Decisional DNA. This blend of the virtual and physical domains permits monitoring of systems and analysis of data to foresee problems before they occur, develop new opportunities, prevent downtime, and even plan for the future by using simulations. Furthermore, the proposed virtual model concept not only has the capability of Query Processing and Data Integration for Industrial Data but also real-time visualization of data stream processing. 相似文献
2.
3.
4.
5.
Kenia Sousa Jean Vanderdonckt Brian Henderson-Sellers Cesar Gonzalez-Perez 《Journal of Visual Languages and Computing》2012,23(4):195-212
This work aims at evaluating a graphical notation for modelling software (and other kinds of) development methodologies, thus demonstrating how useful the graphical aspects can be for sharing knowledge between the people responsible for documenting information and those responsible for understanding and putting it into practice. We acknowledge the importance of having a common set of symbols that can be used to create, use and disseminate information for a larger audience than is possible today with a variety of alternatives and lack of a common ground. Using a cognitive dimensions framework, we make a standard evaluation of the elements and diagrams of the notation proposed to support the ISO/IEC 24744 methodology metamodel standard, considering the trade-offs between different dimensions. We suggest improvements to this existing notation based on this analysis, in the context of improving communication between creators and users of methodologies. 相似文献
6.
Jorge Blasco Julio Cesar Hernandez-Castro 《Journal of Network and Computer Applications》2012,35(1):491-501
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process. 相似文献
7.
Adriano Gomes Alexandre Mota Augusto Sampaio Felipe Ferri Edson Watanabe 《International Journal on Software Tools for Technology Transfer (STTT)》2012,14(6):673-702
The aerospace industry still uses fault trees to perform reliability analysis. This is because fault-tree modeling and analysis (FTA) seems easier to practical engineers when compared with Markov models, even though FTA provides a weaker form of analysis. In this paper, we propose an automatic strategy for generating Markov-based models and corresponding analysis formulations, according to ARP 4761, directly from Simulink diagrams annotated with failure information. The generated Markov-based models are expressed in the formal language PRISM, and the analysis is carried out by the PRISM model checker. The strategy is compositional and based on a comprehensive set of translation rules from Simulink to PRISM. We briefly address soundness and completeness of the rules and, to illustrate the application of the strategy, we apply it to a classical avionics case study: an actuator control system. 相似文献
8.
For heterogeneous distributed computing systems, important design issues are scalability and system optimization. Given such systems, it is crucial to develop low computational complexity algorithms to schedule tasks in a manner that exploits the heterogeneity of the resources and applications. In this paper, we report and evaluate three scalable, and fast scheduling heuristics for highly heterogeneous distributed computing systems. We conduct a comprehensive performance evaluation study using simulation. The benchmarking outlines the performance of the schedulers, representing scalability, makespan, flowtime, computational complexity, and memory utilization. The set of experimental results shows that our heuristics perform as good as the traditional approaches, for makespan and flowtime, while featuring lower complexity, lower running time, and lower used memory. The experimental results also detail the various scenarios under which certain algorithms excel and fail. 相似文献
9.
Volatile Emissions Triggered by Multiple Herbivore Damage: Beet Armyworm and Whitefly Feeding on Cotton Plants 总被引:5,自引:3,他引:5
Plants are commonly attacked by more than one species of herbivore, potentially causing the induction of multiple, and possibly competing, plant defense systems. In the present paper, we determined the interaction between feeding by the phloem feeder silverleaf whitefly (SWF), Bemisia tabaci Gennadius (B-biotype = B. argentifolii Bellows and Perring), and the leaf-chewing beet armyworm (BAW), Spodoptera exigua Hübner, with regard to the induction of volatile compounds from cotton plants. Compared to undamaged control plants, infestation with SWF did not induce volatile emissions or affect the number and density of pigment glands that store volatile and nonvolatile terpenoid compounds, whereas infestation by BAW strongly induced plant volatile emission. When challenged by the two insect herbivores simultaneously, volatile emission was significantly less than for plants infested with only BAW. Our results suggest that tritrophic level interactions between cotton, BAW, and natural enemies of BAW, that are known to be mediated by plant volatile emissions, may be perturbed by simultaneous infestation by SWF. Possible mechanisms by which the presence of whiteflies may attenuate volatile emissions from caterpillar-damaged cotton plants are discussed. 相似文献
10.