全文获取类型
收费全文 | 321篇 |
免费 | 17篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 60篇 |
金属工艺 | 2篇 |
机械仪表 | 2篇 |
建筑科学 | 21篇 |
矿业工程 | 2篇 |
能源动力 | 33篇 |
轻工业 | 25篇 |
水利工程 | 7篇 |
无线电 | 28篇 |
一般工业技术 | 35篇 |
冶金工业 | 34篇 |
原子能技术 | 2篇 |
自动化技术 | 77篇 |
出版年
2023年 | 3篇 |
2022年 | 7篇 |
2021年 | 15篇 |
2020年 | 9篇 |
2019年 | 8篇 |
2017年 | 7篇 |
2016年 | 12篇 |
2015年 | 16篇 |
2014年 | 19篇 |
2013年 | 24篇 |
2012年 | 20篇 |
2011年 | 25篇 |
2010年 | 20篇 |
2009年 | 27篇 |
2008年 | 12篇 |
2007年 | 13篇 |
2006年 | 12篇 |
2005年 | 5篇 |
2004年 | 6篇 |
2003年 | 5篇 |
2002年 | 5篇 |
2001年 | 3篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 13篇 |
1997年 | 6篇 |
1996年 | 6篇 |
1995年 | 6篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1973年 | 3篇 |
1966年 | 1篇 |
排序方式: 共有338条查询结果,搜索用时 15 毫秒
1.
O Bernard B Chachuat A Hélias B Le Dantec B Sialve J-P Steyer L Lardon P Neveu S Lambert J Gallop M Dixon P Ratini A Quintabà S Frattesi J M Lema E Roca G Ruiz J Rodriguez A Franco P Vanrolleghem U Zaher D J W De Pauw K De Neve K Lievens D Dochaine O Schoefs H Fibrianto R Farina V Alcaraz Gonzalez V Gonzalez Alvarez P Lemaire J A Martinez F Esandi O Duclaud J F Lavigne 《Water science and technology》2005,52(1-2):457-464
The TELEMAC project brings new methodologies from the Information and Science Technologies field to the world of water treatment. TELEMAC offers an advanced remote management system which adapts to most of the anaerobic wastewater treatment plants that do not benefit from a local expert in wastewater treatment. The TELEMAC system takes advantage of new sensors to better monitor the process dynamics and to run automatic controllers that stabilise the treatment plant, meet the depollution requirements and provide a biogas quality suitable for cogeneration. If the automatic system detects a failure which cannot be solved automatically or locally by a technician, then an expert from the TELEMAC Control Centre is contacted via the internet and manages the problem. 相似文献
2.
We present some new lower bounds on the optimal information rate and on the optimal average information rate of secret sharing schemes with homogeneous access structure. These bounds are found by using some covering constructions and a new parameter, the k-degree of a participant, that is introduced in this paper. Our bounds improve the previous ones in almost all cases. 相似文献
3.
4.
Carles Ventura Verónica Vilaplana Xavier Giró-i-Nieto Ferran Marqués 《Multimedia Tools and Applications》2014,73(3):1983-2008
Metric Access Methods (MAMs) are indexing techniques which allow working in generic metric spaces. Therefore, MAMs are specially useful for Content-Based Image Retrieval systems based on features which use non L p norms as similarity measures. MAMs naturally allow the design of image browsers due to their inherent hierarchical structure. The Hierarchical Cellular Tree (HCT), a MAM-based indexing technique, provides the starting point of our work. In this paper, we describe some limitations detected in the original formulation of the HCT and propose some modifications to both the index building and the search algorithm. First, the covering radius, which is defined as the distance from the representative to the furthest element in a node, may not cover all the elements belonging to the node’s subtree. Therefore, we propose to redefine the covering radius as the distance from the representative to the furthest element in the node’s subtree. This new definition is essential to guarantee a correct construction of the HCT. Second, the proposed Progressive Query retrieval scheme can be redesigned to perform the nearest neighbor operation in a more efficient way. We propose a new retrieval scheme which takes advantage of the benefits of the search algorithm used in the index building. Furthermore, while the evaluation of the HCT in the original work was only subjective, we propose an objective evaluation based on two aspects which are crucial in any approximate search algorithm: the retrieval time and the retrieval accuracy. Finally, we illustrate the usefulness of the proposal by presenting some actual applications. 相似文献
5.
Juan Gutierrez-Aguado Jose M. Alcaraz Calero Wladimiro Diaz Villanueva 《Journal of Grid Computing》2016,14(2):283-297
Monitoring of cloud computing infrastructures is an imperative necessity for cloud providers and administrators to analyze, optimize and discover what is happening in their own infrastructures. Current monitoring solutions do not fit well for this purpose mainly due to the incredible set of new requirements imposed by the particular requirements associated to cloud infrastructures. This paper describes in detail the main reasons why current monitoring solutions do not work well. Also, it provides an innovative monitoring architecture that enables the monitoring of the physical and virtual machines available within a cloud infrastructure in a non-invasive and transparent way making it suitable not only for private cloud computing but also for public cloud computing infrastructures. This architecture has been validated by means of a prototype integrating an existing enterprise-class monitoring solution, Nagios, with the control and data planes of OpenStack, a well-known stack for cloud infrastructures. As a result, our new monitoring architecture is able to extend the exiting Nagios functionalities to fit in the monitoring of cloud infrastructures. The proposed architecture has been designed, implemented and released as open source to the scientific community. The proposal has also been empirically validated in a production-level cloud computing infrastructure running a test bed with up to 128 VMs where overhead and responsiveness has been carefully analyzed. 相似文献
6.
Edge matching puzzles have been amongst us for a long time now and traditionally they have been considered, both, a children’s game and an interesting mathematical divertimento. Their main characteristics have already been studied, and their worst-case complexity has been properly classified as a NP-complete problem. It is in recent times, specially after being used as the problem behind a money-prized contest, with a prize of 2US$ million for the first solver, that edge matching puzzles have attracted mainstream attention from wider audiences, including, of course, computer science people working on solving hard problems. We consider these competitions as an interesting opportunity to showcase SAT/CSP solving techniques when confronted to a real world problem to a broad audience, a part of the intrinsic, i.e. monetary, interest of such a contest. This article studies the NP-complete problem known as edge matching puzzle using SAT and CSP approaches for solving it. We will focus on providing, first and foremost, a theoretical framework, including a generalized definition of the problem. We will design and show algorithms for easy and fast problem instances generation, generators with easily tunable hardness. Afterwards we will provide with SAT and CSP models for the problems and we will study problem complexity, both typical case and worst-case complexity. We will also provide some specially crafted heuristics that result in a boost in solving time and study which is the effect of such heuristics. 相似文献
7.
8.
Angela Fabregues Carles Sierra 《Engineering Applications of Artificial Intelligence》2011,24(7):1137-1146
There is a chronic lack of shared application domains to test advanced research models and agent negotiation architectures in Multiagent Systems. In this paper we introduce a friendly testbed for that purpose. The testbed is based on The Diplomacy Game where negotiation and the relationships between players play an essential role. The testbed profits from the existence of a large community of human players that know the game and can easily provide data for experiments. We explain the infrastructure in the paper and make it freely available to the AI community. 相似文献
9.
Atrial Fibrillation (AF) is the most common supraventricular tachyarrhythmia. Recently, it has been suggested that AF is partially organized on its onset and termination, thus being more suitable for antiarrhythmia and to avoid unnecessary therapy. Although several invasive and non-invasive AF organization estimators have been proposed, the organization time course in the first and last minutes of AF has not been quantified yet. The aim of this work is to study non-invasively the organization variation within the first and last minutes of paroxysmal AF. The organization was evaluated making use of sample entropy, which can robustly estimate electrical atrial activity organization from surface ECG recordings. This work proves an organization decrease in the first minutes of AF onset and an increase within the last minute before spontaneous AF termination. These results are in agreement with the conclusions reported by other authors who made use of invasive recordings. 相似文献
10.
Juan M. Marín Pérez Jorge Bernal Bernabé Jose M. Alcaraz Calero Felix J. Garcia Clemente Gregorio Martínez Pérez Antonio F. Gómez Skarmeta 《Future Generation Computer Systems》2011,27(1):40-55
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process. 相似文献