全文获取类型
收费全文 | 246篇 |
免费 | 17篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 14篇 |
综合类 | 1篇 |
化学工业 | 51篇 |
金属工艺 | 8篇 |
机械仪表 | 5篇 |
建筑科学 | 2篇 |
能源动力 | 31篇 |
轻工业 | 14篇 |
水利工程 | 4篇 |
石油天然气 | 5篇 |
无线电 | 30篇 |
一般工业技术 | 51篇 |
冶金工业 | 20篇 |
原子能技术 | 5篇 |
自动化技术 | 24篇 |
出版年
2024年 | 5篇 |
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 15篇 |
2020年 | 10篇 |
2019年 | 15篇 |
2018年 | 15篇 |
2017年 | 13篇 |
2016年 | 21篇 |
2015年 | 12篇 |
2014年 | 11篇 |
2013年 | 27篇 |
2012年 | 9篇 |
2011年 | 17篇 |
2010年 | 12篇 |
2009年 | 10篇 |
2008年 | 7篇 |
2007年 | 11篇 |
2006年 | 3篇 |
2005年 | 6篇 |
2004年 | 3篇 |
2003年 | 2篇 |
2002年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1984年 | 1篇 |
排序方式: 共有265条查询结果,搜索用时 15 毫秒
1.
Ye Liang Yan Susu Zhen Jialing Han Tian Ferdinando Hany Seppänen Tapio Alasaarela Esko 《Mobile Networks and Applications》2022,27(4):1688-1699
Mobile Networks and Applications - In recent years, physical violence detection has become a research hotspot in the area of human activity recognition. With the improvement and full coverage of... 相似文献
2.
Maureen Hany Mahmoud A. Mahmoud 《Quality and Reliability Engineering International》2016,32(5):1825-1835
We evaluate the performance of the Crosier's cumulative sum (C‐CUSUM) control chart when the probability distribution parameters of the underlying quality characteristic are estimated from Phase I data. Because the average run length (ARL) under estimated parameters is a random variable, we study the estimation effect on the chart performance in terms of the expected value of the average run length (AARL) and the standard deviation of the average run length (SDARL). Previous evaluations of this control chart were conducted while assuming known process parameters. Using the Markov chain and simulation approaches, we evaluate the in‐control performance of the chart and provide some quantiles for its in‐control ARL distribution under estimated parameters. We also compare the performance of the C‐CUSUM chart to that of the ordinary CUSUM (O‐CUSUM) chart when the process parameters are unknown. Our results show that large number of Phase I samples are required to achieve a quite reasonable performance. Additionally, the performance of the C‐CUSUM chart is found to be superior to that of the O‐CUSUM chart. Finally, we recommend the use of a recently proposed bootstrap procedure in designing the C‐CUSUM chart to guarantee, at a certain probability, that the in‐control ARL will be of at least the desired value using the available amount of Phase I data. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
3.
Helge Klippstein Hany Hassanin Alejandro Diaz De Cerio Sanchez Yahya Zweiri Lakmal Seneviratne 《Advanced Engineering Materials》2018,20(9)
4.
In this report we present for the first time strong evidence for autosomal-dominant inheritance of grant liver hemangiomas. Furthermore, we review the current literature about incidence, pathogenesis, clinics, as well as diagnostic and therapeutic aspects of LH. A large family of Italian origin is described where three female patients in three successive generations suffered from large symptomatic LH. In addition, two other female relatives exhibited asymptomatic LH on sonographic scans. The restriction of the disease to the female gender could be explained by a sex-dependent difference in penetrance or expressivity of a presumable "liver-hemangioma" gene, or by known proliferative factors such as female sex hormones. We also observed an increased incidence of adenomas of the thyroidea among members with or without LH of the presented family. This uncommon familial association has also not yet been described and its genetic aspects are discussed. 相似文献
5.
Hany F. EL Yamany Miriam A.M. Capretz David S. Allison 《Information and Software Technology》2010,52(2):220-236
One of the most significant difficulties with developing Service-Oriented Architecture (SOA) involves meeting its security challenges, since the responsibilities of SOA security are based on both the service providers and the consumers. In recent years, many solutions to these challenges have been implemented, such as the Web Services Security Standards, including WS-Security and WS-Policy. However, those standards are insufficient for the new generation of Web technologies, including Web 2.0 applications. In this research, we propose an intelligent SOA security framework by introducing its two most promising services: the Authentication and Security Service (NSS), and the Authorization Service (AS). The suggested autonomic and reusable services are constructed as an extension of WS-1 security standards, with the addition of intelligent mining techniques, in order to improve performance and effectiveness. In this research, we apply three different mining techniques: the Association Rules, which helps to predict attacks, the Online Analytical Processing (OLAP) Cube, for authorization, and clustering mining algorithms, which facilitate access control rights representation and automation. Furthermore, a case study is explored to depict the behavior of the proposed services inside an SOA business environment. We believe that this work is a significant step towards achieving dynamic SOA security that automatically controls the access to new versions of Web applications, including analyzing and dropping suspicious SOAP messages and automatically managing authorization roles. 相似文献
6.
7.
8.
In this article, the authors examine how the internal audit function maintains its legitimacy when enterprise resource planning systems are introduced. This work centers on an in-depth case study of a multinational bank and finds that enterprise resource planning systems impose an institutional logic of control based on interlinked assumptions. These assumptions motivate changes in the practice and structure of the internal audit function to become an integrated and comprehensive function to maintain its legitimacy. 相似文献
9.
10.