首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   981篇
  免费   66篇
  国内免费   1篇
工业技术   1048篇
  2023年   8篇
  2022年   8篇
  2021年   50篇
  2020年   25篇
  2019年   46篇
  2018年   33篇
  2017年   41篇
  2016年   44篇
  2015年   36篇
  2014年   38篇
  2013年   78篇
  2012年   51篇
  2011年   72篇
  2010年   65篇
  2009年   63篇
  2008年   46篇
  2007年   54篇
  2006年   32篇
  2005年   37篇
  2004年   32篇
  2003年   20篇
  2002年   24篇
  2001年   13篇
  2000年   12篇
  1999年   13篇
  1998年   14篇
  1997年   16篇
  1996年   3篇
  1995年   10篇
  1994年   8篇
  1993年   9篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1048条查询结果,搜索用时 46 毫秒
31.
32.
Hosts with several, possibly heterogeneous and/or multicore, processors provide new challenges and opportunities to accelerate applications with high communications bandwidth requirements. Many opportunities to scale these network applications with the increase in the link bandwidths are related to the exploitation of the available parallelism provided by the presence of several processing cores in the servers, not only for computing the workload of the user application but also for decreasing the overhead associated to the network interface and the system software.  相似文献   
33.
RFID is a relatively heterogenous radio technology, where it is necessary to put an extra effort on security and privacy-related issues. As early as 2004, some authors suggested the use of a PRNG for increasing security. This was later questioned because many thought a PRNG implementation may go well beyond the very limited computational capabilities of low-cost RFID tags. However, its use has been ratified by EPCGlobal (EPC Class-1 Generation-2) and ISO (ISO/IEC 18000-6C). This motivates our proposal of a new PRNG, named LAMED, which is compliant with the standards and successfully passes several batteries of very demanding randomness tests (ENT, DIEHARD, NIST, and SEXTON). A study of its hardware complexity shows that LAMED can be implemented with slightly less than 1.6 K gates, and that pseudo-random numbers can be generated each 1.8 ms. So we can affirm this is a realist proposal both conforming with the EPC-G1C2 standard, and suitable for low-cost RFID tags.  相似文献   
34.
This work presents a strategy to minimise the network usage and the energy consumption of wireless battery-powered sensors in the observer problem over networks. The sensor nodes implement a periodic send-on-delta approach, sending new measurements when a measure deviates considerably from the previous sent one. The estimator node implements a jump observer whose gains are computed offline and depend on the combination of available new measurements. We bound the estimator performance as a function of the sending policies and then state the design procedure of the observer under fixed sending thresholds as a semidefinite programming problem. We address this problem first in a deterministic way and, to reduce conservativeness, in a stochastic one after obtaining bounds on the probabilities of having new measurements and applying robust optimisation problem over the possible probabilities using sum of squares decomposition. We relate the network usage with the sending thresholds and propose an iterative procedure for the design of those thresholds, minimising the network usage while guaranteeing a prescribed estimation performance. Simulation results and experimental analysis show the validity of the proposal and the reduction of network resources that can be achieved with the stochastic approach.  相似文献   
35.
Real-time interactive multimedia communications are becoming increasingly useful for education, business, e-commerce and e-government, providing an enriched user experience in teleconferencing, e-meetings, distance training and product demonstrations. Large corporations are usually located at several sites, so real-time multipoint sessions within corporations are especially difficult. IP multicast is available or feasible within each site of an organization. Thus, corporate networks can be considered as various multicast-capable networks interconnected through a wide area network without multicast connectivity. This paper proposes a resilient self-managed overlay network to support real-time multipoint interactive sessions within corporate networks. The proposed overlay takes advantage of the configuration of corporate networks to self-organize and provide an efficient media delivery service, making use of multicast communications wherever available. Various self-healing techniques are implemented allowing for the continuity of ongoing sessions in spite of network disruptions and entity failures. Extensive simulations and tests have been carried out to assess the performance and resilience of the overlay facing several types of disruptions.  相似文献   
36.
This paper presents a real-time framework that combines depth data and infrared laser speckle pattern (ILSP) images, captured from a Kinect device, for static hand gesture recognition to interact with CAVE applications. At the startup of the system, background removal and hand position detection are performed using only the depth map. After that, tracking is started using the hand positions of the previous frames in order to seek for the hand centroid of the current one. The obtained point is used as a seed for a region growing algorithm to perform hand segmentation in the depth map. The result is a mask that will be used for hand segmentation in the ILSP frame sequence. Next, we apply motion restrictions for gesture spotting in order to mark each image as a ‘Gesture’ or ‘Non-Gesture’. The ILSP counterparts of the frames labeled as “Gesture” are enhanced by using mask subtraction, contrast stretching, median filter, and histogram equalization. The result is used as the input for the feature extraction using a scale invariant feature transform algorithm (SIFT), bag-of-visual-words construction and classification through a multi-class support vector machine (SVM) classifier. Finally, we build a grammar based on the hand gesture classes to convert the classification results in control commands for the CAVE application. The performed tests and comparisons show that the implemented plugin is an efficient solution. We achieve state-of-the-art recognition accuracy as well as efficient object manipulation in a virtual scene visualized in the CAVE.  相似文献   
37.
The paper focuses on collaborative STEP-based CAD/CAM/CNC supply chains to program and automate machining process data monitoring and traceability activities. A traceability interface (traceability nc_functions) is defined for the new CNC programming standard ISO STEP-NC. CAM systems will be able to program monitoring and data access activities by inserting traceability nc_function calls in CNC programs. On the shop floor, controllers will automatically interpret these nc_functions to access process data while machining and will relate data records with the corresponding machining operations in a STEP-NC part program. With both types of information—process data and standard machining program (STEP-NC part program)—spread and technologically heterogeneous engineering systems will have full knowledge about what has happened in production. Traceability data access automation will assure data reliability. The paper describes a traceability scenario where standards such as MTConnect and ISA-95 support, rather than interfere with, the STEP-NC traceability proposal.  相似文献   
38.
The development of complex information systems calls for conceptual models that describe aspects beyond entities and activities. In particular, recent research has pointed out that conceptual models need to model goals, in order to capture the intentions which underlie complex situations within an organisational context. This paper focuses on one class of goals, namely non-functional requirements (NFR), which need to be captured and analysed from the very early phases of the software development process. The paper presents a framework for integrating NFRs into the ER and OO models. This framework has been validated by two case studies, one of which is very large. The results of the case studies suggest that goal modelling during early phases can lead to a more productive and complete modelling activity.    相似文献   
39.
Development of novel computational approaches for modeling protein properties is a main goal in applied Proteomics. In this work, we reported the extension of the radial distribution function (RDF) scores formalism to proteins for encoding 3D structural information with modeling purposes. Protein-RDF (P-RDF) scores measure spherical distributions on protein 3D structure of 48 amino acids/residues properties selected from the AAindex data base. P-RDF scores were tested for building predictive models of the change of thermal unfolding Gibbs free energy change (DeltaDeltaG) of chymotrypsin inhibitor 2 upon mutations. In this sense, an ensemble of Bayesian-Regularized Genetic Neural Networks (BRGNNs) yielded an optimum nonlinear model for the conformational stability. The ensemble predictor described about 84% and 70% variance of the data in training and test sets, respectively.  相似文献   
40.
To explore three possible binding sites of trypanothione and glutathione reductase, namely, the active, the dimer interface and the coenzyme NADPH binding site, a series of eight compounds, nitrofurans and nitrothiophenes derivatives, were docked, using their crystallographic and modeled conformations. Docking results showed that, for both families and both enzymes, compounds are more likely to bind in the interface site, even though there is some probability of binding in the active site. These studies are in agreement with experimental data, which suggest that these class of compounds can act either as uncompetitive or mixed type inhibitors, and also with the finding that there is an alpha-helix which connects the active with the interface site, thus allowing charge transference between them.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号