首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2404篇
  免费   96篇
  国内免费   6篇
电工技术   28篇
综合类   6篇
化学工业   506篇
金属工艺   35篇
机械仪表   45篇
建筑科学   344篇
矿业工程   32篇
能源动力   43篇
轻工业   161篇
水利工程   44篇
石油天然气   4篇
无线电   195篇
一般工业技术   323篇
冶金工业   189篇
原子能技术   9篇
自动化技术   542篇
  2023年   21篇
  2022年   21篇
  2021年   69篇
  2020年   28篇
  2019年   28篇
  2018年   60篇
  2017年   51篇
  2016年   82篇
  2015年   71篇
  2014年   84篇
  2013年   100篇
  2012年   117篇
  2011年   144篇
  2010年   126篇
  2009年   183篇
  2008年   185篇
  2007年   155篇
  2006年   104篇
  2005年   75篇
  2004年   68篇
  2003年   50篇
  2002年   59篇
  2001年   39篇
  2000年   34篇
  1999年   41篇
  1998年   52篇
  1997年   49篇
  1996年   49篇
  1995年   43篇
  1994年   36篇
  1993年   27篇
  1992年   18篇
  1991年   18篇
  1990年   14篇
  1989年   7篇
  1988年   8篇
  1987年   15篇
  1986年   6篇
  1985年   15篇
  1984年   12篇
  1983年   12篇
  1982年   13篇
  1981年   12篇
  1980年   10篇
  1979年   8篇
  1978年   13篇
  1977年   9篇
  1976年   14篇
  1975年   9篇
  1971年   7篇
排序方式: 共有2506条查询结果,搜索用时 46 毫秒
41.
Real-time global illumination in VR systems enhances scene realism by incorporating soft shadows, reflections of objects in the scene, and color bleeding. The Virtual Light Field (VLF) method enables real-time global illumination rendering in VR. The VLF has been integrated with the Extreme VR system for real-time GPU-based rendering in a Cave Automatic Virtual Environment.  相似文献   
42.
43.
Hybrid systems are heterogeneous systems characterised by the interaction of discrete and continuous dynamics. We present a trajectory-based algebraic model for describing hybrid systems; the trajectories used are closely related to streams. The algebra is based on left quantales and left semirings and provides a new application for these algebraic structures. We show that hybrid automata, which are probably the standard tool for describing hybrid systems, can conveniently be embedded into our algebra. Moreover we point out some important advantages of the algebraic approach. In particular, we show how to handle Zeno effects, which are excluded by most other authors. The development of the theory is illustrated by a running example and a larger case study.  相似文献   
44.
We show on a case study from an autonomous aerospace context how to apply a game-based model-checking approach as a powerful technique for the verification, diagnosis, and adaptation of system behaviors based on temporal properties. This work is part of our contribution within the SHADOWS project, where we provide a number of enabling technologies for model-driven self-healing. We propose here to use GEAR, a game-based model checker, as a user-friendly tool that can offer automatic proofs of critical properties of such systems. Although it is a model checker for the full modal μ-calculus, it also supports derived, more user-oriented logics. With GEAR, designers and engineers can interactively investigate automatically generated winning strategies for the games, by this way exploring the connection between the property, the system, and the proof. This work has been partially supported by the European Union Specific Targeted Research Project SHADOWS (IST-2006-35157), exploring a Self-Healing Approach to Designing cOmplex softWare Systems. The project’s web page is at . This article is an extended version of Renner et al. [18] presented at ISoLA 2007, Poitiers, December 2007.  相似文献   
45.
46.
47.
We show from muon spin relaxation (SR) studies on mercury HTS superconductors that a 50-fold increase in irreversibility field obtained by partial substitution of Re for Hg is due to metallisation of the Hg/Re layer. Induced superconductivity on this metallic layer doubles the overall superfluid density. This suggests a new approach to the design of high performance HTS materials: metallising one of the non-CuO2 interlayers and thereby greatly enhancing the superconducting properties.  相似文献   
48.
Infrastructure federation is becoming an increasingly important issue for modern Distributed Computing Infrastructures (DCIs): Dynamic elasticity of quasi-static Grid environments, incorporation of special-purpose resources into commoditized Cloud infrastructures, cross-community collaboration for increasingly diverging areas of modern e-Science, and Cloud Bursting pose major challenges on the technical level for many resource and middleware providers. Especially with respect to increasing costs of operating data centers, the intelligent yet automated and secure sharing of resources is a key factor for success. With the D-Grid Scheduler Interoperability (DGSI) project within the German D-Grid Initiative, we provide a strategic technology for the automatically negotiated, SLA-secured, dynamically provisioned federation of resources and services for Grid-and Cloud-type infrastructures. This goal is achieved by complementing current DCI schedulers with the ability to federate infrastructure for the temporary leasing of resources and rechanneling of workloads. In this work, we describe the overall architecture and SLA-secured negotiation protocols within DGSI and depict an advanced mechanism for resource delegation through means of dynamically provisioned, virtualized middleware. Through this methodology, we provide the technological foundation for intelligent capacity planning and workload management in a cross-infrastructure fashion.  相似文献   
49.
Current publicly available computer programs calculate the spectrum and couplings of the minimal supersymmetric standard model under the assumption of R-parity conservation. Here, we describe an extension to the SOFTSUSY program which includes R-parity violating effects. The user provides a theoretical boundary condition upon the high-scale supersymmetry breaking R-parity violating couplings. Successful radiative electroweak symmetry breaking, electroweak and CKM matrix data are used as weak-scale boundary conditions. The renormalisation group equations are solved numerically between the weak scale and a high energy scale using a nested iterative algorithm. This paper serves as a manual to the R-parity violating mode of the program, detailing the approximations and conventions used.

Program summary

Program title:SOFTSUSY v3.0Catalogue identifier: ADPM_v2_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADPM_v2_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 75 927No. of bytes in distributed program, including test data, etc.: 570 916Distribution format: tar.gzProgramming language: C++, FortranComputer: Personal computerOperating system: Tested on Linux 4.xWord size: 32 bitsClassification: 11.6Catalogue identifier of previous version: ADPM_v1_0Journal reference of previous version: Comput. Phys. Comm. 143 (2002) 305Does the new version supersede the previous version?: YesNature of problem: Calculating supersymmetric particle spectrum and mixing parameters in the R-parity violating minimal supersymmetric standard model. The solution to the renormalisation group equations must be consistent with a high-scale boundary condition on supersymmetry breaking parameters and Rp parameters, as well as a weak-scale boundary condition on gauge couplings, Yukawa couplings and the Higgs potential parameters.Solution method: Nested iterative algorithmReasons for new version: This is an extension to the SOFTSUSY program which includes R-parity violating effects. The user provides a theoretical boundary condition upon the high-scale supersymmetry breaking R-parity violating couplings. Successful radiative electroweak symmetry breaking, electroweak and CKM matrix data are used as weak-scale boundary conditions. The renormalisation group equations are solved numerically between the weak scale and a high energy scale using a nested iterative algorithm. The paper serves as a manual to the R-parity violating mode of the program, detailing the approximations and conventions used.Restrictions:SOFTSUSY3.0 will provide a solution only in the perturbative regime and it assumes that all couplings of the MSSM are real (i.e. CP-conserving). The iterative SOFTSUSY algorithm will not converge if parameters are too close to a boundary of successful electroweak symmetry breaking, but a warning flag will alert the user to this fact.Running time: A few seconds per parameter point.  相似文献   
50.
The rapidly increasing complexity of multi-body system models in applications like vehicle dynamics, robotics and bio-mechanics requires qualitative new solution methods to slash computing times for the dynamical simulation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号