首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1564篇
  免费   100篇
  国内免费   1篇
电工技术   12篇
综合类   6篇
化学工业   496篇
金属工艺   44篇
机械仪表   45篇
建筑科学   27篇
矿业工程   16篇
能源动力   34篇
轻工业   121篇
水利工程   10篇
石油天然气   16篇
无线电   126篇
一般工业技术   373篇
冶金工业   75篇
原子能技术   38篇
自动化技术   226篇
  2023年   17篇
  2022年   33篇
  2021年   106篇
  2020年   44篇
  2019年   52篇
  2018年   56篇
  2017年   42篇
  2016年   71篇
  2015年   43篇
  2014年   87篇
  2013年   108篇
  2012年   90篇
  2011年   111篇
  2010年   89篇
  2009年   98篇
  2008年   87篇
  2007年   66篇
  2006年   62篇
  2005年   54篇
  2004年   41篇
  2003年   44篇
  2002年   32篇
  2001年   18篇
  2000年   14篇
  1999年   13篇
  1998年   11篇
  1997年   22篇
  1996年   16篇
  1995年   3篇
  1994年   12篇
  1993年   13篇
  1992年   5篇
  1989年   6篇
  1988年   7篇
  1987年   4篇
  1986年   6篇
  1985年   9篇
  1984年   6篇
  1983年   8篇
  1982年   9篇
  1981年   7篇
  1980年   4篇
  1979年   9篇
  1978年   2篇
  1977年   3篇
  1976年   6篇
  1975年   2篇
  1971年   2篇
  1970年   2篇
  1962年   2篇
排序方式: 共有1665条查询结果,搜索用时 15 毫秒
91.
Vesely P  Miks A  Novák J  Boyde A 《Scanning》2003,25(5):230-239
Video rate confocal laser scanning microscopy at the highest spatial and temporal resolution of backscattered light (BSL) imaging allowed for regular observation of fast intracellular motion (FIM) first revealed in living neoplastic cells. However, the absence of an objective evaluation has hampered further study of the mechanisms and biological significance of FIM. Particularly, a quantification of apparent differences in velocities that would complement and improve the current demonstration of FIM by color coding using the combination of red-green-blue (RGB) images had been missing. Standard methods of tracking or pattern recognition could not be applied because of the fuzzy nature of images of FIM. A search for a suitable method led to correlation analysis. It was calibrated on Brownian motion and a known type of motion, such as cell marginal ruffling, compared with FIM. Results approved its explanatory potential. Therefore, several crucial incidences of FIM could be analyzed. Apart from an argument against viewing FIM as a manifestation of simple Brownian motion, the correlation analysis of FIM in the adjacent peripheries of a rat fibroblast and a K4 rat sarcoma cell confirmed the notion of higher and uneven distribution of velocity of FIM in a tumor cell so far shown in color-coded images only. This result and other yet unpublished observations indicate that the velocity and topology of FIM can also contribute to a biological distinction between neoplastic and normal cells. Regular application of the correlation analysis should further expand the study of FIM for its mechanisms and predictive value. Such an approach should be thoroughly examined for a contribution to the knowledge of cancer cells.  相似文献   
92.
The paper deals with the problem of automatic verification of programs working with extended linear linked dynamic data structures, in particular, pattern-based verification is considered. In this approach, one can abstract memory configurations by abstracting away the exact number of adjacent occurrences of certain memory patterns. With respect to the previous work on the subject the method presented in the paper has been extended to be able to handle multiple patterns, which allows for verification of programs working with more types of structures and/or with structures with irregular shapes. The experimental results obtained from a prototype implementation of the method show that the method is very competitive and offers a big potential for future extensions.  相似文献   
93.
In this paper, we propose a method for network intrusion detection based on language models. Our method proceeds by extracting language features such as n-grams and words from connection payloads and applying unsupervised anomaly detection—without prior learning phase or presence of labeled data. The essential part of this procedure is linear-time computation of similarity measures between language models of connection payloads. Particular patterns in these models decisive for differentiation of attacks and normal data can be traced back to attack semantics and utilized for automatic generation of attack signatures. Results of experiments conducted on two datasets of network traffic demonstrate the importance of high-order n-grams and variable-length language models for detection of unknown network attacks. An implementation of our system achieved detection accuracy of over 80% with no false positives on instances of recent remote-to-local attacks in HTTP, FTP and SMTP traffic.  相似文献   
94.
We derive nonlinear and linear state-space control models for a multichannel semiconductor optical amplifier. Verified against the governing partial differential equations through simulation, the linear model tracks modulations up to 20% qualitatively well. Linear feedback control is then employed to design two interchannel crosstalk suppressing systems, one using state feedback into the electronic drive current and the other using optical output feedback into an optical control channel; the controller designed with the linear model is seen to work well even with 100% modulations of the nonlinear system. This linear state-space model opens the way for further robust analysis, design and control of integrated active photonic circuits  相似文献   
95.
96.
Genetic algorithm for balancing reconfigurable machining lines   总被引:2,自引:0,他引:2  
We consider the problem of designing a reconfigurable machining line. Such a line is composed of a sequence of workstations performing specific sets of operations. Each workstation is comprised of several identical CNC machines (machining centers). The line is required to satisfy the given precedence order, inclusion, exclusion and accessibility constraints on the given set of operations. Inclusion and exclusion are zoning constraints which oblige or forbid certain operations to be performed on the same workstation. The accessibility constraints imply that each operation has a set of possible part positions under which it can be performed. All the operations performed on the same workstation must have a common part position. Workstation times are computed taking into account processing and setup times for operations and must not exceed a given bound. The number of CNC machines at one workstation is limited, and the total number of machines must be minimized. A genetic algorithm is proposed. This algorithm is based on the permutation representation of solutions. A heuristic decoder is suggested to construct a solution from a permutation, so that the output solution is feasible w.r.t. precedence, accessibility, cycle time, and exclusion constraints. The other constraints are treated with a penalty approach. For a local improvement of solutions, a mixed integer programming model is suggested for an optimal design of workstations if the order of operations is fixed. An experimental evaluation of the proposed GA on large scale test instances is performed.  相似文献   
97.
In this article we report on our experience in computing resultants of bivariate polynomials on Graphics Processing Units (GPU). Following the outline of Collins’ modular approach [6], our algorithm starts by mapping the input polynomials to a finite field for sufficiently many primes mm. Next, the GPU algorithm evaluates the polynomials at a number of fixed points x∈ZmxZm, and computes a set of univariate resultants for each modular image. Afterwards, the resultant is reconstructed using polynomial interpolation and Chinese remaindering. The GPU returns resultant coefficients in the form of Mixed Radix (MR) digits. Finally, large integer coefficients are recovered from the MR representation on the CPU. All computations performed by the algorithm (except for, partly, Chinese remaindering) are outsourced to the graphics processor thereby minimizing the amount of work to be done on the host machine. The main theoretical contribution of this work is the modification of Collins’ modular algorithm using the methods of matrix algebra to make an efficient realization on the GPU feasible. According to the benchmarks, our algorithm outperforms a CPU-based resultant algorithm from 64-bit Maple 14 by a factor of 100.  相似文献   
98.
99.
100.
Two main chemistry systems of micro-inclusions can be identified in ductile iron: Ca-S-X and Mg-Si-O-X with the majority of the inclusions regardless of treatment type and location being of the second type, silicates. Laboratory investigations have shown that simple silicates were present in the matrix, while more complex silicates were present in conjunction with graphite, probably acting as graphite nucleation sites. In these more complex silicates, elevated levels of Al, Ca, Ce and La were typical. Comparing micro-particles embedded in iron matrix and graphite nodules of iron treated with pure Mg-metal and iron treated with MgFeSi alloy showed a higher amount of complex silicates with elevated Al-levels in the iron treated with MgFeSi. Further laboratory investigation was undertaken to explore which source of Al and which range of residual Al would have a favorable impact on the graphite nucleation in ductile iron. The work showed that a residual aluminum of 0.005 to 0.020 wt.% appears to be beneficial for improving ductile iron solidification characteristics without the incidence of pinholes. Greatest benefits were achieved when introducing the Al into the iron via an inoculant late during processing or via a pre-conditioner to the base iron. Al added via the MgFeSi provided less benefit. Some case studies illustrating the effect of Al in ductile iron are also presented, as Al-containing pre-conditioner or/and Al-bearing, FeSi inoculant application.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号