首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   462篇
  免费   21篇
  国内免费   1篇
电工技术   5篇
综合类   1篇
化学工业   95篇
金属工艺   4篇
机械仪表   6篇
建筑科学   16篇
能源动力   34篇
轻工业   25篇
水利工程   1篇
石油天然气   2篇
无线电   48篇
一般工业技术   117篇
冶金工业   32篇
原子能技术   2篇
自动化技术   96篇
  2024年   2篇
  2023年   3篇
  2022年   1篇
  2021年   13篇
  2020年   12篇
  2019年   8篇
  2018年   15篇
  2017年   22篇
  2016年   16篇
  2015年   13篇
  2014年   11篇
  2013年   25篇
  2012年   31篇
  2011年   50篇
  2010年   25篇
  2009年   25篇
  2008年   48篇
  2007年   37篇
  2006年   29篇
  2005年   19篇
  2004年   12篇
  2003年   6篇
  2002年   12篇
  2001年   2篇
  2000年   7篇
  1999年   3篇
  1998年   8篇
  1997年   7篇
  1996年   10篇
  1995年   6篇
  1994年   3篇
  1993年   1篇
  1992年   1篇
  1971年   1篇
排序方式: 共有484条查询结果,搜索用时 15 毫秒
21.
22.
Nanostructured hexolites (40/60), (60/40), (80/20) and microstructured hexolite (60/40) powders are pressed by uniaxial compression to obtain explosive charges. This kind of composition is often used for the synthesis of detonation nanodiamonds. The morphology, density and cohesion of the resulting pellets are analyzed in the light of the different used compression parameters. This study allows optimizing the compression parameters to obtain well suited explosive charges from nanostructured explosive components. A good cohesion of the nanostructured explosive pellets could be obtained with increasing the temperature used for the compression. Another very important point is that the nanostructuring of the composites is maintained for every compression.  相似文献   
23.
This paper presents an application of functional resonance accident models (FRAM) for the safety analysis of complex socio-technological systems, i.e. systems which include not only technological, but also human and organizational components. The supervision of certain industrial domains provides a good example of such systems, because although more and more actions for piloting installations are now automatized, there always remains a decision level (at least in the management of degraded modes) involving human behavior and organizations. The field of application of the study presented here is railway traffic supervision, using modern automatic train supervision (ATS) systems. Examples taken from railway traffic supervision illustrate the principal advantage of FRAM in comparison to classical safety analysis models, i.e. their ability to take into account technical as well as human and organizational aspects within a single model, thus allowing a true multidisciplinary cooperation between specialists from the different domains involved.A FRAM analysis is used to interpret experimental results obtained from a real ATS system linked to a railway simulator that places operators (experimental subjects) in simulated situations involving incidents. The first results show a significant dispersion in performances among different operators when detecting incidents. Some subsequent work in progress aims to make these “performance conditions” more homogeneous, mainly by ergonomic modifications. It is clear that the current human-machine interface (HMI) in ATS systems (a legacy of past technologies that used LED displays) has reached its limits and needs to be improved, for example, by highlighting the most pertinent information for a given situation (and, conversely, by removing irrelevant information likely to distract operators).  相似文献   
24.
This paper presents a software infrastructure being developed to support the implementation of adaptive multiple model simulations. The paper first describes an abstraction of single and multiple model simulations into the individual operational components with a focus on the relationships and transformations that relate them. Building on that abstraction, consideration is then given to how adaptively controlled multiple model simulations can be constructed using existing simulation components interacting through functional interfaces. This includes addressing how experts would provide the infrastructure with the needed components and define the relations and transformations needed to interact with other components, and for users to define the simulations they wish to be executed. Next, a discussion of the software environment used to implement the multiple model simulation infrastructure is given. Finally, there is discussion of the implementation, using this infrastructure, of two multiscale and one multiple fidelity model simulation applications.  相似文献   
25.
A new principle of lidar-radar is theoretically and experimentally investigated. The proposed architecture is based on the use of an rf modulation of the emitted light beam and a direct detection of the backscattered intensity. Use of a radar-processing chain allows one to obtain range and Doppler measurements with the advantages of lidar spatial resolution. We calculate the maximum range of this device, taking into account different possible improvements. In particular, we show that use of a pulsed two-frequency laser and a spatially multimode optical preamplification of the backscattered light leads to calculated ranges larger than 20 km, including the possibility of both range and Doppler measurements. The building blocks of this lidar-radar are tested experimentally: The radar processing of an rf-modulated backscattered cw laser beam is demonstrated at 532 nm, illustrating the Doppler and identification capabilities of the system. In addition, signal-to-noise ratio improvement by optical pre-amplification is demonstrated at 1.06 microm. Finally, a two-frequency passively Q-switched Nd:YAG laser is developed. This laser then permits two-frequency pulses with tunable pulse duration (from 18 to 240 ns) and beat frequency (from 0 to 2.65 GHz) to be obtained.  相似文献   
26.
We provide a detailed analysis of the various problems connected with the development of tunable thin-film filters for wavelength-division multiplexing applications. We examine the relation between the change in layer thickness and the central wavelength shift for various configurations and point out the significance of the structure of the reflectors, the spacer thickness, and the location of the active layers. We describe and compare practical arrangements using either temperature or an electric field as the driving parameter.  相似文献   
27.
This paper addresses in an integrated and systematic fashion the relatively overlooked but increasingly important issue of measuring and characterizing the geometrical properties of nerve cells and structures, an area often called neuromorphology. After discussing the main motivation for such an endeavour, a comprehensive mathematical framework for characterizing neural shapes, capable of expressing variations over time, is presented and used to underline the main issues in neuromorphology. Three particularly powerful and versatile families of neuromorphological approaches, including differential measures, symmetry axes/skeletons, and complexity, are presented and their respective potentials for applications in neuroscience are identified. Examples of applications of such measures are provided based on experimental investigations related to automated dendrogram extraction, mental retardation characterization, and axon growth analysis.  相似文献   
28.
This paper presents the latest results on a block turbo decoder design. We propose a block turbo decoder circuit for the error protection of small data blocks such asAtm cells on anAwgn (additive white Gaussian noise) channel with a code rate close to 0.5. A prototype was developed atEnst Bretagne. It allowsBer (bit error rate) measurements down to 10?9 and uses programmable gate arrays (Fpga Xilinx circuits). The elementary extendedBch code and the data block size can be modified to fit specifications of different applications.  相似文献   
29.
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system’s state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system’s state. When an intruder begins his intrusion, we can deduce, from the alerts generated byidss (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However, with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.  相似文献   
30.
Discrete geometric estimators approach geometric quantities on digitized shapes without any knowledge of the continuous shape. A classical yet difficult problem is to show that an estimator asymptotically converges toward the true geometric quantity as the resolution increases. For estimators of local geometric quantities based on Digital Straight Segment (DSS) recognition this problem is closely linked to the asymptotic growth of maximal DSS for which we show bounds both about their number and sizes on Convex Digital Polygons. These results not only give better insights about digitized curves but indicate that curvature estimators based on local DSS recognition are not likely to converge. We indeed invalidate a conjecture which was essential in the only known convergence theorem of a discrete curvature estimator. The proof involves results from arithmetic properties of digital lines, digital convexity, combinatorics and continued fractions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号