首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2752篇
  免费   211篇
  国内免费   14篇
电工技术   51篇
综合类   17篇
化学工业   624篇
金属工艺   75篇
机械仪表   43篇
建筑科学   137篇
矿业工程   5篇
能源动力   141篇
轻工业   131篇
水利工程   12篇
石油天然气   7篇
无线电   282篇
一般工业技术   601篇
冶金工业   209篇
原子能技术   8篇
自动化技术   634篇
  2023年   60篇
  2022年   41篇
  2021年   167篇
  2020年   108篇
  2019年   106篇
  2018年   111篇
  2017年   122篇
  2016年   134篇
  2015年   101篇
  2014年   165篇
  2013年   197篇
  2012年   213篇
  2011年   225篇
  2010年   143篇
  2009年   142篇
  2008年   126篇
  2007年   103篇
  2006年   89篇
  2005年   47篇
  2004年   54篇
  2003年   48篇
  2002年   43篇
  2001年   36篇
  2000年   31篇
  1999年   32篇
  1998年   58篇
  1997年   38篇
  1996年   25篇
  1995年   22篇
  1994年   9篇
  1993年   13篇
  1992年   15篇
  1991年   11篇
  1990年   18篇
  1989年   4篇
  1988年   5篇
  1987年   5篇
  1985年   6篇
  1983年   7篇
  1982年   5篇
  1981年   8篇
  1979年   5篇
  1978年   6篇
  1976年   9篇
  1975年   9篇
  1974年   5篇
  1973年   4篇
  1972年   6篇
  1971年   4篇
  1963年   5篇
排序方式: 共有2977条查询结果,搜索用时 484 毫秒
71.
Top-k query processing is a fundamental building block for efficient ranking in a large number of applications. Efficiency is a central issue, especially for distributed settings, when the data is spread across different nodes in a network. This paper introduces novel optimization methods for top-k aggregation queries in such distributed environments. The optimizations can be applied to all algorithms that fall into the frameworks of the prior TPUT and KLEE methods. The optimizations address three degrees of freedom: 1) hierarchically grouping input lists into top-k operator trees and optimizing the tree structure, 2) computing data-adaptive scan depths for different input sources, and 3) data-adaptive sampling of a small subset of input sources in scenarios with hundreds or thousands of query-relevant network nodes. All optimizations are based on a statistical cost model that utilizes local synopses, e.g., in the form of histograms, efficiently computed convolutions, and estimators based on order statistics. The paper presents comprehensive experiments, with three different real-life datasets and using the ns-2 network simulator for a packet-level simulation of a large Internet-style network.  相似文献   
72.
The efficiency of the valve-less rectification micropump depends primarily on the microfluidic diodicity (the ratio of the backward pressure drop to the forward pressure drop). In this study, different rectifying structures, including the conventional structures (nozzle/diffuser and Tesla structures), were investigated at very low Reynolds numbers (between 0.2 and 60). The rectifying structures were characterized with respect to their design, and a numerical approach was illustrated to calculate the diodicity for the rectifying structures. In this study, the microfluidic diodicity was evaluated numerically for different rectifying structures including half circle, semicircle, heart, triangle, bifurcation, nozzle/diffuser, and Tesla structures. The Lattice Boltzmann Method (LBM) was utilized as a numerical method to simulate the fluid flow in the microscale. The results suggest that at very low Reynolds number flow, rectification and multifunction micropumping may be achievable by using a number of the presented structures. The results for the conventional structures agree with the reported results.  相似文献   
73.
In this paper, a moving horizon state and parameter estimation scheme for chromatographic simulated moving bed SMB processes is proposed. The simultaneous state and parameter estimation is based on a high-order nonlinear SMB model which incorporates rigorous models of the chromatographic columns and the discrete shiftings of the inlet and outlet ports. The estimation is performed using sparse measurement information: the concentrations of the components are only measured at the two outlet ports (which are periodically switched from one column to the next) and at one fixed location between two columns. The goal is to reconstruct the full state of the system, i.e. the concentration profiles along all columns, and to identify critical model parameters reliably such that the estimated model can be used in the context of online optimizing control. The state estimation scheme is based upon a deterministic model within the prediction horizon, state noise is only present in the state and the parameters prior to and at the beginning of the horizon. By solving the optimization problem with a multiple-shooting method and applying a real-time iteration scheme, the computation times are such that the scheme can be applied online. Numerical simulations of a validated model for a separation problem with nonlinear isotherms of the Langmuir type demonstrate the efficiency of the algorithm.  相似文献   
74.
In this study, we analyze the criticality of nodes in air transportation using techniques from three different domains, and thus, three essentially different perspectives of criticality. First, we examine the unweighted structure of air transportation networks, using recent methods from control theory (maximum matching and minimum dominating set). Second, complex network metrics (betweenness and closeness) are used with passenger traffic as weights. Third, ticket data-level analysis (origin-destination betweenness and outbound traffic with transit threshold) is performed. Remarkably, all techniques identify a different set of critical nodes; while, in general, giving preference to the selection of high-degree nodes. Our evaluation on the international air transportation country network suggests that some countries, e.g., United States, France, and Germany, are critical from all three perspectives. Other countries, e.g., United Arab Emirates and Panama, have a very specific influence, by controlling the passenger traffic of their neighborhood countries. Furthermore, we assess the criticality of the country network using Multi-Criteria Decision Analysis (MCDA) techniques. United States, Great Britain, Germany, and United Arab Emirates are identified as non-dominated countries; Sensitivity analysis shows that United Arab Emirates is most sensitive to the preference information on the outbound traffic. Our work gears towards a better understanding of node criticality in air transportation networks. This study also stipulates future research possibilities on criticality in general transportation networks.  相似文献   
75.
76.
Continuous-time quantum Monte Carlo impurity solvers are algorithms that sample the partition function of an impurity model using diagrammatic Monte Carlo techniques. The present paper describes codes that implement the interaction expansion algorithm originally developed by Rubtsov, Savkin, and Lichtenstein, as well as the hybridization expansion method developed by Werner, Millis, Troyer, et al. These impurity solvers are part of the ALPS-DMFT application package and are accompanied by an implementation of dynamical mean-field self-consistency equations for (single orbital single site) dynamical mean-field problems with arbitrary densities of states.

Program summary

Program title: dmftCatalogue identifier: AEIL_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEIL_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: ALPS LIBRARY LICENSE version 1.1No. of lines in distributed program, including test data, etc.: 899 806No. of bytes in distributed program, including test data, etc.: 32 153 916Distribution format: tar.gzProgramming language: C++Operating system: The ALPS libraries have been tested on the following platforms and compilers:
  • • 
    Linux with GNU Compiler Collection (g++ version 3.1 and higher), and Intel C++ Compiler (icc version 7.0 and higher)
  • • 
    MacOS X with GNU Compiler (g++ Apple-version 3.1, 3.3 and 4.0)
  • • 
    IBM AIX with Visual Age C++ (xlC version 6.0) and GNU (g++ version 3.1 and higher) compilers
  • • 
    Compaq Tru64 UNIX with Compq C++ Compiler (cxx)
  • • 
    SGI IRIX with MIPSpro C++ Compiler (CC)
  • • 
    HP-UX with HP C++ Compiler (aCC)
  • • 
    Windows with Cygwin or coLinux platforms and GNU Compiler Collection (g++ version 3.1 and higher)
RAM: 10 MB–1 GBClassification: 7.3External routines: ALPS [1], BLAS/LAPACK, HDF5Nature of problem: (See [2].) Quantum impurity models describe an atom or molecule embedded in a host material with which it can exchange electrons. They are basic to nanoscience as representations of quantum dots and molecular conductors and play an increasingly important role in the theory of “correlated electron” materials as auxiliary problems whose solution gives the “dynamical mean field” approximation to the self-energy and local correlation functions.Solution method: Quantum impurity models require a method of solution which provides access to both high and low energy scales and is effective for wide classes of physically realistic models. The continuous-time quantum Monte Carlo algorithms for which we present implementations here meet this challenge. Continuous-time quantum impurity methods are based on partition function expansions of quantum impurity models that are stochastically sampled to all orders using diagrammatic quantum Monte Carlo techniques. For a review of quantum impurity models and their applications and of continuous-time quantum Monte Carlo methods for impurity models we refer the reader to [2].Additional comments: Use of dmft requires citation of this paper. Use of any ALPS program requires citation of the ALPS [1] paper.Running time: 60 s–8 h per iteration.References:
  • [1] 
    A. Albuquerque, F. Alet, P. Corboz, et al., J. Magn. Magn. Mater. 310 (2007) 1187.
  • [2] 
    http://arxiv.org/abs/1012.4474, Rev. Mod. Phys., in press.
  相似文献   
77.
During summer and autumn 2007, a 11 GHz microwave radiometer was deployed in an experimental tree plantation in Sardinilla, Panama. The opacity of the tree canopy was derived from incoming brightness temperatures received on the ground. A collocated eddy-covariance flux tower measured water vapor fluxes and meteorological variables above the canopy. In addition, xylem sapflow of trees was measured within the flux tower footprint. We observed considerable diurnal differences between measured canopy opacities and modeled theoretical opacities that were closely linked to xylem sapflow. It is speculated that dielectric changes in the leaves induced by the sapflow are causing the observed diurnal changes. In addition, canopy intercepted rain and dew formation also modulated the diurnal opacity cycle. With an enhanced canopy opacity model accounting for water deposited on the leaves, we quantified the influence of canopy stored water (i.e. intercepted water and dew) on the opacity. A time series of dew formation and rain interception was directly monitored during a period of two weeks. We found that during light rainfall up to 60% of the rain amount is intercepted by the canopy whereas during periods of intense rainfall only 4% were intercepted. On average, 0.17 mm of dew was formed during the night. Dew evaporation contributed 5% to the total water vapor flux measured above the canopy.  相似文献   
78.
Contention resolution schemes in optical burst switched networks (OBS) as well as contention avoidance schemes delay burst delivery and change the burst arrival sequence. The burst arrival sequence usually changes the packet arrival sequence and degrades the upper layer protocols performance, e.g., the throughput of the transmission control protocol (TCP).In this paper, we present and analyze a detailed burst reordering model for two widely applied burst assembly strategies: time-based and random selection. We apply the IETF reordering metrics and calculate explicitly three reordering metrics: the reordering ratio, the reordering extent metric and the TCP relevant metric. These metrics allow estimating the degree of reordering in a certain network scenario. They estimate the buffer space at the destination to resolve reordering and quantify the number of duplicate acknowledgements relevant for investigations on the transmission control protocol.We show that our model reflects the burst/packet reordering pattern of simulated OBS networks very well. Applying our model in a network emulation scenario, enables investigations on real protocol implementations in network emulation environments. It therefore serves as a substitute for extensive TCP over OBS network simulations with a focus on burst reordering.  相似文献   
79.
Aligning DNA and protein sequences is a core technique in molecular biology. Often, it is desirable to include partial prior knowledge and conditions in an alignment. Going beyond prior work, we aim at the integration of such side constraints in free combination into alignment algorithms. The most common and successful technique for efficient alignment algorithms is dynamic programming (DP). However, a weakness of DP is that one cannot include additional constraints without specifically tailoring a new DP algorithm. Here, we discuss a declarative approach that is based on constraint techniques and show how it can be extended by formulating additional knowledge as constraints. We take special care to obtain the efficiency of DP for sequence alignment. This is achieved by careful modeling and applying proper solving strategies. Finally, we apply our method to the scanning for RNA motifs in large sequences. This case study demonstrates how the new approach can be used in real biological problems. A prototypic implementation of the method is available at .  相似文献   
80.
As we can show that the two-variable monadic fragment of thefull first-order extension of the propositional branching time logic is not recursively enumerable, we show in thisarticle that the monodic fragment of can be axiomatized.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号