首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   562篇
  免费   3篇
  国内免费   1篇
电工技术   7篇
化学工业   91篇
金属工艺   16篇
机械仪表   13篇
建筑科学   17篇
能源动力   15篇
轻工业   45篇
水利工程   1篇
石油天然气   1篇
无线电   70篇
一般工业技术   130篇
冶金工业   34篇
原子能技术   2篇
自动化技术   124篇
  2023年   2篇
  2022年   6篇
  2021年   6篇
  2020年   13篇
  2019年   7篇
  2018年   11篇
  2017年   16篇
  2016年   8篇
  2015年   8篇
  2014年   28篇
  2013年   36篇
  2012年   39篇
  2011年   42篇
  2010年   34篇
  2009年   37篇
  2008年   26篇
  2007年   35篇
  2006年   34篇
  2005年   36篇
  2004年   26篇
  2003年   19篇
  2002年   18篇
  2001年   3篇
  2000年   8篇
  1999年   4篇
  1998年   4篇
  1997年   5篇
  1996年   2篇
  1995年   5篇
  1994年   5篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1989年   4篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
  1982年   3篇
  1981年   5篇
  1980年   2篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1968年   2篇
  1967年   2篇
  1957年   1篇
排序方式: 共有566条查询结果,搜索用时 125 毫秒
11.
The dynamics of the erbium doped fiber laser is analysed both experimentally and theoretically. This laser operates spontaneously in self-pulsing, in sinusoidal or in CW regime. Experiments have allowed to determine the control parameters : the cavity losses, the pumping rate and the ion pairs concentration. An antiphase dynamics is observed when the laser operates simultaneously at 1.55 µn and 1.536 µm. The self-pulsing behavior is attributed to a fast energy transfer which occurs between two neighboring ions (pair induced quenching). A simple model considering the active medium as a mixture of isolated ions and ions pairs is developped and leads to a good qualitative agreement with the experimental results.  相似文献   
12.
In this paper, we present the PolyMAX module which enhances network simulator 2 (ns-2), the most popular network simulator used in academia, to provide one of the most complete simulation tools to evaluate the performance of Mobile WiMAX networks. PolyMAX is based on the National Institute of Standards and Technology (NIST) module and our specific contributions consist on the design and implementation of the Quality of Service (QoS) classes and QoS management messages, the uplink access grant-request mechanisms, Adaptive Modulation and Coding, and a scheduler handling all five WiMAX QoS classes. We also present validation results for the different components of our module and typical WiMAX simulation scenarios illustrating its flexibility and some of its features. The PolyMAX module represents an important tool enabling researchers to easily implement their Mobile WiMAX scheduling and Adaptive Modulation and Coding (AMC) algorithms and accurately evaluate their performance for realistic scenarios.  相似文献   
13.
We introduce a new geometric method to generate sphere packings with restricted overlap values. Sample generation is an important, but time-consuming, step that precedes a calculation performed with the discrete element method (DEM). At present, there does not exist any software dedicated to DEM which would be similar to the mesh software that exists for finite element methods (FEM). A practical objective of the method is to build very large sphere packings (several hundreds of thousands) in a few minutes instead of several days as the current dynamic methods do. The developed algorithm uses a new geometric procedure to position very efficiently the polydisperse spheres in a tetrahedral mesh. The algorithm, implemented into YADE-OPEN DEM (open-source software), consists in filling tetrahedral meshes with spheres. In addition to the features of the tetrahedral mesh, the input parameters are the minimum and maximum radii (or their size ratio), and the magnitude of authorized overlaps. The filling procedure is stopped when a target solid fraction or number of spheres is reached. Based on this method, an efficient tool can be designed for DEMs used by researchers and engineers. The generated packings can be isotropic and the number of contacts per sphere is very high due to its geometric procedure. In this paper, different properties of the generated packings are characterized and examples from real industrial problems are presented to show how this method can be used. The current C++ version of this packing algorithm is part of YADE-OPEN DEM [20] available on the web (https://yade-dem.org).  相似文献   
14.
This paper presents a novel approach to optimize the design of planar mechanisms with revolute joints for function generation or path synthesis. The proposed method is based on the use of an extensible-link mechanism model whose strain energy is minimized to find the optimal rigid design. This enables us to get rid of assembly constraints and the use of natural coordinates makes the objective function simpler. Two optimization strategies are developed and then discussed. The first one relies on alternate optimizations of design parameters and point coordinates. The second one uses multiple partial syntheses as starting point for a full synthesis process. The question of finding the global optimum is also addressed and developed. A simple algorithm is proposed to find several local optima among which the designer may choose the best one taking other criteria into account (e.g. stiffness, collision, size,...). Three applications are presented to illustrate the strategies while mentioning their limits.  相似文献   
15.
In this paper, we present new monolithic and compositional algorithms to solve the LTL realizability problem. Those new algorithms are based on a reduction of the LTL realizability problem to a game whose winning condition is defined by a universal automaton on infinite words with a k-co-Büchi acceptance condition. This acceptance condition asks that runs visit at most k accepting states, so it implicitly defines a safety game. To obtain efficient algorithms from this construction, we need several additional ingredients. First, we study the structure of the underlying automata constructions, and we show that there exists a partial order that structures the state space of the underlying safety game. This partial order can be used to define an efficient antichain algorithm. Second, we show that the algorithm can be implemented in an incremental way by considering increasing values of k in the acceptance condition. Finally, we show that for large LTL formulas that are written as conjunctions of smaller formulas, we can solve the problem compositionally by first computing winning strategies for each conjunct that appears in the large formula. We report on the behavior of those algorithms on several benchmarks. We show that the compositional algorithms are able to handle LTL formulas that are several pages long.  相似文献   
16.
Some First-Order Algorithms for Total Variation Based Image Restoration   总被引:1,自引:0,他引:1  
This paper deals with first-order numerical schemes for image restoration. These schemes rely on a duality-based algorithm proposed in 1979 by Bermùdez and Moreno. This is an old and forgotten algorithm that is revealed wider than recent schemes (such as the Chambolle projection algorithm) and able to improve contemporary schemes. Total variation regularization and smoothed total variation regularization are investigated. Algorithms are presented for such regularizations in image restoration. We prove the convergence of all the proposed schemes. We illustrate our study with numerous numerical examples. We make some comparisons with a class of efficient algorithms (proved to be optimal among first-order numerical schemes) recently introduced by Y. Nesterov.  相似文献   
17.
In this paper, a blind digital watermarking scheme for Portable Document Format (PDF) documents is proposed. The proposed method is based on a variant Quantization Index Modulation (QIM) method called Spread Transform Dither Modulation (STDM). Each bit of the secret message is embedded into a group of characters, more specifically in their x-coordinate values. The method exhibits experiments of two opposite objectives: transparency and robustness, and is motivated to present an acceptable distortion value that shows sufficient robustness under high density noises attacks while preserving sufficient transparency.  相似文献   
18.
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always fit with a well defined theoretical value. We present here the correctness proof of the algorithm standardized for the ATM transfer capability called ABR. The proof turned out to produce a key argument during the standardization process of ABR.  相似文献   
19.
The Plasmodium falciparum food vacuole (FV) is a lysosome-like organelle where erythrocyte hemoglobin digestion occurs. It is a favorite target in the development of antimalarials. We have used a tandem mass spectrometry approach to investigate the proteome of an FV-enriched fraction and identified 116 proteins. The electron microscopy analysis and the Western blot data showed that the major component of the fraction was the FV and, as expected, the majority of previously known FV markers were recovered. Of particular interest, several proteins involved in vesicle-mediated trafficking were identified, which are likely to play a key role in FV biogenesis and/or FV protein trafficking. Recovery of parasite surface proteins lends support to the cytostomal pathway of hemoglobin ingestion as a FV trafficking route. We have identified 32 proteins described as hypothetical in the databases. This insight into FV protein content provides new clues towards understanding the biological function of this organelle in P. falciparum.  相似文献   
20.
This paper presents an assessment method to evaluate the quality of object oriented software systems. The assessment method is based on source code abstraction, object–oriented metrics and graphical representation. The metrics used and the underlying model representing the software are presented. The assessment method experiment is part of an industrial research effort with the Bell Canada Quality Engineering and Research Group. It helps evaluators assess the quality and risks associated with software by identifying code fragments presenting unusual characteristics. The assessment method evaluates object–oriented software systems at three levels of granularity: system level, class level and method level. One large C++ and eight Java software systems, for a total of over one million lines of code, are presented as case studies. A critical analysis of the results is presented comparing the systems and the two languages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号