首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   319篇
  免费   9篇
电工技术   5篇
综合类   2篇
化学工业   53篇
金属工艺   4篇
机械仪表   5篇
建筑科学   2篇
能源动力   42篇
轻工业   9篇
水利工程   1篇
石油天然气   3篇
无线电   70篇
一般工业技术   45篇
冶金工业   1篇
原子能技术   1篇
自动化技术   85篇
  2024年   1篇
  2023年   26篇
  2022年   25篇
  2021年   22篇
  2020年   19篇
  2019年   26篇
  2018年   19篇
  2017年   26篇
  2016年   20篇
  2015年   18篇
  2014年   29篇
  2013年   21篇
  2012年   9篇
  2011年   10篇
  2010年   8篇
  2009年   6篇
  2008年   2篇
  2007年   6篇
  2006年   3篇
  2005年   6篇
  2004年   2篇
  2003年   1篇
  2002年   3篇
  2001年   2篇
  2000年   1篇
  1998年   2篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1989年   1篇
  1987年   6篇
  1986年   2篇
  1985年   2篇
排序方式: 共有328条查询结果,搜索用时 546 毫秒
1.
2.
Dharmender  Nigam  Kaushal 《SILICON》2021,13(7):2347-2356
Silicon - In this paper, we investigate the effect of low K dielectric pocket on DC and analog/RF performance in dual material stack gate oxide double gate tunnel field effect transistor. For this,...  相似文献   
3.
In this paper, a tailored blended image adaptive watermarking scheme has been presented, which is based on DWT and SVD. Through this paper an attempt has been made to solve the problem of false positive while maintaining the robustness and imperceptibility with the help of principal component and perceptual tuning of the image. Perceptual tuning is a non-blind technique and based on the objective quality of image. The embedding strength is made dependent on watermark features as well as of host in wavelet domain by using tuning parameter which is user specific. The idea of embedding the principal component of intermediate frequency sub-bands of watermark image into singular values of perceptually tuned intermediate frequency sub-bands of host image have been exploited. The proposed algorithm is providing the adaptive behavior towards the image content for perceptual transparency and at the same time avoiding the possibility of false watermark extraction well supported by a private key, which is necessary at the time of extraction. Thus the proposed watermarking algorithm is a kind of non-blind, image adaptive and suitable for rightful ownership. Various comparative results make the algorithm superior in terms of intentional and non-intentional attacks. Also the algorithm is strong against the print and scan attack.  相似文献   
4.
We study entanglement dynamics of qubit–qutrit pair under Dzyaloshinskii–Moriya (DM) interaction. The qubit–qutrit pair acts as a closed system and one external qubit serve as the environment for the pair. The external qubit interact with qubit of closed system via DM interaction. This interaction frequently kills the entanglement between qubit–qutrit pair, which is also periodically recovered. On the other hand two parameter class of state of qubit–qutrit pair also affected by DM interaction and one parameter class of state remains unaffected. The frequency of occurrence of entanglement sudden death and entanglement sudden birth in two parameter class of state is half than qubit–qutrit pure state. We used our quantification of entanglement as negativity measure.  相似文献   
5.
Wireless Personal Communications - Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes...  相似文献   
6.
Coarse frequency offset estimate and tracking of residual frequency offset are two crucial stages for frequency synchronization in OFDM based WLAN systems. An improved frequency offset estimation scheme is proposed for tracking residual offset. The estimation scheme is dependent on the position of an OFDM symbol in a frame.  相似文献   
7.
Software reliability is one of the most important quality attributes of commercial software. During software testing, software reliability growth models (SRGMs) are commonly used to describe the phenomenon of failure occurrence and/or fault removal which consequently enhancements software reliability. Large software systems are developed by integrating a number of relatively small and independent modules, which are tested independently during module testing phase. The amount of testing resource available is limited which is desired to be consumed judiciously so as to optimize the testing process. In this paper we formulate a resource allocation problem of minimizing the cost of software testing under available amount of testing resource, given a reliability constraint. We use a flexible SRGM considering testing effort which, depending upon the values of parameters, can describe either exponential or S-shaped failure pattern of software modules. A systematic and sequential Algorithm is proposed to solve the optimization problem formulated. Numerical examples are given to illustrate the formulation and solution procedures. Sensitivity analysis is performed to examine the behavior of some parameters of SRGM with most significant influence.  相似文献   
8.
Scheduling, in many application domains, involves optimization of multiple performance metrics. For example, application workflows with real-time constraints have strict throughput requirements and also desire a low latency or response time. In this paper, we present a novel algorithm for the scheduling of workflows that act on a stream of input data. Our algorithm focuses on the two performance metrics, latency and throughput, and minimizes the latency of workflows while satisfying strict throughput requirements. We also describe steps to use the above approach to solve the problem of meeting latency requirements while maximizing throughput. We leverage pipelined, task and data parallelism in a coordinated manner to meet these objectives and investigate the benefit of task duplication in alleviating communication overheads in the pipelined schedule for different workflow characteristics. The proposed algorithm is designed for a realistic bounded multi-port communication model, where each processor can simultaneously communicate with at most k distinct processors. Experimental evaluation using synthetic benchmarks as well as those derived from real applications shows that our algorithm consistently produces lower latency schedules that meet throughput requirements, even when previously proposed schemes fail.  相似文献   
9.
Large amount of literature is presently available on the topic of scour around uniform piers and its control. However, relatively fewer studies have been carried out so far on the topic of flow field and scour around compound piers. The state of art on the topic of flow structure and scour around circular compound piers is presented herein. The available literature reveals that variations in foundation and pier geometry significantly affect the maximum depth of scour and its temporal variation. In case of compound piers the scour depth is highly sensitive to the change in elevation of the top surface of the foundation well. As compared to uniform piers, a reduction is observed in maximum depth of scour around compound pier when the top surface of the well is kept below the general level of river bed. These observations however are yet to be quantified. Results from an experimental study on flow field around the compound piers are also presented.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号