首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2149篇
  免费   31篇
  国内免费   1篇
电工技术   29篇
综合类   5篇
化学工业   471篇
金属工艺   43篇
机械仪表   39篇
建筑科学   103篇
矿业工程   21篇
能源动力   41篇
轻工业   166篇
水利工程   11篇
石油天然气   14篇
无线电   159篇
一般工业技术   301篇
冶金工业   403篇
原子能技术   20篇
自动化技术   355篇
  2021年   15篇
  2020年   16篇
  2019年   19篇
  2018年   27篇
  2017年   16篇
  2016年   25篇
  2015年   21篇
  2014年   27篇
  2013年   103篇
  2012年   57篇
  2011年   87篇
  2010年   68篇
  2009年   84篇
  2008年   84篇
  2007年   77篇
  2006年   74篇
  2005年   65篇
  2004年   72篇
  2003年   67篇
  2002年   65篇
  2001年   53篇
  2000年   37篇
  1999年   42篇
  1998年   56篇
  1997年   58篇
  1996年   55篇
  1995年   36篇
  1994年   50篇
  1993年   31篇
  1992年   30篇
  1991年   27篇
  1990年   24篇
  1989年   26篇
  1988年   28篇
  1987年   34篇
  1986年   21篇
  1985年   25篇
  1984年   46篇
  1983年   29篇
  1982年   31篇
  1981年   32篇
  1980年   22篇
  1979年   32篇
  1978年   20篇
  1977年   31篇
  1976年   21篇
  1975年   25篇
  1974年   15篇
  1973年   19篇
  1971年   12篇
排序方式: 共有2181条查询结果,搜索用时 521 毫秒
1.
The Two-Dimensional Clifford-Fourier Transform   总被引:1,自引:0,他引:1  
Recently several generalizations to higher dimension of the Fourier transform using Clifford algebra have been introduced, including the Clifford-Fourier transform by the authors, defined as an operator exponential with a Clifford algebra-valued kernel. In this paper an overview is given of all these generalizations and an in depth study of the two-dimensional Clifford-Fourier transform of the authors is presented. In this special two-dimensional case a closed form for the integral kernel may be obtained, leading to further properties, both in the L 1 and in the L 2 context. Furthermore, based on this Clifford-Fourier transform Clifford-Gabor filters are introduced. AMS subject classification numbers: 42B10, 30G35 Fred Brackx received a diploma degree in mathematics from Ghent University, Belgium, in 1970 and a Ph.D. degree in mathematics from the same university in 1973. Since 1984 he is professor for mathematical analysis at Ghent University and currently he is leading the Clifford Research Group. His main interests are function theory and functional analysis for functions with values in quaternion and Clifford algebras. The research covers Clifford distributions, generalized Fourier, Radon and Hilbert transforms, orthogonal polynomials and multi-dimensional wavelets. Nele De Schepper received a diploma degree in mathematics from Ghent University, Belgium, in 2001. Since then she holds an assistantship at the Department of Mathematical Analysis of Ghent University and is a member of the Clifford Research Group. Her main interests are function theory and functional analysis for functions with values in Clifford algebras. The research covers generalized Fourier transforms, orthogonal polynomials and multi-dimensional wavelets. Frank Sommen received a diploma degree in mathematics from Ghent University, Belgium, in 1978, a Ph.D. degree in mathematics from the same university in 1980, and a habilitation degree in mathematical analysis in 1984. From 1978 until 1999 he was at the National Fund for Scientific Research (Flanders). Since 2000 he holds a Research professorship at Ghent University. His main interests are function theory and functional analysis for functions with values in quaternion and Clifford algebras. The research covers Clifford distributions, generalized Fourier, Radon and Hilbert transforms, orthogonal polynomials and multi-dimensional wavelets, algebraic analysis, hyperfunctions and radial algebra.  相似文献   
2.
Currently there are design barriers inhibiting the implementation of high-precision digital signal processing (DSP) objects with field programmable logic (FPL) devices. This paper explores overcoming these barriers by fusing together the popular distributed arithmetic (DA) method with the residue number system (RNS) for use in FPL-centric designs. The new design paradigm is studied in the context of a high-performance filter bank and a discrete wavelet transform (DWT). The proposed design paradigm is facilitated by a new RNS accumulator structure based on a carry save adder (CSA). The reported methodology also introduces a polyphase filter structure that results in a reduced look-up table (LUT) budget. The 2C-DA and RNS-DA are compared, in the context of a FPL implementation strategy, using a discrete wavelet transform (DWT) filter bank as a common design theme. The results show that the RNS-DA, compared to a traditional 2C-DA design, enjoys a performance advantage that increases with precision (wordlength).  相似文献   
3.
In this paper we present a general strategy for finding efficient permutation routes in parallel networks. Among the popular parallel networks to which the strategy applies are mesh networks, hypercube networks, hypercube-derivative networks, ring networks, and star networks. The routes produced are generally congestion-free and take a number of routing steps that is within a small constant factor of the diameter of the network. Our basic strategy is derived from an algorithm that finds (in polynomial time) efficient permutation routes for aproduct network, G×H, given efficient permutation routes forG andH. We investigate the use of this algorithm for routingmultiple permutations and extend its applicability to a wide class of graphs, including several families ofCayley graphs. Finally, we show that our approach can be used to find efficient permutation routes among the remaining live nodes infaulty networks.This research was supported in part by a grant from the NSF, Grant No. CCR-88-12567.  相似文献   
4.
A new and simple method of finite-element grid improvement is presented. The objective is to improve the accuracy of the analysis. The procedure is based on a minimization of the trace of the stiffness matrix. For a broad class of problems this minimization is seen to be equivalent to minimizing the potential energy. The method is illustrated with the classical tapered bar problem examined earlier by Prager and Masur. Identical results are obtained.  相似文献   
5.
6.
IEEE Security & Privacy's associate editor in chief discusses technology's role in identity fraud and identity theft.  相似文献   
7.
The current study investigated the impact of requiring respondents to elaborate on their answers to a biodata measure on mean scores, the validity of the biodata item composites, subgroup mean differences, and correlations with social desirability. Results of this study indicate that elaborated responses result in scores that are much lower than nonelaborated responses to the same items by an independent sample. Despite the lower mean score on elaborated items, it does not appear that elaboration affects the size of the correlation between social desirability and responses to biodata items or that it affects criterion-related validity or subgroup mean differences in a practically significant way. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
9.
10.
Fred Y. Ye 《Scientometrics》2007,71(3):407-413
There exists a quantitative relationship, which can be expressed as G=kF(lgP)N, where G is per capita GDP, F gross expenditure on R&D as % of GDP, P patent applications, N Internet users per 10,000 inhabitants, and k a constant ranging from 0.4 to 1.2 in most countries. The mechanism of the relationship is explained in the paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号