首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   330篇
  免费   12篇
  国内免费   1篇
电工技术   3篇
化学工业   44篇
金属工艺   6篇
机械仪表   4篇
建筑科学   3篇
矿业工程   1篇
能源动力   19篇
轻工业   31篇
无线电   23篇
一般工业技术   68篇
冶金工业   87篇
原子能技术   2篇
自动化技术   52篇
  2023年   3篇
  2022年   10篇
  2021年   13篇
  2020年   3篇
  2019年   11篇
  2018年   15篇
  2017年   12篇
  2016年   9篇
  2015年   7篇
  2014年   9篇
  2013年   24篇
  2012年   16篇
  2011年   15篇
  2010年   17篇
  2009年   24篇
  2008年   18篇
  2007年   23篇
  2006年   20篇
  2005年   10篇
  2004年   8篇
  2003年   15篇
  2002年   11篇
  2001年   6篇
  2000年   8篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   1篇
  1993年   2篇
  1992年   4篇
  1990年   2篇
  1988年   2篇
  1987年   1篇
  1985年   4篇
  1984年   4篇
  1983年   3篇
  1981年   1篇
  1980年   2篇
  1979年   1篇
  1976年   1篇
  1975年   1篇
  1973年   1篇
排序方式: 共有343条查询结果,搜索用时 250 毫秒
1.
2.
A semianalytical model is developed for computing drawdowns in and around a partially penetrating large diameter well. The new model can take into account an unsteady pumping discharge and thus drawdowns during recovery can be computed. This model can also yield the unsteady contributions from well and aquifer storages to the pumped discharge. While developing the model, the flow from the bottom of the well is also accounted.  相似文献   
3.
We describe a new parallel data structure, namely parallel heap, for exclusive-read exclusive-write parallel random access machines. To our knowledge, it is the first such data structure to efficiently implement a truly parallel priority queue based on a heap structure. Employing p processors, the parallel heap allows deletions of (p) highest priority items and insertions of (p) new items, each in O(log n) time, where n is the size of the parallel heap. Furthermore, it can efficiently utilize processors in the range 1 through n.This work was supported by U.S. Army's PM-TRADE contract N61339-88-g-0002, Florida High Technology and Industry grant 11-28-716, and Georgia State University's internal research support during spring and summer quarters, 1991.  相似文献   
4.
5.
Snigdha Sushil  Vidya S. Batra   《Fuel》2006,85(17-18):2676-2679
The study investigates the heavy metal content of fly ash and bottom ash from three major power plants in North India, using flame atomic absorption spectrometry. It also studies the prevalent disposal methods used at these sites. The ashes were analysed for the presence of Cr, Mn, Pb, Zn, Cu, Ni and Co and detectable levels of all were found in both fly ash and bottom ash. The concentrations of Cr and Zn were highest while Co concentration was less. The wet disposal method is used in two of the power plants (site 1 and site 3). Neither of the sites uses ash pond lining in the construction of the ash ponds, hence leaching of the heavy metals is possible. Site 2 has adopted 100% dry disposal system which allows better utilization but incurs additional costs. Better management practices, increased utilization and proper disposal practices need to be undertaken to minimize the adverse environmental impact.  相似文献   
6.
Noble metal (Rh, Pt, Pd, Ir, Ru, and Ag) and Ni catalysts supported on CeO2–Al2O3 were investigated for water gas shift reaction at ultrahigh temperatures. Pt/CeO2–Al2O3 and Ru/CeO2–Al2O3 demonstrated as the best catalysts in terms of activity, hydrogen yield and hydrogen selectivity. At 700 °C and steam to CO ratio of 5.2:1, Pt/CeO2–Al2O3 converted 76.3% of CO with 94.7% of hydrogen selectivity. At the same conditions, the activity and hydrogen selectivity for Ru/CeO2–Al2O3 were 63.9% and 85.6%, respectively. Both catalysts showed a good stability over 9 h of continuous operation. However, both catalysts showed slight deactivation during the test period. The study revealed that Pt/CeO2–Al2O3 and Ru/CeO2–Al2O3 were excellent ultrahigh temperature water gas shift catalysts, which can be coupled with biomass gasification in a downstream reactor.  相似文献   
7.
Multimedia Tools and Applications - A new cryptographic model is proposed incorporating intertwining logistic map based confusion process and two dimensional Brownian Motion based diffusion...  相似文献   
8.
A major feature of the emerging geo-social networks is the ability to notify a user when any of his friends (also called buddies) happens to be geographically in proximity. This proximity service is usually offered by the network itself or by a third party service provider (SP) using location data acquired from the users. This paper provides a rigorous theoretical and experimental analysis of the existing solutions for the location privacy problem in proximity services. This is a serious problem for users who do not trust the SP to handle their location data and would only like to release their location information in a generalized form to participating buddies. The paper presents two new protocols providing complete privacy with respect to the SP and controllable privacy with respect to the buddies. The analytical and experimental analysis of the protocols takes into account privacy, service precision, and computation and communication costs, showing the superiority of the new protocols compared to those appeared in the literature to date. The proposed protocols have also been tested in a full system implementation of the proximity service.  相似文献   
9.

Context

Software developers spend considerable effort implementing auxiliary functionality used by the main features of a system (e.g., compressing/decompressing files, encryption/decription of data, scaling/rotating images). With the increasing amount of open source code available on the Internet, time and effort can be saved by reusing these utilities through informal practices of code search and reuse. However, when this type of reuse is performed in an ad hoc manner, it can be tedious and error-prone: code results have to be manually inspected and integrated into the workspace.

Objective

In this paper we introduce and evaluate the use of test cases as an interface for automating code search and reuse. We call our approach Test-Driven Code Search (TDCS). Test cases serve two purposes: (1) they define the behavior of the desired functionality to be searched; and (2) they test the matching results for suitability in the local context. We also describe CodeGenie, an Eclipse plugin we have developed that performs TDCS using a code search engine called Sourcerer.

Method

Our evaluation consists of two studies: an applicability study with 34 different features that were searched using CodeGenie; and a performance study comparing CodeGenie, Google Code Search, and a manual approach.

Results

Both studies present evidence of the applicability and good performance of TDCS in the reuse of auxiliary functionality.

Conclusion

This paper presents an approach to source code search and its application to the reuse of auxiliary functionality. Our exploratory evaluation shows promising results, which motivates the use and further investigation of TDCS.  相似文献   
10.
Most geometric computer vision problems involve orthogonality constraints. An important subclass of these problems is subspace estimation, which can be equivalently formulated into an optimization problem on Grassmann manifolds. In this paper, we propose to use the conjugate gradient algorithm on Grassmann manifolds for robust subspace estimation in conjunction with the recently introduced generalized projection based M-Estimator (gpbM). The gpbM method is an elemental subset-based robust estimation algorithm that can process heteroscedastic data without any user intervention. We show that by optimizing the orthogonal parameter matrix on Grassmann manifolds, the performance of the gpbM algorithm improves significantly. Results on synthetic and real data are presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号