首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   598篇
  免费   10篇
电工技术   11篇
化学工业   62篇
金属工艺   9篇
机械仪表   10篇
建筑科学   28篇
能源动力   45篇
轻工业   49篇
无线电   76篇
一般工业技术   115篇
冶金工业   67篇
原子能技术   4篇
自动化技术   132篇
  2023年   1篇
  2022年   8篇
  2021年   16篇
  2020年   10篇
  2019年   14篇
  2018年   13篇
  2017年   10篇
  2016年   17篇
  2015年   13篇
  2014年   13篇
  2013年   30篇
  2012年   22篇
  2011年   30篇
  2010年   31篇
  2009年   30篇
  2008年   34篇
  2007年   33篇
  2006年   27篇
  2005年   17篇
  2004年   17篇
  2003年   16篇
  2002年   16篇
  2001年   12篇
  2000年   7篇
  1999年   14篇
  1998年   33篇
  1997年   17篇
  1996年   11篇
  1995年   13篇
  1994年   8篇
  1993年   10篇
  1992年   7篇
  1991年   7篇
  1990年   5篇
  1989年   4篇
  1988年   5篇
  1987年   6篇
  1986年   4篇
  1985年   3篇
  1984年   4篇
  1983年   1篇
  1982年   3篇
  1981年   3篇
  1980年   4篇
  1979年   1篇
  1977年   3篇
  1976年   2篇
  1975年   3篇
排序方式: 共有608条查询结果,搜索用时 203 毫秒
1.
2.
We analysed the ground deformation across two blocks defined by the Rio-Patras fault from 1993 to 2017 using multi-temporal Synthetic Aperture Radar Interferometry (InSAR) techniques. Our main objective was to contribute to the assessment of seismic hazard near the large city of Patras. Multiple data-sets were used, each one covering different temporal periods. Descending and ascending acquisitions, providing different viewing geometries contribute to fully determine the ground displacement in 3D. The data-sets used are from the European Space Agency’s (ESA) European Remote Sensing (ERS), Environmental Satellite (ENVISAT) and SENTINEL-1 as well as German Aerospace Center (DLR) ’s TERRASAR-X missions. Considering ESA’s missions covering both acquisition geometries and long periods, the southern block, showing lack of a sufficient number of scatterers does not allow the displacement characterization. In contrary, the northern block is characterized by a high number of scatterers having values of maximum likehood ranging from ?3.5 to ?4.3 mm year?1 for ascending geometry and from ?1.6 to ?2.7 mm year?1 for the descending one. The fact that both geometries show negative values of displacements are consistent with downlift movement and at the same time the quantitative differentiation probably indicates an horizontal component as well.  相似文献   
3.
This work concerns the micromechanical constitutive modelling, algorithmic implementation and numerical simulation of polycrystalline superelastic alloys under multiaxial loading. The model is formulated in finite deformations and incorporates the effect of texture. The numerical implementation is based on the constrained minimization of the Helmholtz free energy with dissipation. Simulations are conducted for thin tubes of Nitinol under tension–torsion, as well as for a simplified model of a biomedical stent. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
4.
5.
Digital watermarking robust to geometric distortions.   总被引:23,自引:0,他引:23  
In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. We propose a new normalization procedure, which is invariant to affine transform attacks. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. The second approach is based on a watermark resynchronization scheme aimed to alleviate the effects of random bending attacks. In this scheme, a deformable mesh is used to correct the distortion caused by the attack. The watermark is then extracted from the corrected image. In contrast to the first scheme, the latter is suitable for private watermarking applications, where the original image is necessary for watermark detection. In both schemes, we employ a direct-sequence code division multiple access approach to embed a multibit watermark in the discrete cosine transform domain of the image. Numerical experiments demonstrate that the proposed watermarking schemes are robust to a wide range of geometric attacks.  相似文献   
6.
Contents The control-canonical-form (CCF) method is introduced for the purpose of applying it to high-order state-space single-input single or multiple-output (SISO or SIMO) and multiple-input multiple-output (MIMO) linear time-invariant system models to determine closed-loop systems (i.e. design robust controllers) from which enchanced dynamic stability characteristics and overall performance of these systems is achieved. The method has been applied successfully to a SISO 6th-order linearized state-space open-loop model (representing a simplified hydro power system), and to a MIMO 8th-order linearized state-space open-loop model (representing an 87.5 kVA synchronous machine with conventional exciter supplying power to an electric utility system through an interconnection network)
Anwendung der kanonischen Form der Zustandsrückführung auf Erzeugersysteme zur Verbesserung der dynamischen Stabilitätseigenschaften
Übersicht Die Methode der kanonischen Form wird auf lineare zeitinvariante Systeme höherer Ordnung im Zustandsraum angewendet, die eine oder mehrere Eingangsgrößen bei einer oder mehreren Ausgangsgrößen aufweisen. Damit werden robuste Regler entworfen, welche die dynamische Stabilität und das gesamte Betriebsverhalten verbessern. Die Methode wurde erfolgreich auf ein linearisiertes Modell sechster Ordnung mit einem Eingang und einem Ausgang angewendet, das vereinfachend eine Wasserkraftanlage darstellt; außerdem auf ein linearisiertes Zustandsmodell achter Ordnung einer Synchronmaschine 87,5kVA mit konventioneller Erregung, die über ein Verbindungsnetzwerk in das öffentliche Netz einspeist.
  相似文献   
7.
8.
9.
Improving Awareness in Mobile CSCW   总被引:1,自引:0,他引:1  
The diffusion of mobile devices in the working landscape is promoting collaboration across time and space. Following through this development, we investigate opportunities for improving awareness in mobile environments with a view to enable collaboration under power constraints and transitory network disconnections. We elaborate in particular on synchronous CSCW and expose with it significant details of group awareness, while we contribute a protocol for awareness support over large areas that strikes a balance between energy consumption and notification time. To avoid user disruption, this protocol notifies awareness information in a multicast fashion, while the bandwidth is allocated dynamically among notifications and data requests, thus minimizing the time needed by each one of them and ensuring the isochronous delivery of information to all clients. The efficiency and scalability of our protocol are evaluated with simulation experiments, whereby we compare various notification schemes and finally choose one that changes dynamically over time.  相似文献   
10.
The IEEE 802.11 MAC protocol has gained widespread popularity and has been adopted as the de-facto layer 2 protocol for wireless local area networks (WLANs). However, it is well known that as the number of competing stations increases, the performance of the protocol degrades dramatically. Given the explosive growth in WLANs’ usage, the question of how to sustain each user’s perceived performance when a large number of competing stations are present, is an important and challenging open research problem.Motivated by this, in this paper we analyze the behavior of 802.11-based WLANs as the number of competing stations increases, and attempt to provide concrete answers to the following fundamental questions: (i) is there a set of system and protocol parameters that we can scale in order to sustain each individual user’s perceived performance, and (ii) what is the minimum scaling factor?Using theoretical analysis coupled with extensive simulations we show that such a set of parameters exists, and that the minimum scaling factor is equal to the factor by which the number of users increases. Our results reveal several important scaling properties that exist in today’s 802.11-based wireless networks, and set guidelines for designing future versions of such networks that can efficiently support a very large number of users.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号