首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1988篇
  免费   31篇
  国内免费   1篇
电工技术   25篇
综合类   5篇
化学工业   451篇
金属工艺   31篇
机械仪表   37篇
建筑科学   101篇
矿业工程   21篇
能源动力   34篇
轻工业   172篇
水利工程   11篇
石油天然气   11篇
无线电   148篇
一般工业技术   260篇
冶金工业   350篇
原子能技术   13篇
自动化技术   350篇
  2020年   13篇
  2019年   15篇
  2018年   19篇
  2016年   18篇
  2015年   21篇
  2014年   28篇
  2013年   100篇
  2012年   47篇
  2011年   84篇
  2010年   60篇
  2009年   78篇
  2008年   82篇
  2007年   78篇
  2006年   76篇
  2005年   64篇
  2004年   64篇
  2003年   65篇
  2002年   62篇
  2001年   50篇
  2000年   34篇
  1999年   45篇
  1998年   36篇
  1997年   39篇
  1996年   43篇
  1995年   30篇
  1994年   46篇
  1993年   24篇
  1992年   31篇
  1991年   27篇
  1990年   27篇
  1989年   25篇
  1988年   25篇
  1987年   36篇
  1986年   20篇
  1985年   25篇
  1984年   44篇
  1983年   30篇
  1982年   29篇
  1981年   30篇
  1980年   20篇
  1979年   34篇
  1978年   20篇
  1977年   30篇
  1976年   20篇
  1975年   25篇
  1974年   15篇
  1973年   18篇
  1972年   11篇
  1971年   13篇
  1969年   11篇
排序方式: 共有2020条查询结果,搜索用时 15 毫秒
1.
The Two-Dimensional Clifford-Fourier Transform   总被引:1,自引:0,他引:1  
Recently several generalizations to higher dimension of the Fourier transform using Clifford algebra have been introduced, including the Clifford-Fourier transform by the authors, defined as an operator exponential with a Clifford algebra-valued kernel. In this paper an overview is given of all these generalizations and an in depth study of the two-dimensional Clifford-Fourier transform of the authors is presented. In this special two-dimensional case a closed form for the integral kernel may be obtained, leading to further properties, both in the L 1 and in the L 2 context. Furthermore, based on this Clifford-Fourier transform Clifford-Gabor filters are introduced. AMS subject classification numbers: 42B10, 30G35 Fred Brackx received a diploma degree in mathematics from Ghent University, Belgium, in 1970 and a Ph.D. degree in mathematics from the same university in 1973. Since 1984 he is professor for mathematical analysis at Ghent University and currently he is leading the Clifford Research Group. His main interests are function theory and functional analysis for functions with values in quaternion and Clifford algebras. The research covers Clifford distributions, generalized Fourier, Radon and Hilbert transforms, orthogonal polynomials and multi-dimensional wavelets. Nele De Schepper received a diploma degree in mathematics from Ghent University, Belgium, in 2001. Since then she holds an assistantship at the Department of Mathematical Analysis of Ghent University and is a member of the Clifford Research Group. Her main interests are function theory and functional analysis for functions with values in Clifford algebras. The research covers generalized Fourier transforms, orthogonal polynomials and multi-dimensional wavelets. Frank Sommen received a diploma degree in mathematics from Ghent University, Belgium, in 1978, a Ph.D. degree in mathematics from the same university in 1980, and a habilitation degree in mathematical analysis in 1984. From 1978 until 1999 he was at the National Fund for Scientific Research (Flanders). Since 2000 he holds a Research professorship at Ghent University. His main interests are function theory and functional analysis for functions with values in quaternion and Clifford algebras. The research covers Clifford distributions, generalized Fourier, Radon and Hilbert transforms, orthogonal polynomials and multi-dimensional wavelets, algebraic analysis, hyperfunctions and radial algebra.  相似文献   
2.
Currently there are design barriers inhibiting the implementation of high-precision digital signal processing (DSP) objects with field programmable logic (FPL) devices. This paper explores overcoming these barriers by fusing together the popular distributed arithmetic (DA) method with the residue number system (RNS) for use in FPL-centric designs. The new design paradigm is studied in the context of a high-performance filter bank and a discrete wavelet transform (DWT). The proposed design paradigm is facilitated by a new RNS accumulator structure based on a carry save adder (CSA). The reported methodology also introduces a polyphase filter structure that results in a reduced look-up table (LUT) budget. The 2C-DA and RNS-DA are compared, in the context of a FPL implementation strategy, using a discrete wavelet transform (DWT) filter bank as a common design theme. The results show that the RNS-DA, compared to a traditional 2C-DA design, enjoys a performance advantage that increases with precision (wordlength).  相似文献   
3.
In this paper we present a general strategy for finding efficient permutation routes in parallel networks. Among the popular parallel networks to which the strategy applies are mesh networks, hypercube networks, hypercube-derivative networks, ring networks, and star networks. The routes produced are generally congestion-free and take a number of routing steps that is within a small constant factor of the diameter of the network. Our basic strategy is derived from an algorithm that finds (in polynomial time) efficient permutation routes for aproduct network, G×H, given efficient permutation routes forG andH. We investigate the use of this algorithm for routingmultiple permutations and extend its applicability to a wide class of graphs, including several families ofCayley graphs. Finally, we show that our approach can be used to find efficient permutation routes among the remaining live nodes infaulty networks.This research was supported in part by a grant from the NSF, Grant No. CCR-88-12567.  相似文献   
4.
A new and simple method of finite-element grid improvement is presented. The objective is to improve the accuracy of the analysis. The procedure is based on a minimization of the trace of the stiffness matrix. For a broad class of problems this minimization is seen to be equivalent to minimizing the potential energy. The method is illustrated with the classical tapered bar problem examined earlier by Prager and Masur. Identical results are obtained.  相似文献   
5.
6.
IEEE Security & Privacy's associate editor in chief discusses technology's role in identity fraud and identity theft.  相似文献   
7.
The current study investigated the impact of requiring respondents to elaborate on their answers to a biodata measure on mean scores, the validity of the biodata item composites, subgroup mean differences, and correlations with social desirability. Results of this study indicate that elaborated responses result in scores that are much lower than nonelaborated responses to the same items by an independent sample. Despite the lower mean score on elaborated items, it does not appear that elaboration affects the size of the correlation between social desirability and responses to biodata items or that it affects criterion-related validity or subgroup mean differences in a practically significant way. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
9.
Fred Y. Ye 《Scientometrics》2007,71(3):407-413
There exists a quantitative relationship, which can be expressed as G=kF(lgP)N, where G is per capita GDP, F gross expenditure on R&D as % of GDP, P patent applications, N Internet users per 10,000 inhabitants, and k a constant ranging from 0.4 to 1.2 in most countries. The mechanism of the relationship is explained in the paper.  相似文献   
10.
Understanding how aging influences cognition across different cultures has been hindered by a lack of standardized, cross-referenced verbal stimuli. This study introduces a database of such item-level stimuli for both younger and older adults, in China and the United States, and makes 3 distinct contributions. First, the authors specify which item categories generalize across age and/or cultural groups, rigorously quantifying differences among them. Second, they introduce novel, powerful methods to measure between-group differences in freely generated ranked data, the rank-ordered logit model and Hellinger Affinity. Finally, a broad archive of tested, cross-linguistic stimuli is now freely available to researchers: data, similarity measures, and all stimulus materials for 105 categories and 4 culture-by-age groups, comprising over 10,000 fully translated unique item responses. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号