首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1142篇
  免费   46篇
  国内免费   12篇
电工技术   11篇
综合类   4篇
化学工业   228篇
金属工艺   19篇
机械仪表   57篇
建筑科学   30篇
矿业工程   2篇
能源动力   65篇
轻工业   47篇
水利工程   7篇
石油天然气   4篇
无线电   151篇
一般工业技术   272篇
冶金工业   80篇
原子能技术   15篇
自动化技术   208篇
  2024年   4篇
  2023年   27篇
  2022年   39篇
  2021年   55篇
  2020年   41篇
  2019年   52篇
  2018年   67篇
  2017年   51篇
  2016年   41篇
  2015年   31篇
  2014年   46篇
  2013年   78篇
  2012年   44篇
  2011年   70篇
  2010年   56篇
  2009年   42篇
  2008年   39篇
  2007年   40篇
  2006年   36篇
  2005年   24篇
  2004年   20篇
  2003年   17篇
  2002年   14篇
  2001年   16篇
  2000年   12篇
  1999年   10篇
  1998年   27篇
  1997年   26篇
  1996年   15篇
  1995年   12篇
  1994年   14篇
  1993年   13篇
  1992年   9篇
  1991年   9篇
  1990年   6篇
  1989年   8篇
  1988年   10篇
  1987年   8篇
  1986年   9篇
  1985年   6篇
  1984年   9篇
  1983年   11篇
  1982年   3篇
  1981年   4篇
  1980年   6篇
  1979年   7篇
  1977年   5篇
  1976年   3篇
  1966年   1篇
  1964年   1篇
排序方式: 共有1200条查询结果,搜索用时 539 毫秒
1.
2.
The objective of this study is to explore the possibility of capturing the reasoning process used in bidding a hand in a bridge game by an artificial neural network. We show that a multilayer feedforward neural network can be trained to learn to make an opening bid with a new hand. The game of bridge, like many other games used in artificial intelligence, can easily be represented in a machine. But, unlike most games used in artificial intelligence, bridge uses subtle reasoning over and above the agreed conventional system, to make a bid from the pattern of a given hand. Although it is difficult for a player to spell out the precise reasoning process he uses, we find that a neural network can indeed capture it. We demonstrate the results for the case of one-level opening bids, and discuss the need for a hierarchical architecture to deal with bids at all levels.  相似文献   
3.
面对电信业的低迷,运营商和设备制造商都捏紧了钱袋,想方设法少花钱多办事。这就意味着,必须改进现有传输网(见图1),使话音和数据传输效率更高。从网络部署的角度来看,运营商需要:用一些有效的方法,将多协议数据转换到SONET/SDH信道上;用一种灵活的带宽适应机制,使SONET/SDH信道大小与在其中传输的数据的需求相一致;用一种机制,灵活并以理想的动态方式改变整个SONET/SDH网络的信道带宽。这就要求集成电路供应商提供有助于在SONET/SDH上有效传输数据的芯片。虽然现在有多种SONET/SDH信息包(PoS)产品,但是它们的转换效率都太…  相似文献   
4.
Dystrophin is a plasma membrane-associated cytoskeletal protein of the spectrin superfamily. The dystrophin cytoskeleton has been first characterized in muscle. Muscular 427 kDa dystrophin binds to subplasmalemmal actin filaments via its amino-terminal domain. The carboxy-terminus of dystrophin binds to a plasma membrane anchor, beta-dystroglycan, which is associated on the external side with the extracellular matrix receptor, alpha-dystroglycan, that binds to the basal lamina proteins laminin-1, laminin-2, and agrin. In the muscle, the dystroglycan complex is associated with the sarcoglycan complex that consists of several glycosylated, integral membrane proteins. The absence or functional deficiency of the dystrophin cytoskeleton is the cause of several types of muscular dystrophies including the lethal Duchenne muscular dystrophy (DMD), one of the most severe and most common genetic disorders of man. The dystrophin complex is believed to stabilize the plasma membrane during cycles of contraction and relaxation. Muscular dystrophin and several types of dystrophin variants are also present in extramuscular tissues, e.g. in distinct regions of the central nervous systems including the retina. Absence of dystrophin from these sites is believed to be responsible for some extramuscular symptoms of DMD, e.g. mental retardation and disturbances in retinal electrophysiology (reduced b-wave in electroretinograms). The reduced b-wave in electroretinograms indicated a disturbance of neurotransmission between photoreceptors and ON-bipolar cells. At least two different dystrophin variants are present in photoreceptor synaptic complexes. One of these dystrophins (Dp260) is virtually exclusively expressed in the retina. In the neuroretina, dystrophin is found in significant amounts in the invaginated photoreceptor synaptic complexes. At this location dystrophin colocalizes with dystroglycan. Agrin, an extracellular ligand of alpha-dystroglycan, is also present at this location whereas the proteins of the sarcoglycan complex appear to be absent in photoreceptor synaptic complexes. Dystrophin and dystroglycan are located distal from the ribbon-containing active synaptic zones where both proteins are restricted to the photoreceptor plasma membrane bordering on the lateral sides of the synaptic invagination. In addition, some neuronal profiles of the postsynaptic complex also contain dystrophin and beta-dystroglycan. These profiles appear to belong at least in part to projections of the photoreceptor terminals into the postsynaptic dendritic complex. In view of the abnormal neurotransmission between photoreceptors and ON-bipolar cells in DMD patients the dystrophin/beta-dystroglycan-containing projections of photoreceptor presynaptic terminals into the postsynaptic dendritic plexus might somehow modify the ON-bipolar pathway. Another retinal site associated with dystrophin/beta-dystropglycan is the plasma membrane of Müller cells where dystrophin/beta-dystroglycan appear to be present at particular high concentrations. At this location the dystrophin/dystroglycan complex may play a role in the attachment of the retina to the vitreous, and, under pathological conditions, in traction-induced retinal detachment.  相似文献   
5.
Rates of coke formation during steam pyrolysis of naphtha have been investigated in a jet-stirred reactor both for sodium silicate coated and uncoated Inconel 600 surfaces in the temperature range of 1078–1108 K. Coke formation rates were significantly reduced on sodium silicate coated plates due to the passivation of the metal surface. However, the coking rates gradually increased with successive decokings of the coated surface.  相似文献   
6.
We consider a system comprising a finite number of nodes, with infinite packet buffers, that use unslotted ALOHA with Code Division Multiple Access (CDMA) to share a channel for transmitting packetised data. We propose a simple model for packet transmission and retransmission at each node, and show that saturation throughput in this model yields a sufficient condition for the stability of the packet buffers; we interpret this as the capacity of the access method. We calculate and compare the capacities of CDMA‐ALOHA (with and without code sharing) and TDMA‐ALOHA; we also consider carrier sensing and collision detection versions of these protocols. In each case, saturation throughput can be obtained via analysis of a continuous time Markov chain. Our results show how saturation throughput degrades with code‐sharing. Finally, we also present some simulation results for mean packet delay. Our work is motivated by optical CDMA in which “chips” can be optically generated, and hence the achievable chip rate can exceed the achievable TDMA bit rate which is limited by electronics. Code sharing may be useful in the optical CDMA context as it reduces the number of optical correlators at the receivers. Our throughput results help to quantify by how much the CDMA chip rate should exceed the TDMA bit rate so that CDMA‐ALOHA yields better capacity than TDMA‐ALOHA. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
7.
8.
Cirus, a 40 MW t, vertical tank type research reactor, having wide range of research facilities, was commissioned in the year 1960. This research reactor, situated at Mumbai, India has been operated and utilized extensively for isotope production, material testing and neutron beam research for nearly four decades. With a view to assess the residual life of the reactor, detailed ageing studies were carried out during the early 1990s. Based on these studies, refurbishment of Cirus for its life extension was taken up. During refurbishment, additional safety features were incorporated in various systems to qualify them for the current safety standards. This paper gives the details of the operating experiences, utilization of the reactor along with methodologies followed for carrying out detailed ageing studies, refurbishment and safety upgradation for its life extension.  相似文献   
9.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
10.
Theoretical results for identifying unnecessary inferences are discussed in the context of the use of a completion-procedure-based approach toward automated reasoning. The notion of a general superposition is introduced and it is proved that in a completion procedure, once a general superposition is considered, all its instances are unnecessary inferences and, thus, do not have to be considered. It is also shown that this result can be combined with another criterion, called the prime superposition criterion, proposed by Kapur, Musser, and Narendran, thus implying that prime and general superpositions are sufficient. These results should be applicable to other approaches toward automated reasoning, too. These criteria can be effectively implemented, and their implementation has resulted in automatically proving instances of Jacobson's theorem (also known as the ring commutativity problems) usingRRL (Rewrite Rule Laboratory), a theorem prover based on rewriting techniques and completion.A preliminary version of this paper appeared in a paper entitled Consider only general superpositions in completion procedures in theProceedings of the Third International Conference on Rewriting Techniques and Applications, Chapel Hill, NC, April, 1989, Lecture Notes in Computer Science, Vol. 355, Springer-Verlag, Berlin, pp. 513–527. Part of the work of Hantao Zhang was done at the Rensselaer Polytechnic Institute, New York, and he was partially supported by National Science Foundation Grant No. CCR-8408461; also affiliated with Institute of Programming and Logics at SUNY, Albany, NY, and RPI. Deepak Kapur was partially supported by National Science Foundation Grantr Nos. CCR-8408461 and CCR-8906678.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号