首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   512篇
  免费   25篇
电工技术   4篇
综合类   2篇
化学工业   138篇
金属工艺   10篇
机械仪表   12篇
建筑科学   25篇
矿业工程   1篇
能源动力   33篇
轻工业   81篇
水利工程   4篇
石油天然气   1篇
无线电   26篇
一般工业技术   98篇
冶金工业   17篇
原子能技术   7篇
自动化技术   78篇
  2024年   3篇
  2023年   4篇
  2022年   15篇
  2021年   15篇
  2020年   12篇
  2019年   22篇
  2018年   30篇
  2017年   21篇
  2016年   22篇
  2015年   11篇
  2014年   14篇
  2013年   61篇
  2012年   44篇
  2011年   46篇
  2010年   35篇
  2009年   36篇
  2008年   40篇
  2007年   25篇
  2006年   24篇
  2005年   10篇
  2004年   8篇
  2003年   9篇
  2002年   5篇
  2001年   3篇
  2000年   2篇
  1999年   3篇
  1998年   5篇
  1997年   4篇
  1996年   1篇
  1994年   2篇
  1993年   4篇
  1992年   1篇
排序方式: 共有537条查询结果,搜索用时 15 毫秒
1.
As transistor feature sizes continue to shrink intothe sub-90nm range and beyond, the effects of process variationson critical path delay and chip yields have amplified. A commonconcept to remedy the effects of variation is speed-binning, bywhich chips from a single batch are rated by a discrete range offrequencies and sold at different prices. In this paper, we discussstrategies to modify the number of chips in different bins andhence enhance the profits obtained from them. Particularly, wepropose a scheme that introduces a small Substitute Cacheassociated with each cache way to replicate the data elementsthat will be stored in the high latency lines. Assuming a fixedpricing model, this method increases the revenue by as much as13.8% without any impact on the performance of the chips.  相似文献   
2.
This work presents an investigation of the potential of artificial neural networks for classification of registered magnetic resonance and X-ray computer tomography images of the human brain. First, topological and learning parameters are established experimentally. Second, the learning and generalization properties of the neural networks are compared to those of a classical maximum likelihood classifier and the superiority of the neural network approach is demonstrated when small training sets are utilized. Third, the generalization properties of the neural networks are utilized to develop an adaptive learning scheme able to overcome interslice intensity variations typical of MR images. This approach permits the segmentation of image volumes based on training sets selected on a single slice. Finally, the segmentation results obtained both with the artificial neural network and the maximum likelihood classifiers are compared to contours drawn manually.  相似文献   
3.
4.
We successfully measured longitudinal strains in two full-scale steel pipe specimens subjected to loading combinations of internal pressure, axial tensile force and bending moments undergoing local buckling under controlled laboratory conditions. Carbon-coated fibers, for the first time, and standard communication fibers were used. By using the broadening factor of the Brillouin spectrum width, we can successfully predict the location and progression sequence of buckling patterns, prior their visual detection in the laboratory. The broadening factor processing time is more efficient than multiple-peak fitting of the Brillouin spectrum method. Thus, it is capable of proving real-time deformation progression in structural health monitoring applications. High strength carbon-coated fibers are found to be superior to standard communication fibers in two respects: they provide more accurate readings and are able to measure significantly larger strains.  相似文献   
5.
6.
An efficient design method for substrate integrated waveguide electromagnetic bandgap (SIW-EBG) filters is proposed which provides direct dimensional synthesis approach for desired filter objectives without using network representations. The method is applied to the design of an X band SIW-EBG filter and its response is compared with HFSS (high frequency structure simulator) simulations for validation purposes. Fairly good agreement between the results shows the applicability of the proposed method for SIW-EBG filter design.  相似文献   
7.
A hierarchical approach for fast bi‐dimensional empirical mode decomposition (B‐EMD) is proposed. The presented approach utilizes an efficient window size determination scheme that enables the multi‐level computation of the order statistics filter (OSF). Our detailed experiments show that the proposed OSF computation approach allows a significantly faster computation of an EMD without degrading the decomposition accuracy.  相似文献   
8.
We present a particle-based method to simulate and visualize the interaction of knitwear with fluids. The knitwear is modeled using spring-mass systems and the fluid is modeled using the smoothed particle hydrodynamics method. Two-way coupling is achieved by considering surface tension, capillary, and interparticle forces between the fluid and knitwear. The simulation of fluid and knitwear particles is performed on the graphics processing unit. Photorealistic rendering of knitwear and fluid is achieved by using a hardware-accelerated rasterization-based rendering technique. Our method is able to simulate and visualize the macro- and microstructure of free-form knitwear and reflective and refractive characteristics of the fluid surface.  相似文献   
9.
Interest in graphene as a two‐dimensional quantum‐well material for energy applications and nanoelectronics has increased exponentially in the last few years. The recent advances in large‐area single‐sheet fabrication of pristine graphene have opened unexplored avenues for expanding from nano‐ to meso‐scale applications. The relatively low level of absorptivity and the short lifetimes of excitons of single‐sheet graphene suggest that it needs to be coupled with light sensitizers in order to explore its feasibility for photonic applications, such as solar‐energy conversion. Red‐emitting CdSe quantum dots are employed for photosensitizing single‐sheet graphene with areas of several square centimeters. Pyridine coating of the quantum dots not only enhances their adhesion to the graphene surface, but also provides good electronic coupling between the CdSe and the two‐dimensional carbon allotrope. Illumination of the quantum dots led to injection of n‐carrier in the graphene phase. Time‐resolved spectroscopy reveals three modes of photoinduced electron transfer between the quantum dots and the graphene occurring in the femtosecond and picosecond time‐domains. Transient absorption spectra provide evidence for photoinduced hole‐shift from the CdSe to the pyridine ligands, thereby polarizing the surface of the quantum dots. That is, photoinduced electrical polarization, which favors the simultaneous electron transfer from the CdSe to the graphene phase. These mechanistic insights into the photoinduced interfacial charge transfer have a promising potential to serve as guidelines for the design and development of composites of graphene and inorganic nanomaterials for solar‐energy conversion applications.  相似文献   
10.
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号