首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   9篇
电工技术   1篇
化学工业   41篇
金属工艺   2篇
机械仪表   9篇
建筑科学   4篇
能源动力   7篇
轻工业   17篇
石油天然气   3篇
无线电   31篇
一般工业技术   43篇
冶金工业   11篇
原子能技术   3篇
自动化技术   66篇
  2023年   11篇
  2022年   25篇
  2021年   17篇
  2020年   13篇
  2019年   7篇
  2018年   20篇
  2017年   8篇
  2016年   10篇
  2015年   3篇
  2014年   7篇
  2013年   19篇
  2012年   10篇
  2011年   9篇
  2010年   4篇
  2009年   5篇
  2008年   9篇
  2007年   11篇
  2006年   5篇
  2005年   2篇
  2004年   3篇
  2003年   1篇
  2002年   3篇
  2001年   3篇
  2000年   2篇
  1998年   7篇
  1996年   1篇
  1995年   2篇
  1993年   2篇
  1992年   4篇
  1990年   2篇
  1989年   2篇
  1987年   1篇
  1985年   2篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1965年   1篇
排序方式: 共有238条查询结果,搜索用时 31 毫秒
151.
The application of the classical CN method fails for a pure scattering or weakly absorbing medium. The asymptotic CN method, in stationary mode, is the way to solve the transport equation in this limiting case, when c is equal or very close to 1. The asymptotic method allows us to obtain the asymptotic time-dependent emergent angular distribution for a given impinging angular intensity at t = 0 whatever c may be. The numerical results for the classical and asymptotic methods are consistent in the overlapping range.  相似文献   
152.
Building and Querying a P2P Virtual World   总被引:2,自引:0,他引:2  
Peer-to-Peer (P2P) systems are known to provide excellent scalability in a networked environment. One peer is introduced to the system by each participant. However current P2P applications can only provide file sharing and other forms of relatively simple data communications, and, in this paper, we demonstrate how this limitation can be bridged by indexing and querying a 3D virtual-world on a dynamic distributed network. We present an algorithm for 3D range queries as well as an algorithm for nearest neighbor queries. We also show how to build such a complex application from the ground level of a P2P routing algorithm.  相似文献   
153.
154.
OBJECTIVE: We performed CT colonography in patients referred for conventional colonoscopy, interpreted the axial images, and used commercially available software to reconstruct endoluminal perspective views to differentiate polyps from folds. SUBJECTS AND METHODS: We prospectively examined 44 patients (27 men and 17 women; mean age, 58 years old) with CT colonography by interpreting the axial images and using three-dimensional rendering for problem solving only. The CT scans were interpreted by two radiologists who were unaware of patients' histories as revealed by colonoscopic findings. The findings on colonography were compared with those of conventional colonoscopy to determine sensitivity, specificity, time spent on interpretation, and confidence of interpretation. RESULTS: Colonoscopy showed normal findings in 28 patients and 22 polyps in the remaining 16 patients. Six polyps were 8 mm or larger, three were 5-7 mm, and 13 were 5 mm or smaller. The findings of the two observers revealed an overall sensitivity of 50% and 38%, respectively, and a specificity of 93% and 86%, respectively. Sensitivity for polyps larger than 8 mm was 83% and specificity was 100% for both observers. The average amount of time spent on interpretation was 28 min 30 sec (range, 14-65 min). Both observers used the endoluminal view for differentiating folds from polyps in 23 (52%) of 44 patients, which had only minimal impact on interpretation time. CONCLUSION: CT colonography can be performed and the images interpreted using currently available hardware and software by initially using the axial images to search for polyps of significant size. Endoluminal views should be used only when necessary to help distinguish normal folds from fixed raised lesions that are suggestive of polyps.  相似文献   
155.
In delay tolerant network interruptions will occur continuously because there is no end-to-end path exists for the longer period of time from source to destination. In this context, delays can be immensely large due to its environment contrails e.g. wildlife tracking, sensor network, deep space and ocean networks. Furthermore, larger replication of messages put into the network is to increase delivery probability. Due to this high buffer occupancy storage space and replication result in a huge overhead on the network. Consequently, well-ordered intelligent message control buffer drop policies are necessary to operate on buffer that allows control on messages drop when the node buffers are near to overflow. In this paper, we propose an efficient buffer management policy which is called message drop control source relay (MDC-SR) for delay tolerant routing protocols. We also illustrate that conventional buffer management policy like Drop oldest, LIFO and MOFO be ineffective to consider all appropriate information in this framework. The proposed MDC-SR buffer policy controls the message drop while at the same time maximizes the delivery probability and buffer time average and reduces the message relay, drop and hop count in the reasonable amount. Using simulations support on an imitation mobility models Shortest Path Map Based Movement and Map Route Movements, we show that our drop buffer management MDC-SR with random message sizes performs better as compared to existing MOFO, LIFO and DOA.  相似文献   
156.
Intermediate water (IW) in hydrated bioactive glasses remains uninvestigated. We obtained titanium (Ti)-containing bioactive glasses (BGTs) (Ti at 5%, 7.5% and 10% of the glass system) using the sol–gel technique. Their thermal, physicochemical, and morphological properties, before and after Ti-doping, were analysed using DTA, XRD, FTIR, TEM, and SEM accessorised with EDAX, and size distribution and zeta potential surface charges were determined using a NanoZetasizer. The IW in hydrated BGTs was investigated by cooling and heating runs of DSC measurements. Moreover, the mode of death in an osteosarcoma cell line (MG63) was evaluated at different times of exposure to BGT discs. Ti doping had no remarkable effect on the thermal, physicochemical, and morphological properties of BGTs. However, the morphology, size, and charges of BGT nano-powders were slightly changed after inclusion of Ti compared with those of BGT0; for example, the particle size increased with increasing Ti content (from 4–5 to 7–28 nm). The IW content was enhanced in the presence of Ti. The mode of cell death revealed the effect of IW content on the proliferation of cells exposed to BGTs. These findings should help improve the biocompatibility of inorganic biomaterials.  相似文献   
157.
Thirteen rectangular RC column specimens, constructed at 1/3 scale, were tested under axial loading to investigate the use of advanced composites in repairing heat-induced damage. Eleven of the column specimens were subjected to elevated temperatures of 500 °C for 3 h. Nine heat-damaged columns were repaired using carbon fiber reinforced polymer (CFRP) sheets and plates. The effects of wrapping configuration, thickness of wrapping sheets, inclusion of plates as externally-bonded longitudinal reinforcement and the area of plates were examined using seven repair schemes. Test results confirmed that elevated temperatures adversely affect the axial load resistance and axial stiffness of the columns while increasing their toughness. Buckling under pure compressive loads was evident in heat-damaged columns except in those repaired using longitudinal CFRP plates. Partial wrapping with unidirectional CFRP sheets was found ineffective in augmenting the axial load capacity and stiffness of the damaged columns whereas full wrapping increased their axial load resistance and toughness. Using externally-bonded longitudinal CFRP plates, confined with circumferential wraps, significantly enhanced the initial axial stiffness and axial load resistance of the damaged columns. However, none of the seven repair schemes investigated in this study managed to regain the original axial stiffness and load resistance of the undamaged columns.  相似文献   
158.
The effects of longitudinal wave distribution and mirror structures on the small-signal response of surface-emitting lasers are analyzed for the first time. The analysis is based on an improved dynamic model implemented in the transfer-matrix representation. It is shown that for two structures with the same threshold gain and the same internal structure, high contrast mirrors give rise to a higher relaxation oscillation and modulation bandwidth for the same injection level  相似文献   
159.
Fiber fractures are crucial in initiating damage zones that ultimately determine the strength and lifetime of fiber-reinforced metal matrix composites. The evolution of damage in a metal matrix composite (MMC) comprised of a row of unidirectional SiC fibers (32 vol pct) surrounded by a Ti matrix was examined, for the first time, using X-ray microdiffraction. Multiple strain maps including both phases were collected in situ under applied tensile stress. The elastic axial strains were then compared to predictions from a modified shear-lag model, which, unlike other shear-lag models, considers the elastic response of both constituents. The strains showed good correlation with the model. The results confirmed, for the first time, both the need and validity of this new model specifically developed for large scale multifracture simulations of MMCs. The results also provided unprecedented insight for the model, revealing the necessity of incorporating such factors as plasticity of the matrix, residual stress in the composite, and selection of the load sharing parameter.  相似文献   
160.
The bidirectional coroutine is introduced as a mechanism for overcoming a shortcoming in the method of specification of the transfer of control between coroutines. An analogy is drawn between subroutines and coroutines by observing that coroutines, like subroutines, should not have to know with whom they are interacting. At present, most coroutine implementations require specific mention of the coroutine being resumed, or use a suspend mechanism in which case one coroutine acts as a slave (the suspending one) and the other as a master. In the second case, the slave need not know the identity of its master while the master must know the identity of its slave. For bidirectional coroutines, a coroutine need not know the identity of its master nor its slave. This is achieved by replacing the suspend primitive with two new primitives — resume master and resume slave.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号