首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2785篇
  免费   228篇
  国内免费   11篇
电工技术   61篇
综合类   5篇
化学工业   638篇
金属工艺   102篇
机械仪表   100篇
建筑科学   68篇
能源动力   114篇
轻工业   175篇
水利工程   7篇
石油天然气   5篇
无线电   647篇
一般工业技术   586篇
冶金工业   198篇
原子能技术   15篇
自动化技术   303篇
  2023年   17篇
  2022年   37篇
  2021年   65篇
  2020年   52篇
  2019年   63篇
  2018年   72篇
  2017年   82篇
  2016年   108篇
  2015年   103篇
  2014年   106篇
  2013年   189篇
  2012年   183篇
  2011年   188篇
  2010年   143篇
  2009年   137篇
  2008年   116篇
  2007年   117篇
  2006年   140篇
  2005年   102篇
  2004年   100篇
  2003年   101篇
  2002年   96篇
  2001年   76篇
  2000年   69篇
  1999年   81篇
  1998年   97篇
  1997年   81篇
  1996年   51篇
  1995年   41篇
  1994年   22篇
  1993年   20篇
  1992年   16篇
  1991年   12篇
  1990年   11篇
  1989年   16篇
  1988年   13篇
  1987年   9篇
  1986年   12篇
  1985年   8篇
  1984年   11篇
  1983年   7篇
  1982年   6篇
  1981年   4篇
  1980年   5篇
  1979年   6篇
  1978年   6篇
  1977年   6篇
  1976年   6篇
  1975年   6篇
  1974年   3篇
排序方式: 共有3024条查询结果,搜索用时 0 毫秒
51.
Efficiently extendible mappings for balanced data distribution   总被引:2,自引:0,他引:2  
In data storage applications, a large collection of consecutively numbered data “buckets” are often mapped to a relatively small collection of consecutively numbered storage “bins.” For example, in parallel database applications, buckets correspond to hash buckets of data and bins correspond to database nodes. In disk array applications, buckets correspond to logical tracks and bins correspond to physical disks in an array. Measures of the “goodness” of a mapping method include:
  1. Thetime (number of operations) needed to compute the mapping.
  2. Thestorage needed to store a representation of the mapping.
  3. Thebalance of the mapping, i.e., the extent to which all bins receive the same number of buckets.
  4. The cost ofrelocation, that is, the number of buckets that must be relocated to a new bin if a new mapping is needed due to an expansion of the number of bins or the number of buckets.
One contribution of this paper is to give a new mapping method, theInterval-Round-Robin (IRR) method. The IRR method has optimal balance and relocation cost, and its time complexity and storage requirements compare favorably with known methods. Specifically, ifm is the number of times that the number of bins and/or buckets has increased, then the time complexity isO(logm) and the storage isO(m 2). Another contribution of the paper is to identify the concept of ahistory-independent mapping, meaning informally that the mapping does not “remember” the past history of expansions to the number of buckets and bins, but only the current number of buckets and bins. Thus, such mappings require very little information to be stored. Assuming that balance and relocation are optimal, we prove that history-independent mappings are possible if the number of buckets is fixed (so only the number of bins can increase), but not possible if the number of bins and buckets can both increase.  相似文献   
52.
Expert elicitation is the process of retrieving and quantifying expert knowledge in a particular domain. Such information is of particular value when the empirical data is expensive, limited or unreliable. This paper describes a new software tool, called Elicitator, which assists in quantifying expert knowledge in a form suitable for use as a prior model in Bayesian regression. Potential environmental domains for applying this elicitation tool include habitat modelling, assessing detectability or eradication, ecological condition assessments, risk analysis and quantifying inputs to complex models of ecological processes. The tool has been developed to be user-friendly, extensible and facilitate consistent and repeatable elicitation of expert knowledge across these various domains. We demonstrate its application to elicitation for logistic regression in a geographically based ecological context. The underlying statistical methodology is also novel, utilizing an indirect elicitation approach to target expert knowledge on a case-by-case basis. For several elicitation sites (or cases), experts are asked simply to quantify their estimated ecological response (e.g. probability of presence), and its range of plausible values, after inspecting (habitat) covariates via GIS.  相似文献   
53.
With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because individual identification is important in ubiquitous environment, RFID technology would be used frequently. RFID is a radio frequency identification technology to replace bar code. The reader transmits query (request of user information) and tag-provides user information. RFID has various advantages, such as high speed identification rates, mass memory storages. However, eavesdropping is possible as well as a problem that user information is exposed (Juels et al. in Conference on Computer and Communications Security—ACM CCS, pp. 103–111, 2003; Ohkubo et al. in RFID Privacy Workshop 2003; Weis et al. in International Conference on Security in Pervasive Computing, pp. 201–212, 2003; Weis et al. in Cryptographic Hardware and Embedded Systems—CHES, pp. 454–469, 2002). Therefore, when off-line customer had visited bank for banking service, RNTS (RFID number ticket service) system provides both anonymity in customer identification and efficiency of banking service. In addition, RNTS system protects privacy of an off-line user visiting the bank and it is an efficient method offering service in order of arriving in the bank.  相似文献   
54.
Fully discrete potential-based finite element methods called methods are used to solve a transient eddy current problem in a three-dimensional convex bounded polyhedron. Using methods, fully discrete coupled and decoupled numerical schemes are developed. The existence and uniqueness of solutions for these schemes together with the energy-norm error estimates are provided. To verify the validity of both schemes, some computer simulations are performed for the model from TEAM Workshop Problem 7. This work was supported by Postech BSRI Research Fund-2009, National Basic Research Program of China (2008CB425701), NSFC under the grant 10671025 and the Key Project of Chinese Ministry of Education (No. 107018).  相似文献   
55.
In this paper, a panel generation system for analyzing seakeeping performance of a ship is developed. Given a set of offset data representing the ship hull, the system first creates a surface model of the ship. From the surface model, the wetted part of the ship is obtained by computing the intersection between the water surface and the hull, which is then processed to generate quadrilateral panels for the hull and the water surface. The system is designed to handle various kinds of ships such as ships with a mono-skeg, a twin-skeg and/or a bulbous bow in either an automatic or an interactive manner. Moreover, it can generate input panels for three different seakeeping analysis methods. Examples are provided to demonstrate the capabilities of the system.  相似文献   
56.
Acoustic emission (AE) sensors have been fabricated using polarized polyvinylidene fluoride/trifluoroethylene (P(VDF-TrFE)) piezoelectric copolymer films. The acoustic and electromechanical properties of the copolymers have been determined using the ultrasonic immersion technique and the resonance technique, respectively. The P(VDF-TrFE) AE sensors have been calibrated according to the ASTM standard and evaluated for potential application in the detection of AE in glass fiber reinforced polypropylene (GFPP). A ceramic AE sensor also has been fabricated using lead zirconate titanate (PZT) 7A piezoelectric ceramic and its sensitivity and performance are reported as well. The copolymer sensors do not show resonance peaks of the ceramic sensor and have adequate sensitivity. They can reproduce AE signals accurately without giving artifacts and have potential use in commercial AE systems.  相似文献   
57.
Robust measurement of ocular torsion using iterative Lucas-Kanade   总被引:1,自引:0,他引:1  
We present a new method to measure ocular torsion using Lucas-Kanade method. After pixels of iris annulus around a pupil have been converted into Cartesian coordinates, 30 features on the iris was selected then the features were tracked using the iterative Lucas-Kanade algorithm to calculate torsional shift. The results show that a precision of the method is higher than those measured by a conventional cross-correlation and by a template matching method. The suggested method showed 0.03 degrees mean error with 0.15 degrees maximum error. Particularly, the method was robust to change of pupil size and misalignment of pupil location. Processing time was also fast enough to be implemented in a real-time system.  相似文献   
58.
The past few decades have seen a resurgence ofreasoning techniques in artificial intelligenceinvolving both classical and non-classical logics. Inhis paper, ``Multi-valued Logics: A Uniform Approach toReasoning in Artificial Intelligence', Ginsberg hasshown that through the use of bilattices,several reasoning techniques can be unified under asingle framework. A bilattice is a structure that canbe viewed as a class of truth values that canaccommodate incomplete and inconsistent informationand in certain cases default information. Inbilattice theory, knowledge is ordered along twodimensions: truth/falsity and certainty/uncertainty. By defining the corresponding bilattices as truthspaces, Ginsberg has shown that the same theoremprover can be used to simulate reasoning in firstorder logic, default logic, prioritized default logicand assumption truth maintenance system. Although thisis a significant contribution, Ginsberg's paper waslengthy and involved. This paper summarizes some ofthe essential concepts and foundations of bilatticetheory. Furthermore, it discusses the connections ofbilattice theory and several other existingmulti-valued logics such as the various three-valuedlogics and Belnap's four-valued logic. It is notedthat the set of four truth values in Belnap's logicform a lattice structure that is isomorphic to thesimplest bilattice. Subsequently, Fitting proposed aconflation operation that can be used to selectsub-sets of truth values from this and otherbilattices. This method of selecting sub-sets oftruth values provides a means for identifyingsub-logic in a bilattice.  相似文献   
59.
A numerical process to simulate SiO2 dry etching with inductively coupled C2F6 plasmas has been constructed using a commercial CFD code as a first step to design a run-to-run control system. The simulator was found to reasonably predict the reactive ion etching behavior of C2F6 plasmas and used to investigate the effects of plasma operating variables on the etch rate and uniformity. The relationship between the operating variables and the etching characteristics was mathematically modeled through linear regression for future run-to-run control system design.  相似文献   
60.
We study stochastic stability of centralized Kalman filtering for linear time-varying systems equipped with wireless sensors. Transmission is over fading channels where variable channel gains are counteracted by power control to alleviate the effects of packet drops. We establish sufficient conditions for the expected value of the Kalman filter covariance matrix to be exponentially bounded in norm. The conditions obtained are then used to formulate stabilizing power control policies which minimize the total sensor power budget. In deriving the optimal power control laws, both statistical channel information and full channel information are considered. The effect of system instability on the power budget is also investigated for both these cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号