首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   513篇
  免费   38篇
电工技术   4篇
综合类   1篇
化学工业   106篇
金属工艺   5篇
机械仪表   10篇
建筑科学   55篇
矿业工程   1篇
能源动力   22篇
轻工业   54篇
水利工程   3篇
石油天然气   1篇
无线电   60篇
一般工业技术   119篇
冶金工业   24篇
原子能技术   3篇
自动化技术   83篇
  2023年   9篇
  2022年   9篇
  2021年   26篇
  2020年   14篇
  2019年   14篇
  2018年   25篇
  2017年   14篇
  2016年   16篇
  2015年   15篇
  2014年   23篇
  2013年   28篇
  2012年   41篇
  2011年   46篇
  2010年   24篇
  2009年   27篇
  2008年   27篇
  2007年   29篇
  2006年   27篇
  2005年   31篇
  2004年   19篇
  2003年   15篇
  2002年   12篇
  2001年   4篇
  2000年   9篇
  1999年   7篇
  1998年   2篇
  1997年   4篇
  1995年   3篇
  1994年   3篇
  1993年   4篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
  1988年   1篇
  1987年   2篇
  1986年   3篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1981年   2篇
  1972年   1篇
  1963年   1篇
  1958年   1篇
排序方式: 共有551条查询结果,搜索用时 15 毫秒
11.
The standardized sizes used in the garment industry do not cover the range of individual differences in body shape for most people, leading to ill-fitting clothes, high return rates and overproduction. Recent research efforts in both industry and academia, therefore, focus on virtual try-on and on-demand fabrication of individually fitting garments. We propose an interactive design tool for creating custom-fit garments based on 3D body scans of the intended wearer. Our method explicitly incorporates transitions between various body poses to ensure a better fit and freedom of movement. The core of our method focuses on tools to create a 3D garment shape directly on an avatar without an underlying sewing pattern, and on the adjustment of that garment's rest shape while interpolating and moving through the different input poses. We alternate between cloth simulation and rest shape adjustment based on stretch to achieve the final shape of the garment. At any step in the real-time process, we allow for interactive changes to the garment. Once the garment shape is finalized for production, established techniques can be used to parameterize it into a 2D sewing pattern or transform it into a knitting pattern.  相似文献   
12.
13.
Dengue fever dynamics show seasonality, with the disease transmission being higher during the warmer seasons. In this paper, we analyse seasonally forced epidemic models with and without vector dynamics. We assume small seasonal effects and obtain approximations for the real response of each state variable and also for the corresponding amplitude and phase via decomposition of the sinusoidal forcing into imaginary exponential functions. The analysis begins with the simplest susceptible-infected-susceptible (SIS) model, followed by the simplest model with vector dynamics, susceptible-infected-susceptible for hosts and uninfected-vector (SISUV). Finally, we compare the more complex susceptible-infected-recovered (SIR) and susceptible-infected-recovered for hosts and uninfected-vector (SIRUV) models and conclude that the models give basically the same information when we replace, in the SIR model, the human infectivity by a function of both human and mosquito infectivities.  相似文献   
14.
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to attacks by quantum computers. These approaches inherently raise a key management problem, as the key pair can be used only for one message. That means, for one-time signature schemes to work, the sender must deliver the verification key together with the message and the signature. Upon reception, the receiver has to verify the authenticity of the verification key before verifying the signature itself. Hash-tree based solutions tackle this problem by basing the authenticity of a large number of verification keys on the authenticity of a root key. This approach, however, causes computation, communication, and storage overhead. Due to hardware acceleration, this paper proposes, for the first time, a processor architecture which boosts the performance of a one-time signature scheme without degrading memory usage and communication properties. This architecture realizes the chained Merkle signature scheme on the basis of Winternitz one-time signature scheme. All operations, i.e., key generation, signing, and verification are implemented on an FPGA platform, which acts as a coprocessor. Timing measurements on the prototype show a performance boost of at least one order of magnitude compared to an identical software solution.  相似文献   
15.
The impact of transfer batching (also referred to as lot splitting) on the performance of flowshops has received widespread attention in the literature. Most papers have emphasized the usefulness of lot splitting in cutting down average flow times, as it enables the overlapping of operations at different stages of the flowshop. However, while most analytical papers have studied deterministic flowshops, an important downside of lot splitting has been overlooked; i.e., the occurrence of idle time between the processing of consecutive sublots belonging to the same process batch (referred to as gap times). Gap times add no value to the product; they merely increase the process batch makespan at the different stages. In deterministic systems, these gap times may be avoided by balancing the processing rates of the different machines in the shop; in stochastic settings, however, they may occur even when the system is perfectly balanced, due to the inherent variability in the setup and processing times. Studying a two-stage flowshop with a single product type, this paper provides insight into the behavior of the gap times, and develops an approximation for the process batch makespan at the second stage in terms of the system characteristics and the lot splitting policy.  相似文献   
16.
Reviews the book Protecting children from domestic violence: Strategies for community intervention, edited by Peter J. Jaffe, Linda L. Baker, and Alison J. Cunningham (see record 2005-04430-000). The book emerged from the International Conference on Children Exposed to Domestic Violence that was held in London, Ontario in 2001. It begins with an excellent chapter by Jeffrey Edleson synthesizing the literature on the impact of exposure to domestic violence on children. Edleson's chapter is followed by two papers examining emerging assessments and treatment programs. The second section of the book addresses current thinking about individual and group intervention approaches. The third section of the book examines broader system level responses, including public awareness and school-based campaigns, as well as responses by the courts and police. This is a well-organized collection of papers that provides a good overview of the state of knowledge and innovative practice in an emerging field of practice. Protecting Children from Domestic Violence provides practitioners, policy makers, and researchers with an excellent overview of current knowledge and practices in working with children exposed to domestic violence. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
17.
Bone formation (osteogenesis) is a complex process in which cellular differentiation and the generation of a mineralized organic matrix are synchronized to produce a hybrid hierarchical architecture. To study the mechanisms of osteogenesis in health and disease, there is a great need for functional model systems that capture in parallel, both cellular and matrix formation processes. Stem cell-based organoids are promising as functional, self-organizing 3D in vitro models for studying the physiology and pathology of various tissues. However, for human bone, no such functional model system is yet available. This study reports the in vitro differentiation of human bone marrow stromal cells into a functional 3D self-organizing co-culture of osteoblasts and osteocytes, creating an organoid for early stage bone (woven bone) formation. It demonstrates the formation of an organoid where osteocytes are embedded within the collagen matrix that is produced by the osteoblasts and mineralized under biological control. Alike in in vivo osteocytes, the embedded osteocytes show network formation and communication via expression of sclerostin. The current system forms the most complete 3D living in vitro model system to investigate osteogenesis, both in physiological and pathological situations, as well as under the influence of external triggers (mechanical stimulation, drug administration).  相似文献   
18.
Binding affinity prediction of potential drugs to target and off-target proteins is an essential asset in drug development. These predictions require the calculation of binding free energies. In such calculations, it is a major challenge to properly account for both the dynamic nature of the protein and the possible variety of ligand-binding orientations, while keeping computational costs tractable. Recently, an iterative Linear Interaction Energy (LIE) approach was introduced, in which results from multiple simulations of a protein-ligand complex are combined into a single binding free energy using a Boltzmann weighting-based scheme. This method was shown to reach experimental accuracy for flexible proteins while retaining the computational efficiency of the general LIE approach. Here, we show that the iterative LIE approach can be used to predict binding affinities in an automated way. A workflow was designed using preselected protein conformations, automated ligand docking and clustering, and a (semi-)automated molecular dynamics simulation setup. We show that using this workflow, binding affinities of aryloxypropanolamines to the malleable Cytochrome P450 2D6 enzyme can be predicted without a priori knowledge of dominant protein-ligand conformations. In addition, we provide an outlook for an approach to assess the quality of the LIE predictions, based on simulation outcomes only.  相似文献   
19.
A clock-cycle accurate synchronization technique for fully integrated data-converters is presented. Only a single cable is needed to distribute both the required synchronization signal and the converter clock. Different possible implementations, both to generate and decompose the distributed signal, are presented. A discrete component generator circuit is discussed. To avoid setup and hold time violations, on-chip signal reconstruction is unavoidable. A 40 nm CMOS recovery circuit was developed. Simulation results, including layout parasitics, show the wide frequency operating range of the proposed technique.  相似文献   
20.
In the last decade, there has been a growing awareness regarding social exclusion. Considering the ageing population and the likelihood of older people being socially excluded, the aims of this article are to: (1) review existing studies concerning social exclusion in later life; and (2) identify how environmental and life-course perspectives are presented in studies focusing on social exclusion in later life. A systematic review in seven scientific databases was conducted to explore the peer-reviewed evidence. In total, 26 articles were included and analysed. Findings describe the variety of methods, conceptualisation, dimensions and measures used in this recent area of research. Determinants of social exclusion in later life are discussed and life-course and environmental perspectives are examined. The discussion highlights the complex character of the concept and measurement of social exclusion, and the presence of general and age-specific dimensions of social exclusion in later life. The time and context relativity and the need for life-course and environmental perspectives on social exclusion in later life are discussed. Finally, future directions of research are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号