首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   881篇
  免费   50篇
  国内免费   6篇
电工技术   12篇
综合类   1篇
化学工业   233篇
金属工艺   22篇
机械仪表   23篇
建筑科学   14篇
矿业工程   2篇
能源动力   73篇
轻工业   45篇
水利工程   1篇
石油天然气   1篇
无线电   79篇
一般工业技术   189篇
冶金工业   30篇
原子能技术   2篇
自动化技术   210篇
  2024年   8篇
  2023年   44篇
  2022年   46篇
  2021年   72篇
  2020年   48篇
  2019年   51篇
  2018年   69篇
  2017年   51篇
  2016年   42篇
  2015年   25篇
  2014年   37篇
  2013年   69篇
  2012年   47篇
  2011年   57篇
  2010年   50篇
  2009年   44篇
  2008年   38篇
  2007年   36篇
  2006年   32篇
  2005年   20篇
  2004年   10篇
  2003年   7篇
  2002年   4篇
  2001年   2篇
  2000年   3篇
  1999年   1篇
  1998年   4篇
  1997年   6篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1989年   1篇
  1987年   1篇
  1984年   1篇
  1980年   1篇
  1979年   1篇
  1978年   3篇
排序方式: 共有937条查询结果,搜索用时 15 毫秒
31.
Silver (Ag) complexes of drugs and their nanosystems have great potential as antibacterials. Recently, an Ag complex of furosemide (Ag–FSE) has shown to be a promising antimicrobial. However, poor solubility of Ag–FSE could hamper its introduction into clinics. Therefore, the authors developed a nanosuspension of Ag–FSE (Ag–FSE_NS) for its solubility and antibacterial activity enhancement. The aim of this study was to introduce a novel nanoantibiotic with enhanced antibacterial efficacy. Ag–FSE_NS was prepared by precipitation–ultrasonication technique. Size, polydispersity index (PI) and zeta potential (ZP) of prepared Ag–FSE_NS were measured by dynamic light scattering, whereas surface morphology was determined using scanning electron microscopy (SEM). In vitro antibacterial activity was evaluated against Staphylococcus aureus, Escherichia coli and Pseudomonas aeruginosa using broth microdilution method. Size, PI and ZP of optimised Ag–FSE_NS1 were 191.2 ± 19.34 nm, 0.465 ± 0.059 and −55.7 ± 8.18 mV, respectively. SEM revealed that Ag–FSE_NS1 particles were rod or needle‐like with smooth surfaces. Saturation solubility of Ag–FSE in NS increased eight‐fold than pure Ag–FSE. Ag–FSE_NS1 exhibited two‐fold and eight‐fold enhancements in activity against E. coli and S. aureus, respectively. The results obtained showed that developed Ag–FSE_NS1 holds a promise as a topical antibacterial.Inspec keywords: nanomedicine, nanofabrication, light scattering, surface morphology, silver, particle size, solubility, suspensions, scanning electron microscopy, electrokinetic effects, drugs, biomedical materials, antibacterial activity, microorganisms, nanoparticles, drug delivery systems, transmission electron microscopyOther keywords: saturation solubility, topical antibacterial, size 171.86 nm to 210.54 nm, voltage ‐47.52 mV to ‐63.88 mV, Ag, broth microdilution method, Pseudomonas aeruginosa, Escherichia coli, Staphylococcus aureus, SEM, scanning electron microscopy, surface morphology, dynamic light scattering, particle size, polydispersity index, precipitation–ultrasonication technique, nanoantibiotic, nanosuspension, furosemide, nanosystems, drugs, Ag–FSE_NS preparation, in vitro antibacterial activity, pure Ag–FSE, Ag–FSE_NS1 particles, optimised Ag–FSE_NS1, zeta potential, enhanced antibacterial efficacy, antibacterials  相似文献   
32.
Gaming Prediction Markets: Equilibrium Strategies with a Market Maker   总被引:1,自引:0,他引:1  
We study the equilibrium behavior of informed traders interacting with market scoring rule (MSR) market makers. One attractive feature of MSR is that it is myopically incentive compatible: it is optimal for traders to report their true beliefs about the likelihood of an event outcome provided that they ignore the impact of their reports on the profit they might garner from future trades. In this paper, we analyze non-myopic strategies and examine what information structures lead to truthful betting by traders. Specifically, we analyze the behavior of risk-neutral traders with incomplete information playing in a dynamic game. We consider finite-stage and infinite-stage game models. For each model, we study the logarithmic market scoring rule (LMSR) with two different information structures: conditionally independent signals and (unconditionally) independent signals. In the finite-stage model, when signals of traders are independent conditional on the state of the world, truthful betting is a Perfect Bayesian Equilibrium (PBE). Moreover, it is the unique Weak Perfect Bayesian Equilibrium (WPBE) of the game. In contrast, when signals of traders are unconditionally independent, truthful betting is not a WPBE. In the infinite-stage model with unconditionally independent signals, there does not exist an equilibrium in which all information is revealed in a finite amount of time. We propose a simple discounted market scoring rule that reduces the opportunity for bluffing strategies. We show that in any WPBE for the infinite-stage market with discounting, the market price converges to the fully-revealing price, and the rate of convergence can be bounded in terms of the discounting parameter. When signals are conditionally independent, truthful betting is the unique WPBE for the infinite-stage market with and without discounting.  相似文献   
33.
Robotic Path planning is one of the most studied problems in the field of robotics. The problem has been solved using numerous statistical, soft computing and other approaches. In this paper we solve the problem of robotic path planning using a combination of A* algorithm and Fuzzy Inference. The A* algorithm does the higher level planning by working on a lower detail map. The algorithm finds the shortest path at the same time generating the result in a finite time. The A* algorithm is used on a probability based map. The lower level planning is done by the Fuzzy Inference System (FIS). The FIS works on the detailed graph where the occurrence of obstacles is precisely known. The FIS generates smoother paths catering to the non-holonomic constraints. The results of A* algorithm serve as a guide for FIS planner. The FIS system was initially generated using heuristic rules. Once this model was ready, the fuzzy parameters were optimized using a Genetic Algorithm. Three sample problems were created and the quality of solutions generated by FIS was used as the fitness function of the GA. The GA tried to optimize the distance from the closest obstacle, total path length and the sharpest turn at any time in the journey of the robot. The resulting FIS was easily able to plan the path of the robot. We tested the algorithm on various complex and simple paths. All paths generated were optimal in terms of path length and smoothness. The robot was easily able to escape a variety of obstacles and reach the goal in an optimal manner.  相似文献   
34.
Knowledge of the information goal of users is critical in website design, analyzing the efficacy of such designs, and in ensuring effective user-access to desired information. Determining the information goal is complex due to the subjective and latent nature of user information needs. This challenge is further exacerbated in media-rich websites since the semantics of media-based information is context-based and emergent. A critical step in determining information goals lies in the identification of content pages. These are the pages which contain the information the user seeks. We propose a method to automatically determine the content pages by taking into account the organization of the web site, the media-based information content, as well as the influence of a specific user browsing pattern. Given a specific browsing pattern, in our method, putative content pages are identified as the pages corresponding to the local minima of page-content entropy values. For an (unknown) user information goal this intuitively corresponds to modeling the progressive transition of the user from pages with generic information to those with specific information. Experimental investigations on media rich sites demonstrate the effectiveness of the technique and underline its potential in modeling user information needs and actions in a media-rich web.  相似文献   
35.
We introduce the concert (or cafeteria) queueing problem: A finite but large number of customers arrive into a queueing system that starts service at a specified opening time. Each customer is free to choose her arrival time (before or after opening time), and is interested in early service completion with minimal wait. These goals are captured by a cost function which is additive and linear in the waiting time and service completion time, with coefficients that may be class dependent. We consider a fluid model of this system, which is motivated as the fluid-scale limit of the stochastic system. In the fluid setting, we explicitly identify the unique Nash-equilibrium arrival profile for each class of customers. Our structural results imply that, in equilibrium, the arrival rate is increasing up until the closing time where all customers are served. Furthermore, the waiting queue is maximal at the opening time, and monotonically decreases thereafter. In the simple single class setting, we show that the price of anarchy (PoA, the efficiency loss relative to the socially optimal solution) is exactly two, while in the multi-class setting we develop tight upper and lower bounds on the PoA. In addition, we consider several mechanisms that may be used to reduce the PoA. The proposed model may explain queueing phenomena in diverse settings that involve a pre-assigned opening time.  相似文献   
36.
Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware, or, more deviously, can facilitate software attacks. Current defense against Trojan circuits consists of statistical detection techniques to find such circuits before product deployment. The fact that statistical detection can result in false negatives raises the obvious questions: can attacks be detected post-deployment, and is secure execution nonetheless possible using chips with undetected Trojan circuits? In this paper we present the Secure Heartbeat And Dual-Encryption (SHADE) architecture, a compiler–hardware solution for detecting and preventing a subset of Trojan circuit attacks in deployed systems. Two layers of hardware encryption are combined with a heartbeat of off-chip accesses to provide a secure execution environment using untrusted hardware. The SHADE system is designed to complement pre-deployment detection techniques and to add a final, last-chance layer of security.  相似文献   
37.
Information Systems and e-Business Management - Collaborative filtering (CF) is a popular and widely accepted recommendation technique. CF is an automated form of word-of-mouth communication...  相似文献   
38.
Clustered VLIW architectures solve the scalability problem associated with flat VLIW architectures by partitioning the register file and connecting only a subset of the functional units to a register file. However, inter-cluster communication in clustered architectures leads to increased leakage in functional components and a high number of register accesses. In this paper, we propose compiler scheduling algorithms targeting two previously ignored power-hungry components in clustered VLIW architectures, viz., instruction decoder and register file.We consider a split decoder design and propose a new energy-aware instruction scheduling algorithm that provides 14.5% and 17.3% benefit in the decoder power consumption on an average over a purely hardware based scheme in the context of 2-clustered and 4-clustered VLIW machines. In the case of register files, we propose two new scheduling algorithms that exploit limited register snooping capability to reduce extra register file accesses. The proposed algorithms reduce register file power consumption on an average by 6.85% and 11.90% (10.39% and 17.78%), respectively, along with performance improvement of 4.81% and 5.34% (9.39% and 11.16%) over a traditional greedy algorithm for 2-clustered (4-clustered) VLIW machine.  相似文献   
39.
Abstract— A novel approach of modeling a‐Si:H TFTs with the industry‐standard BSIM3 compact model is presented. The described approach defines the a‐Si:H TFT drain current and terminal charges as explicit functions of terminal voltages using a minimum set of BSIM3 parameters. The set of BSIM3 parameters is chosen based on the electrical and physical characteristics of the a‐Si:H TFT and their values extracted from measured data. By using the selected BSIM3 model parameters, the a‐Si:H TFT is simulated inside SPICE to fit the simulated I‐V and C‐V curves with the measured results. Finally, the extracted BSIM3 model is validated by simulating the kickback voltage effect in an AMLCD pixel array.  相似文献   
40.
We present an approach for controlling robotic interactions with objects, using synthetic images generated by morphing shapes. In particular, we attempt the problem of positioning an eye-in-hand robotic system with respect to objects in the workspace for grasping and manipulation. In our formulation, the grasp position (and consequently the approach trajectory of the manipulator), varies with each object. The proposed solution to the problem consists of two parts. First, based on a model-based object recognition framework, images of the objects taken at the desired grasp pose are stored in a database. The recognition and identification of the grasp position for an unknown input object (selected from the family of recognizable objects) occurs by morphing its contour to the templates in the database and using the virtual energy spent during the morph as a dissimilarity measure. In the second step, the images synthesized during the morph are used to guide the eye-in-hand system and execute the grasp. The proposed method requires minimal calibration of the system. Furthermore, it conjoins techniques from shape recognition, computer graphics, and vision-based robot control in a unified engineering amework. Potential applications range from recognition and positioning with respect to partially-occluded or deformable objects to planning robotic grasping based on human demonstration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号