首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   219篇
  免费   7篇
电工技术   2篇
化学工业   21篇
机械仪表   5篇
建筑科学   22篇
能源动力   3篇
轻工业   31篇
水利工程   1篇
石油天然气   1篇
无线电   15篇
一般工业技术   31篇
冶金工业   38篇
自动化技术   56篇
  2023年   2篇
  2022年   2篇
  2021年   2篇
  2020年   1篇
  2019年   5篇
  2018年   10篇
  2017年   7篇
  2015年   3篇
  2014年   8篇
  2013年   16篇
  2012年   8篇
  2011年   19篇
  2010年   5篇
  2009年   9篇
  2008年   16篇
  2007年   13篇
  2006年   5篇
  2005年   6篇
  2004年   8篇
  2003年   3篇
  2002年   4篇
  2001年   5篇
  2000年   4篇
  1999年   5篇
  1998年   5篇
  1997年   4篇
  1996年   10篇
  1995年   3篇
  1994年   4篇
  1993年   3篇
  1992年   5篇
  1991年   1篇
  1990年   2篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1978年   4篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1967年   2篇
排序方式: 共有226条查询结果,搜索用时 15 毫秒
31.
Journal of Materials Science: Materials in Electronics - A comprehensive understanding of the resistive switching mechanisms that activate REDOX-based random access memory devices is necessary to...  相似文献   
32.
33.
34.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\).  相似文献   
35.
Barriers are defined as discontinuities in the broadly defined marginal costs of communication, usually leading to a discontinuity in interaction. This paper addresses conceptual issues about barriers to communication. Several typologies of barriers are given. For example, according to the degree of permeability, barriers may discourage interaction, or may even be entirely impermeable, but examples may also be given of barriers which stimulate communication in one or both directions. Another typology of barriers addresses reasons of existence, including natural barriers, barriers created for protection purposes, barriers created for reasons of convenience, etc. The paper concludes with a number of suggestions for further research on communication barriers.  相似文献   
36.
Slab waveguides were constructed in K(1-x)Li(x)Ta(1-y)Nb(y)O(3) crystals by the implantation of (12)C(+4) ions at 30 MeV and (16)O(+5) ions at 30 and 40 MeV. The waveguides were characterized by a prism coupler setup. A refractive index drop of 10.9% was observed in a layer formed by the implantation of (16)O(+5) ions at 30 MeV. The carbon-implanted waveguides were found to be thermally stable after annealing at 450 degrees C. A semiempirical formula for predicting the change in the refractive index given the parameters of the implantation process was developed. It is argued that the combination of the basic implantation process with the semiempirical formula can be developed to become a generic method for constructing complex electro-optic circuits with a wave-guided architecture.  相似文献   
37.
We introduce a novel method for visual homing. Using this method a robot can be sent to desired positions and orientations in 3D space specified by single images taken from these positions. Our method is based on recovering the epipolar geometry relating the current image taken by the robot and the target image. Using the epipolar geometry, most of the parameters which specify the differences in position and orientation of the camera between the two images are recovered. However, since not all of the parameters can be recovered from two images, we have developed specific methods to bypass these missing parameters and resolve the ambiguities that exist. We present two homing algorithms for two standard projection models, weak and full perspective.Our method determines the path of the robot on-line, the starting position of the robot is relatively not constrained, and a 3D model of the environment is not required. The method is almost entirely memoryless, in the sense that at every step the path to the target position is determined independently of the previous path taken by the robot. Because of this property the robot may be able, while moving toward the target, to perform auxiliary tasks or to avoid obstacles, without this impairing its ability to eventually reach the target position. We have performed simulations and real experiments which demonstrate the robustness of the method and that the algorithms always converge to the target pose.  相似文献   
38.
The effect of tensile strain on structural and ferroelectric properties of BiFeO3 epitaxial films was investigated. The films grown by pulsed laser deposition on MgAl2O4 (0 0 1) substrates revealed monoclinic structure deviated from the bulk rhombohedral structure due to a tensile strain along the in-plane direction. The strain is induced by the difference in thermal expansion coefficients between the film and the substrate. A Poisson ratio is calculated from the in-plain and out-of-plain lattice constants at different temperatures measured by reciprocal space maps of X-ray diffraction. The small Poisson ratio compared to the bulk suggests a weaker elastic response at high temperature. The ferroelectric polarization of the tensile-strained film along the (0 0 1) is also decreased from the bulk value.  相似文献   
39.
Electric vehicles (EVs) present efficiency and environmental advantages over conventional transportation. It is expected that in the next decade this technology will progressively penetrate the market. The integration of plug-in electric vehicles in electric power systems poses new challenges in terms of regulation and business models. This paper proposes a conceptual regulatory framework for charging EVs. Two new electricity market agents, the EV charging manager and the EV aggregator, in charge of developing charging infrastructure and providing charging services are introduced. According to that, several charging modes such as EV home charging, public charging on streets, and dedicated charging stations are formulated. Involved market agents and their commercial relationships are analysed in detail. The paper elaborates the opportunities to formulate more sophisticated business models for vehicle-to-grid applications under which the storage capability of EV batteries is used for providing peak power or frequency regulation to support the power system operation. Finally penetration phase dependent policy and regulatory recommendations are given concerning time-of-use pricing, smart meter deployment, stable and simple regulation for reselling energy on private property, roll-out of public charging infrastructure as well as reviewing of grid codes and operational system procedures for interactions between network operators and vehicle aggregators.  相似文献   
40.
  • Does the quality of domestic legal institutions matter for export performance? How does differential access to protections and privileges offered by informal institutions moderate the relationship between the quality of formal legal institutions and export performance? To answer these questions, we develop a theoretical framework drawing on insights from trade theory and institutional theory.
  • We propose that higher-quality legal systems in an exporter’s location are associated with higher export performance, particularly when trade partners face higher levels of external and internal uncertainty. We further propose that firms that have less access to local informal institutions to reduce transaction costs and opportunism benefit more from better-developed legal institutions.
  • Using information for more than 198,000 firms and legal quality information for 120 cities in China, we find strong support for our predictions. We discuss our contributions to the literature on institutions and export.
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号