首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   219篇
  免费   7篇
电工技术   2篇
化学工业   21篇
机械仪表   5篇
建筑科学   22篇
能源动力   3篇
轻工业   31篇
水利工程   1篇
石油天然气   1篇
无线电   15篇
一般工业技术   31篇
冶金工业   38篇
自动化技术   56篇
  2023年   2篇
  2022年   2篇
  2021年   2篇
  2020年   1篇
  2019年   5篇
  2018年   10篇
  2017年   7篇
  2015年   3篇
  2014年   8篇
  2013年   16篇
  2012年   8篇
  2011年   19篇
  2010年   5篇
  2009年   9篇
  2008年   16篇
  2007年   13篇
  2006年   5篇
  2005年   6篇
  2004年   8篇
  2003年   3篇
  2002年   4篇
  2001年   5篇
  2000年   4篇
  1999年   5篇
  1998年   5篇
  1997年   4篇
  1996年   10篇
  1995年   3篇
  1994年   4篇
  1993年   3篇
  1992年   5篇
  1991年   1篇
  1990年   2篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1978年   4篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1967年   2篇
排序方式: 共有226条查询结果,搜索用时 4 毫秒
81.
This paper establishes control strategies for wheeled mobile robots which are subjected to nonholonomic constraints. The mobile robot model includes the kinematic and dynamic equations of motion and the actuator dynamics. Using the notion of virtual vehicle and the concept of flatness, and applying the backstepping methodology the paper proposes control schemes for trajectory tracking for the considered augmented model of the mobile robot. The resulting controller ensures exponential convergence to a desired trajectory. Applications of the tracking controller for convoy-like vehicles governed by the augmented models are considered as well. Simulation results and lab experiments are demonstrated.  相似文献   
82.
The superior performance of the binary turbo codes has stimulated vigorous efforts in generating bandwidth efficient modulation schemes adhering to these codes. Several approaches for the integration of turbo-coding and modulation have emerged in recent years but none seem to dominate. In the bit interleaved coded modulation (Bicm) scheme is used to achieve high bandwidth and power efficiency, while separating coding and modulation. As is now well known, theBicm scheme achieves capacity remarkably close to the constellation channel capacity. The turbo-Bicm scheme enjoys high coding diversity (well suited for fading channels), high flexibility as well as design and implementation simplicity, while maintaining good power efficiency. The system comprises one standard turbo code, an interleaver, a mapper and a modulator at the transmitter, corresponding to a demodulator, a de-interleaver and a turbo decoder at the receiver. A modified system, which improves on performance by incorporating the demodulation in the iterative decoding procedure, is investigated, and some performance gain is demonstrated, especially for low rate codes. Information theoretic arguments for the somewhat minor potential improvement in performance are detailed. The preferred mapper and interleaver for this system are considered. Extending previous works, for higher level modulations, we analyze a system including a convolutional code, an interleaver, a differential encoder (De), a mapper and a modulator at the transmitter. As for theBpsk modulation, the serial concatenation of a convolutional code withDe outperforms the single convolutional code. The serial concatenation withDe approach is analyzed also for a turbo code, where it is found to fail in achieving performance improvement. Several structures for the serial concatenation withDe are examined. These results are substantiated through the ‘spectral thinning’ phenomena of the weight distribution of the convolutional and turbocodes.  相似文献   
83.
Evidence is accumulating to consider the gut microbiome as a central player in the gut‐kidney axis. Microbiome products, such as advanced glycation end products, phenols, and indoles, are absorbed into the circulation but are cleared by normal‐functioning kidneys. These products then become toxic and contribute to the uremic load and to the progression of chronic kidney failure. In this review, we discuss the gut‐kidney interaction under the state of chronic kidney failure as well as the potential mechanisms by which a change in the gut flora (termed gut dysbiosis) in chronic kidney disease (CKD) exacerbates uremia and leads to further progression of CKD and inflammation. Finally, the potential therapeutic interventions to target the gut microbiome in CKD are discussed.  相似文献   
84.
Multispectral photodetectors (MSPs) and circularly polarized light (CPL) sensors are important in opto-electronics, photonics, and imaging. A capacitive photodetector consisting of an interdigitated electrode coated with carbon dot/anthraquinone-polydiacetylene is constructed. Photoexcitation of the carbon dots induces transient electron transfer to the anthraquinone moieties, and concomitant change in the film dielectric constant and recorded capacitance. This unique photodetection mechanism furnishes wavelength selectivity that is solely determined by the absorbance of the carbon dots incorporated in the anthraquinone-polydiacetylene matrix. Accordingly, employing an array of polymerized-anthraquinone photodetector films comprising carbon dots (C-dots) exhibiting different excitation wavelengths yielded optical “capacitive fingerprints” in a broad spectral range (350–650 nm). Furthermore, circular light polarization selectivity is achieved through chiral polymerization of the polydiacetylene framework. The carbon dot/anthraquinone-polydiacetylene capacitive photodetector features rapid photo-response, high fidelity, and recyclability as the redox reactions of anthraquinone are fully reversible. The carbon dot/anthraquinone-polydiacetylene platform is inexpensive, easy to fabricate, and consists of environmentally friendly materials.  相似文献   
85.
Ittah N  Yutsis I  Selzer Y 《Nano letters》2008,8(11):3922-3927
Metal quantum point contacts (MQPCs), with dimensions comparable to the de Broglie wavelength of conducting electrons, reveal ballistic transport of electrons and quantized conductance in units of G0=2e(2)/h. While these contacts hold great promise for applications such as coherent controlled devices and atomic switches, their realization is mainly based on the scanning tunneling microscope (STM) and mechanically controlled break junction (MCBJ), which cannot be integrated into electronic circuits. MQPCs produced by these techniques have also limited stability at room temperature. Here we report on a new method to form MQPCs with quantized conductance values in the range of 1-4G0. The contacts appear to be stable at room temperature for hours and can be deterministically switched between conductance values, or reform in case they break, using voltage pulses. The method enables us to integrate MQPCs within nanoscale circuits to fully harness their unique advantages.  相似文献   
86.
Semi-conductors with mobile acceptors or donors show a new type of I-V relations. This paper presents experimental results for solid state devices based on copper oxide, found to be Cu2O, which exhibit these I-V relations. The cells examined are Cu| Cu2O| In and Cu| Cu2O| Ag and similar ones tested at room temperature. The measured I-V relations are different from those reported for the same type of cells in the past, which were explained to be fixed by a Schottky barrier Cu| Cu2O. We find that the I-V relations relax over a long time which we claim is due to ion redistribution. The new I-V relations can then be explained by assuming that Cu2O is a mixed-ionic-electronic-conductor and adopting a theory developed by us in the past and modified to be applicable to the relevant defect model here. In this case the contribution of Schottky barriers is insignificant.  相似文献   
87.
The estimation of the epipolar geometry is especially difficult when the putative correspondences include a low percentage of inlier correspondences and/or a large subset of the inliers is consistent with a degenerate configuration of the epipolar geometry that is totally incorrect. This work presents the Balanced Exploration and Exploitation Model Search (BEEM) algorithm that works very well especially for these difficult scenes. The algorithm handles these two problems in a unified manner. It includes the following main features: (1) Balanced use of three search techniques: global random exploration, local exploration near the current best solution and local exploitation to improve the quality of the model. (2) Exploits available prior information to accelerate the search process. (3) Uses the best found model to guide the search process, escape from degenerate models and to define an efficient stopping criterion. (4) Presents a simple and efficient method to estimate the epipolar geometry from two SIFT correspondences. (5) Uses the locality-sensitive hashing (LSH) approximate nearest neighbor algorithm for fast putative correspondences generation. The resulting algorithm when tested on real images with or without degenerate configurations gives quality estimations and achieves significant speedups compared to the state of the art algorithms.  相似文献   
88.
The introduction of wet SEM imaging technology permits electron microscopy of wet samples. Samples are placed in sealed specimen capsules and are insulated from the vacuum in the SEM chamber by an impermeable, electron-transparent membrane. The complete insulation of the sample from the vacuum allows direct imaging of fully hydrated, whole-mount tissue. In the current work, we demonstrate direct inspection of thick pancreatic tissue slices (above 400 mum). In the case of scanning of the pancreatic surface, the boundaries of intracellular features are seen directly. Thus no unfolding is required to ascertain the actual particle size distribution based on the sizes of the sections. This method enabled us to investigate the true granule size distribution and confirm early studies of improved conformity to a Poisson-like distribution, suggesting that the homotypic granule growth results from a mechanism, which favors the addition of a single unit granule to mature granules.  相似文献   
89.
A highly accurate numerical scheme is presented for the Serre system of partial differential equations, which models the propagation of dispersive shallow water waves in the fully-nonlinear regime. The fully-discrete scheme utilizes the Galerkin / finite-element method based on smooth periodic splines in space, and an explicit fourth-order Runge–Kutta method in time. Computations compared with exact solitary and cnoidal wave solutions show that the scheme achieves the optimal orders of accuracy in space and time. These computations also show that the stability of this scheme does not impose very restrictive conditions on the temporal stepsize. In addition, solitary, cnoidal, and dispersive shock waves are studied in detail using this numerical scheme for the Serre system and compared with the ‘classical’ Boussinesq system for small-amplitude shallow water waves. The results show that the interaction of solitary waves in the Serre system is more inelastic. The efficacy of the numerical scheme for modeling dispersive shocks is shown by comparison with asymptotic results. These results have application to the modeling of shallow water waves of intermediate or large amplitude.  相似文献   
90.
We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of \(x_1, \ldots , x_t\) to compute \(f(x_1, \ldots , x_t)\) but nothing else. This is achieved starting from any general-purpose private-key single-input scheme (without any additional assumptions) and is proven to be adaptively secure for any constant number of inputs t. Moreover, it can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponentially secure. Instantiating our construction with existing single-input schemes, we obtain multi-input schemes that are based on a variety of assumptions (such as indistinguishability obfuscation, multilinear maps, learning with errors, and even one-way functions), offering various trade-offs between security assumptions and functionality. Previous and concurrent constructions of multi-input functional encryption schemes either rely on stronger assumptions and provided weaker security guarantees (Goldwasser et al. in Advances in cryptology—EUROCRYPT, 2014; Ananth and Jain in Advances in cryptology—CRYPTO, 2015), or relied on multilinear maps and could be proven secure only in an idealized generic model (Boneh et al. in Advances in cryptology—EUROCRYPT, 2015). In comparison, we present a general transformation that simultaneously relies on weaker assumptions and guarantees stronger security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号