首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   525篇
  免费   30篇
电工技术   5篇
综合类   1篇
化学工业   137篇
金属工艺   27篇
机械仪表   23篇
建筑科学   12篇
矿业工程   1篇
能源动力   32篇
轻工业   38篇
水利工程   4篇
石油天然气   1篇
无线电   62篇
一般工业技术   76篇
冶金工业   41篇
自动化技术   95篇
  2023年   6篇
  2022年   18篇
  2021年   27篇
  2020年   11篇
  2019年   4篇
  2018年   18篇
  2017年   14篇
  2016年   10篇
  2015年   20篇
  2014年   19篇
  2013年   39篇
  2012年   40篇
  2011年   40篇
  2010年   26篇
  2009年   30篇
  2008年   23篇
  2007年   9篇
  2006年   18篇
  2005年   23篇
  2004年   9篇
  2003年   9篇
  2002年   8篇
  2001年   7篇
  2000年   15篇
  1999年   10篇
  1998年   16篇
  1997年   7篇
  1996年   13篇
  1995年   8篇
  1994年   6篇
  1993年   6篇
  1992年   8篇
  1991年   2篇
  1990年   4篇
  1989年   4篇
  1988年   7篇
  1987年   3篇
  1986年   4篇
  1985年   2篇
  1984年   2篇
  1982年   3篇
  1981年   1篇
  1979年   1篇
  1977年   2篇
  1976年   1篇
  1971年   1篇
  1965年   1篇
排序方式: 共有555条查询结果,搜索用时 78 毫秒
11.
We initiate a deep study of Riesz MV-algebras which are MV-algebras endowed with a scalar multiplication with scalars from \([0,1]\) . Extending Mundici’s equivalence between MV-algebras and \(\ell \) -groups, we prove that Riesz MV-algebras are categorically equivalent to unit intervals in Riesz spaces with strong unit. Moreover, the subclass of norm-complete Riesz MV-algebras is equivalent to the class of commutative unital C \(^*\) -algebras. The propositional calculus \({\mathbb R}{\mathcal L}\) that has Riesz MV-algebras as models is a conservative extension of ?ukasiewicz \(\infty \) -valued propositional calculus and is complete with respect to evaluations in the standard model \([0,1]\) . We prove a normal form theorem for this logic, extending McNaughton theorem for ? ukasiewicz logic. We define the notions of quasi-linear combination and quasi-linear span for formulas in \({\mathbb R}{\mathcal L},\) and relate them with the analogue of de Finetti’s coherence criterion for \({\mathbb R}{\mathcal L}\) .  相似文献   
12.
M.C. Leu  X. Peng  W. Zhang 《CIRP Annals》2005,54(1):131-134
This paper presents a new method for surface reconstruction from dexel data for virtual sculpting. This is part of our research efforts to develop a dexel model based sculpting system with the capability of interactive solid modeling with haptics interface. Dexel data are converted to a series of planar contours in parallel slices (i.e. cross sections). Then triangular meshes are created by connecting the contour points in adjacent slices. Examples are given to demonstrate the ability of the described method to convert from dexel data to triangular meshes for the viewing of a sculpted model in different directions.  相似文献   
13.
14.
Internet Protocol-based Television (IPTV) is a digital television service which delivers television content via an IP network. The rapid growth of wireless network technology in recent years has changed, the way people access the Internet. Adding mobility to IPTV can create a truly compelling ubiquitous service which spans different network domains and varied IP-enabled terminals and devices, such as set-top boxes, PCs and cell phones. However, extending IPTV service to wireless networks requires overcoming bandwidth bottlenecks and high packet loss rates. Following the IEEE 802.16 standard, worldwide interoperability for microwave access (WiMAX) features high data rates and large service coverage, offering a wireless broadband solution for IPTV services. While previous research has focused on creating a broadband IPTV service few studies have practically evaluated IPTV applications in a wireless broadband network environment. In this paper, we model and evaluate a common constant bit rate (CBR)1 based IPTV application and an IPTV live streaming (PPStreaming)2 application while retrieving IPTV content via a WiMAX network. We also use the NS2 simulation tool to evaluate the performance of these two IPTV applications. The evaluation metrics include latency, packet loss, data rate and throughput statistics when the two IPTV applications are run in the WiMAX network. 1The simplest IPTV solution is to convey video content by CBR. IPTV operators and content delivery networks relay CBR streaming content to control the demand for network capacity. Broadcasters prefer CBR video as it conserves bandwidth resources, but CBR delivery can degrade video quality result in higher overall demand on network capacity. 2PPStreaming (also referred to as P2P streaming Internet TV) is a network for live media streaming. In principle it’s similar to BitTorrent (BT) in that it provides stable and smooth broadcast of TV programs to broadband users. Unlike traditional streaming media, PPStreaming adopts P2P-streaming technology and supports full-scale visits with tens of thousands of simultaneous users. Its client software can be used in the browser or as a standalone executable.  相似文献   
15.
This paper describes the development of a Wii remote (Wiimote)–based low-cost motion capture system and demonstrates its application for automated assembly simulation. Multiple Wiimotes are used to form a vision system to perform motion capture in 3D space. A hybrid algorithm for calibrating a multi-camera stereo vision system has been developed based on Zhang’s and Svoboda’s calibration algorithms. This hybrid algorithm has been evaluated and shown accuracy improvement over Svoboda’s algorithm for motion capture with multiple cameras. The captured motion data are used to automatically generate an assembly simulation of objects represented by CAD models in real time. The Wiimote-based motion capture system is practically attractive because it is inexpensive, wireless, and easily portable. Application examples have been developed for a single vision system with two Wiimotes to track the assembly of a microsatellite prototype frame and for an integrated vision system with four Wiimotes to track the assembly of a bookshelf.  相似文献   
16.
In a mobile pay-TV system, a large number of messages are exchanged for mutual authentication purposes. In traditional authentication schemes, with one-to-one delivery, one authentication message per request is delivered from a head end system to subscribers. This results in the delivery of a large quantity of messages and therefore is inefficient and costly. Moreover, since most traditional schemes use an RSA-based signature for identity validation and nonrepudiation of communication, they suffer from high communication costs. Due to its wireless nature, mobile pay-TV is vulnerable to attacks during hand-off. As traditional schemes do not support hand-off authentication, they are insecure during hand-off. With these shortcomings, they are not suitable for mobile pay-TV. In this paper, we propose an innovative authentication scheme, in which, by providing one-to-many facility, only one authentication message for multiple requests is broadcasted from the head end system to subscribers. By employing bilinear property of pairing and elliptic curve cryptography, our scheme provides one-to-many facility in the case of multiple requests for the same service in a short period of time. This new scheme achieves better broadcast efficiency and performance on communication costs than traditional ones. Additionally, this scheme provides a hand-off authentication mechanism to protect the access of services while preventing attacks during hand-off; therefore, the scheme is more secure to support access control. Moreover, to provide anonymous authentication for protecting identity privacy, the scheme adopts an identity-based scheme while traditional schemes do not apply. The scheme inherits advantages of the identity-based scheme that a public key does not need to be certificated, the certification authority mechanism will not be needed and the key exchange overhead can be reduced. With these advantages of our scheme, it is well suited for mobile pay-TV system.  相似文献   
17.
In many Grid infrastructures different kinds of information services are in use, which utilize different incompatible data structures and interfaces to encode and provide their data. Homogeneous monitoring of these infrastructures with the monitoring data being accessible everywhere independently of the middleware which provided it, is the basis for a consistent status reporting on the Grids’ resources and services. Thus, interoperability or interoperation between the different information services in a heterogeneous Grid infrastructure is required. Monitoring data must contain the identity of the affected Virtual Organization (VO) so that it can be related to the resources and services the VO has allocated to enable VO-specific information provision. This paper describes a distributed architecture for an interoperable information service, which combines data unification and categorization with policies for VO membership, VO resource management and data transformations. This service builds the basis for an integrated and interoperating monitoring of Grids, which provide their data to more than one VO and utilize heterogeneous information services.  相似文献   
18.
A novel synthetic method to synthesize hydroxyapatite/poly (D,L) lactic acid biocomposite is presented in this study by mixing only the precursors hydroxyapatite and (D,L) LA monomer without adding neither solvent nor catalyst. Three compositions were successfully synthesized with the weight ratios of 1/1, 1/3, and 3/5 (hydroxyapatite/(D,L) lactic acid), and the grafting efficiency of poly (D,L) lactic acid on hydroxyapatite surface reaches up to 84?%. Scanning electron microscopy and Fourier transform infrared spectroscopy showed that the hydroxyapatite particles were successfully incorporated into the poly (D,L) lactic acid polymer and X ray diffraction analysis showed that hydroxyapatite preserved its crystallinity after poly (D,L) lactic acid grafting. Differential scanning calorimetry shows that Tg of hydroxyapatite/poly (D,L) lactic acid composite is less than Tg of pure poly (D,L) lactic acid, which facilitates the shaping of the composite obtained. The addition of poly (D,L) lactic acid improves the adsorption properties of hydroxyapatite for fibronectin extracellular matrix protein. Furthermore, the presence of poly (D,L) lactic acid on hydroxyapatite surface coated with fibronectin enhanced pre-osteoblast STRO-1 adhesion and cell spreading. These results show the promising potential of hydroxyapatite/poly (D,L) lactic acid composite as a bone substitute material for orthopedic applications and bone tissue engineering.  相似文献   
19.
Recently, many methods have been proposed for microarray data analysis. One of the challenges for microarray applications is to select a proper number of the most relevant genes for data analysis. In this paper, we propose a novel hybrid method for feature selection in microarray data analysis. This method first uses a genetic algorithm with dynamic parameter setting (GADP) to generate a number of subsets of genes and to rank the genes according to their occurrence frequencies in the gene subsets. Then, this method uses the χ2-test for homogeneity to select a proper number of the top-ranked genes for data analysis. We use the support vector machine (SVM) to verify the efficiency of the selected genes. Six different microarray datasets are used to compare the performance of the GADP method with the existing methods. The experimental results show that the GADP method is better than the existing methods in terms of the number of selected genes and the prediction accuracy.  相似文献   
20.
Providing an intuitive and effective tool for freeform geometric modeling is important for product design. We introduce in this paper a level-set based spatial warping method for freeform modeling, allowing shape deformation to be initialed by rigid body transformations of volumetric tools. Intuitive user operations including imprinting, deformation and smoothing are developed to shield the user from the underlying geometric complexity. Unlike mesh-based spatial warping methods, the developed method represents a digital model by implicit distance field data and describes its change of geometry by the level-set method. This guarantees the generation of topologically correct triangular mesh models and circumvents the error-prone remeshing and mesh-repairing processes, thus preventing topological errors such as self-intersections. We present this method with algorithm details, numerical experiments and modeling examples.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号