首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   334篇
  免费   14篇
  国内免费   1篇
电工技术   1篇
化学工业   77篇
金属工艺   6篇
机械仪表   8篇
建筑科学   17篇
能源动力   9篇
轻工业   25篇
石油天然气   1篇
无线电   72篇
一般工业技术   53篇
冶金工业   12篇
原子能技术   1篇
自动化技术   67篇
  2023年   3篇
  2022年   5篇
  2021年   6篇
  2020年   6篇
  2019年   4篇
  2018年   6篇
  2017年   3篇
  2016年   11篇
  2015年   9篇
  2014年   18篇
  2013年   18篇
  2012年   26篇
  2011年   21篇
  2010年   22篇
  2009年   27篇
  2008年   30篇
  2007年   9篇
  2006年   16篇
  2005年   16篇
  2004年   11篇
  2003年   6篇
  2002年   12篇
  2001年   1篇
  2000年   15篇
  1999年   6篇
  1998年   6篇
  1997年   7篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1984年   1篇
  1983年   3篇
  1982年   3篇
  1981年   1篇
  1979年   2篇
  1978年   2篇
  1976年   1篇
排序方式: 共有349条查询结果,搜索用时 12 毫秒
21.
To overcome current limitations in micro manufacturing a new approach instead of evolutionary small step progress has to take place. Applying small machine tools to manufacture small workpieces allows for a leap of improvements enabled by the small size itself. This miniaturization in comparison to simply down-scaling current concepts qualifies the use of materials and technologies commonly not found in machine tools. This contribution describes the aspects, methodology, qualifications as well as cause and effects pursued by the approach of small machine tools for small workpieces.  相似文献   
22.
23.
Acute myeloid leukemia (AML), the most common type of leukemia in older adults, is a heterogeneous disease that originates from the clonal expansion of undifferentiated hematopoietic progenitor cells. These cells present a remarkable variety of genes and proteins with altered expression and function. Despite significant advances in understanding the molecular panorama of AML and the development of therapies that target mutations, survival has not improved significantly, and the therapy standard is still based on highly toxic chemotherapy, which includes cytarabine (Ara-C) and allogeneic hematopoietic cell transplantation. Approximately 60% of AML patients respond favorably to these treatments and go into complete remission; however, most eventually relapse, develop refractory disease or chemoresistance, and do not survive for more than five years. Therefore, drug resistance that initially occurs in leukemic cells (primary resistance) or that develops during or after treatment (acquired resistance) has become the main obstacle to AML treatment. In this work, the main molecules responsible for generating chemoresistance to Ara-C in AML are discussed, as well as some of the newer strategies to overcome it, such as the inclusion of molecules that can induce synergistic cytotoxicity with Ara-C (MNKI-8e, emodin, metformin and niclosamide), subtoxic concentrations of chemotherapy (PD0332991), and potently antineoplastic treatments that do not damage nonmalignant cells (heteronemin or hydroxyurea + azidothymidine).  相似文献   
24.
Within Mobile VCE, a team of several leading U.K. universities, in dose association with major manufacturers and international telecom operators from the mobile industry, have been addressing the challenging task of designing transceiver structures for beyond 3G networks. Innovative approaches led to a plethora of cross-layer optimized technologies of low complexity and high robustness, allowing for the much promised multimedia-centric services over future wireless networks. This article presents a comprehensive overview of the research conducted within Mobile VCE's Core Wireless Access Research Programme, a key focus of which has naturally been on MIMO transceivers. The series of articles offers a coherent view of how the work was structured and comprises a compilation of material that has been presented in detail elsewhere (see references within the article). In this article, the first of four, MIMO channel measurements, analysis, and modeling are presented, which were then utilized to develop compact and distributed antenna arrays. Parallel activities led to research into low-complexity MIMO single-user space-time coding techniques, as well as SISO and MIMO multi-user CDMA-based transceivers for B3G systems. As well as feeding into the industry's in-house research program, significant extensions of this work are now in hand, within Mobile VCE's own core activity, aimed at securing major improvements in delivery efficiency in future wireless systems through cross-layer operation  相似文献   
25.
Tight lower bounds for certain parameterized NP-hard problems   总被引:1,自引:0,他引:1  
Based on the framework of parameterized complexity theory, we derive tight lower bounds on the computational complexity for a number of well-known NP-hard problems. We start by proving a general result, namely that the parameterized weighted satisfiability problem on depth-t circuits cannot be solved in time no(k)mO(1), where n is the circuit input length, m is the circuit size, and k is the parameter, unless the (t − 1)-st level W[t − 1] of the W-hierarchy collapses to FPT. By refining this technique, we prove that a group of parameterized NP-hard problems, including weighted sat, hitting set, set cover, and feature set, cannot be solved in time no(k)mO(1), where n is the size of the universal set from which the k elements are to be selected and m is the instance size, unless the first level W[1] of the W-hierarchy collapses to FPT. We also prove that another group of parameterized problems which includes weighted q-sat (for any fixed q 2), clique, independent set, and dominating set, cannot be solved in time no(k) unless all search problems in the syntactic class SNP, introduced by Papadimitriou and Yannakakis, are solvable in subexponential time. Note that all these parameterized problems have trivial algorithms of running time either nkmO(1) or O(nk).  相似文献   
26.
Soymilk was subjected to various heat treatments at 90, 120 and 140 °C for various lengths of time. The colour and flavour of the soymilk samples were evaluated by a sensory panel consisting of eight semi‐trained assessors on (1) a 9‐unit hedonic scale, with analysis based on the assumption that the units are equidistant, and (2) a 15‐point hedonic ‘Smiley’ pictorial scale, the results being analysed non‐parametrically. The proportion (%) of ratings higher than or equal to/higher than the overall median of the samples was used as a rigorous estimate of product quality. These values were used to determine the colour and flavour changes in heated soymilk and their temperature dependence. The Z‐values derived from the parametric and non‐parametric analyses were in close agreement, ranging from 31 to 33 °C and from 30 to 32 °C for colour and flavour respectively. © 2000 Society of Chemical Industry  相似文献   
27.
A Brownian motion model in the group of diffeomorphisms has been introduced as inducing a least committed prior on warps. This prior is source-destination symmetric, fulfills a natural semi-group property for warps, and with probability 1 creates invertible warps. Using this as a least committed prior, we formulate a Partial Differential Equation for obtaining the maximally likely warp given matching constraints derived from the images. We solve for the free boundary conditions, and the bias toward smaller areas in the finite domain setting. Furthermore, we demonstrate the technique on 2D images, and show that the obtained warps are also in practice source-destination symmetric and in an example on X-ray spine registration provides extrapolations from landmark point superior to those of spline solutions.  相似文献   
28.
The breakdown time of flash memory oxide/nitride/oxide (ONO) layer tbd under positive constant current stressing has been found to be closely related to the cumulative extent of (over)etch of the tungsten silicide, control polysilicon, and ONO layers, i.e., Σ(ΛOE). An empirical first-order relation between tbd and Σ(ΛOE) has been derived to facilitate the plasma etch recipe optimization. This has led to a four-fold increase in the average tbd across a 200-mm wafer to 208 s. More importantly, the spread in tbd has been tightened to ~5%, which is down from ~54%  相似文献   
29.
Tracing traitors     
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are given to paying customers. If a pirate decoder is found, it is desirable to reveal the source of its decryption keys. We describe fully resilient schemes which can be used against any decoder which decrypts with nonnegligible probability. Since there is typically little demand for decoders which decrypt only a small fraction of the transmissions (even if it is nonnegligible), we further introduce threshold tracing schemes which can only be used against decoders which succeed in decryption with probability greater than some threshold. Threshold schemes are considerably more efficient than fully resilient schemes  相似文献   
30.
Computing occluding and transparent motions   总被引:13,自引:6,他引:7  
Computing the motions of several moving objects in image sequences involves simultaneous motion analysis and segmentation. This task can become complicated when image motion changes significantly between frames, as with camera vibrations. Such vibrations make tracking in longer sequences harder, as temporal motion constancy cannot be assumed. The problem becomes even more difficult in the case of transparent motions.A method is presented for detecting and tracking occluding and transparent moving objects, which uses temporal integration without assuming motion constancy. Each new frame in the sequence is compared to a dynamic internal representation image of the tracked object. The internal representation image is constructed by temporally integrating frames after registration based on the motion computation. The temporal integration maintains sharpness of the tracked object, while blurring objects that have other motions. Comparing new frames to the internal representation image causes the motion analysis algorithm to continue tracking the same object in subsequent frames, and to improve the segmentation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号