首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1431篇
  免费   62篇
电工技术   13篇
综合类   1篇
化学工业   346篇
金属工艺   37篇
机械仪表   40篇
建筑科学   48篇
矿业工程   2篇
能源动力   67篇
轻工业   110篇
水利工程   6篇
石油天然气   6篇
无线电   122篇
一般工业技术   303篇
冶金工业   143篇
原子能技术   15篇
自动化技术   234篇
  2023年   10篇
  2022年   24篇
  2021年   35篇
  2020年   26篇
  2019年   22篇
  2018年   24篇
  2017年   40篇
  2016年   42篇
  2015年   33篇
  2014年   40篇
  2013年   89篇
  2012年   77篇
  2011年   85篇
  2010年   72篇
  2009年   85篇
  2008年   83篇
  2007年   62篇
  2006年   64篇
  2005年   55篇
  2004年   40篇
  2003年   40篇
  2002年   39篇
  2001年   26篇
  2000年   14篇
  1999年   28篇
  1998年   49篇
  1997年   32篇
  1996年   24篇
  1995年   22篇
  1994年   18篇
  1993年   17篇
  1992年   11篇
  1991年   14篇
  1990年   13篇
  1989年   10篇
  1988年   10篇
  1987年   13篇
  1986年   11篇
  1985年   14篇
  1984年   8篇
  1983年   5篇
  1982年   9篇
  1981年   10篇
  1980年   6篇
  1979年   8篇
  1978年   5篇
  1977年   5篇
  1976年   5篇
  1975年   4篇
  1974年   4篇
排序方式: 共有1493条查询结果,搜索用时 10 毫秒
41.
This paper considers the problem of electing an eventual leader in an asynchronous shared memory system. While this problem has received a lot of attention in message-passing systems, very few solutions have been proposed for shared memory systems. As an eventual leader cannot be elected in a pure asynchronous system prone to process crashes, the paper first proposes to enrich the asynchronous system model with an additional assumption. That assumption (denoted AWB) is particularly weak. It is made up of two complementary parts. More precisely, it requires that, after some time, (1) there is a process whose write accesses to some shared variables be timely, and (2) the timers of (tf) other processes be asymptotically well-behaved (t denotes the maximal number of processes that may crash, and f the actual number of process crashes in a run). The asymptotically well-behaved timer notion is a new notion that generalizes and weakens the traditional notion of timers whose durations are required to monotonically increase when the values they are set to increase (a timer works incorrectly when it expires at arbitrary times, i.e., independently of the value it has been set to). The paper then focuses on the design of t-resilient AWB-based eventual leader protocols. “t-resilient” means that each protocol can cope with up to t process crashes (taking t=n−1 provides wait-free protocols, i.e., protocols that can cope with any number of process failures). Two protocols are presented. The first enjoys the following noteworthy properties: after some time only the elected leader has to write the shared memory, and all but one shared variables have a bounded domain, be the execution finite or infinite. This protocol is consequently optimal with respect to the number of processes that have to write the shared memory. The second protocol guarantees that all the shared variables have a bounded domain. This is obtained at the following additional price: t+1 processes are required to forever write the shared memory. A theorem is proved which states that this price has to be paid by any protocol that elects an eventual leader in a bounded shared memory model. This second protocol is consequently optimal with respect to the number of processes that have to write in such a constrained memory model. In a very interesting way, these protocols show an inherent tradeoff relating the number of processes that have to write the shared memory and the bounded/unbounded attribute of that memory.  相似文献   
42.
Reg-1α/lithostathine, a protein mainly associated with the digestive system, was previously shown to be overexpressed in the pre-clinical stages of Alzheimer’s disease. In vitro, the glycosylated protein was reported to form fibrils at physiological pH following the proteolytic action of trypsin. However, the nature of the protease able to act in the central nervous system is unknown. In the present study, we showed that Reg-1α can be cleaved in vitro by calpain-2, the calcium activated neutral protease, overexpressed in neurodegenerative diseases. Using chemical crosslinking experiments, we found that the two proteins can interact with each other. Identification of the cleavage site using mass spectrometry, between Gln4 and Thr5, was found in agreement with the in silico prediction of the calpain cleavage site, in a position different from the one reported for trypsin, i.e., Arg11-Ile12 peptide bond. We showed that the cleavage was impeded by the presence of the neighboring glycosylation of Thr5. Moreover, in vitro studies using electron microscopy showed that calpain-cleaved protein does not form fibrils as observed after trypsin cleavage. Collectively, our results show that calpain-2 cleaves Reg-1α in vitro, and that this action is not associated with fibril formation.  相似文献   
43.
44.
45.
46.
The inertial stabilisation of the line of sight of an imager fixed on a mobile carrier is considered in order to acquire good quality images despite the disturbances generated by the carrier. A double stage mechanical stabilisation architecture is proposed, where a second stabilisation stage, based on a piezoelectric actuator, is added to the usual structure. The piezoelectric actuator transfer function and hysteresis are characterised through experiments. In order to design the controllers of both stages, a high-level image quality criterion (the modulation transfer function (MTF)) is considered, together with design constraints on the main variables of interest. The criterion and the constraints are evaluated by realistic simulations based on some input and noise profiles measured on a real-life system. The MTF evaluation being time-consuming, a Bayesian optimisation method specially dedicated to expensive-to-evaluate functions is used to obtain the parameters of the controllers. The obtain experimental results are displayed and their performances discussed.  相似文献   
47.
In this paper, we propose to develop a hierarchical library associated with various simulators that can be used in a single platform, called TrustMe-ViP, which enables a unique simulation framework and full model interoperability. Such platform is dedicated to complex SoC design, such as trusted personal devices where cost and time-to-market are very important constraints. To validate this methodology, we present the estimation of BER and power consumption for a Bluetooth transceiver.  相似文献   
48.
49.
Hydrogen energy applications often require that systems are used indoors (e.g., industrial trucks for materials handling in a warehouse facility, fuel cells located in a room, or hydrogen stored and distributed from a gas cabinet). It may also be necessary or desirable to locate some hydrogen system components/equipment inside indoor or outdoor enclosures for security or safety reasons, to isolate them from the end-user and the public, or from weather conditions.Using of hydrogen in confined environments requires detailed assessments of hazards and associated risks, including potential risk prevention and mitigation features. The release of hydrogen can potentially lead to the accumulation of hydrogen and the formation of a flammable hydrogen-air mixture, or can result in jet-fires. Within Hyindoor European Project, carried out for the EU Fuel Cells and Hydrogen Joint Undertaking safety design guidelines and engineering tools have been developed to prevent and mitigate hazardous consequences of hydrogen release in confined environments. Three main areas are considered: Hydrogen release conditions and accumulation, vented deflagrations, jet fires and including under-ventilated flame regimes (e.g., extinguishment or oscillating flames and steady burns). Potential RCS recommendations are also identified.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号