首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1238篇
  免费   68篇
  国内免费   18篇
电工技术   16篇
综合类   4篇
化学工业   327篇
金属工艺   34篇
机械仪表   32篇
建筑科学   24篇
能源动力   43篇
轻工业   53篇
水利工程   1篇
无线电   243篇
一般工业技术   222篇
冶金工业   103篇
原子能技术   2篇
自动化技术   220篇
  2023年   11篇
  2022年   26篇
  2021年   35篇
  2020年   16篇
  2019年   24篇
  2018年   27篇
  2017年   31篇
  2016年   37篇
  2015年   33篇
  2014年   71篇
  2013年   107篇
  2012年   59篇
  2011年   72篇
  2010年   64篇
  2009年   76篇
  2008年   66篇
  2007年   69篇
  2006年   56篇
  2005年   42篇
  2004年   37篇
  2003年   36篇
  2002年   34篇
  2001年   22篇
  2000年   21篇
  1999年   16篇
  1998年   48篇
  1997年   29篇
  1996年   17篇
  1995年   17篇
  1994年   16篇
  1993年   13篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   10篇
  1988年   7篇
  1986年   5篇
  1985年   9篇
  1984年   9篇
  1983年   3篇
  1982年   6篇
  1981年   4篇
  1980年   2篇
  1979年   4篇
  1978年   2篇
  1977年   3篇
  1976年   3篇
  1975年   3篇
  1974年   3篇
  1970年   2篇
排序方式: 共有1324条查询结果,搜索用时 15 毫秒
111.
With the growing number of routing entries, IP routing lookup has become the major performance bottleneck in backbone routers. In this paper, a complete hardware-based routing lookup system is proposed to achieve high-throughput and high-capacity for IPv6. The proposed system is a cache-centric, hash-based architecture that contains a routing lookup application specific integrated circuit (ASIC) and a memory set. A hash function is used to reduce lookup time for the routing table and ternary content addressable memory (TCAM) effectively resolves the collision problem. The gate count of the ASIC, excluding the binary content addressable memory (BCAM), is about 5306 gates, using an in-house 0.18 μm CMOS single-poly six-metal standard cell library. The results of post-layout simulations show that the ASIC operates in 3.6 ns so that the routing lookup system approaches 260 Mega lookups per second (Mlps), which is sufficient for 100 Gbps networks. The memory density is good, with each routing entry requiring only 64 bits. Moreover, the routing table only needs 10.24 KB on-chip BCAM, 20.04 KB off-chip TCAM and 29.29 MB DRAM for 3.6 M routing entries in the proposed system.  相似文献   
112.
113.

Geometric inverse kinematics procedures that divide the whole problem into several subproblems with known solutions, and make use of screw motion operators have been developed in the past for 6R robot manipulators. These geometric procedures are widely used because the solutions of the subproblems are geometrically meaningful and numerically stable. Nonetheless, the existing subproblems limit the types of 6R robot structural configurations for which the inverse kinematics can be solved. This work presents the solution of a novel geometric subproblem that solves the joint angles of a general anthropomorphic arm. Using this new subproblem, an inverse kinematics procedure is derived which is applicable to a wider range of 6R robot manipulators. The inverse kinematics of a closed curve were carried out, in both simulations and experiments, to validate computational cost and realizability of the proposed approach. Multiple 6R robot manipulators with different structural configurations were used to validate the generality of the method. The results are compared with those of other methods in the screw theory framework. The obtained results show that our approach is the most general and the most efficient.

  相似文献   
114.
The main theme of this paper is to present robust fuzzy controllers for a class of discrete fuzzy bilinear systems. First, the parallel distributed compensation method is utilized to design a fuzzy controller, which ensures the robust asymptotic stability of the closed-loop system and guarantees an H(infinity) norm-bound constraint on disturbance attenuation for all admissible uncertainties. Second, based on the Schur complement and some variable transformations, the stability conditions of the overall fuzzy control system are formulated by linear matrix inequalities. Finally, the validity and applicability of the proposed schemes are demonstrated by a numerical simulation and the Van de Vusse example.  相似文献   
115.
Logos are one of the most important graphic design forms that use an abstracted shape to clearly represent the spirit of a community. Among various styles of abstraction, a particular golden-ratio design is frequently employed by designers to create a concise and regular logo. In this context, designers utilize a set of circular arcs with golden ratios (i.e., all arcs are taken from circles whose radii form a geometric series based on the golden ratio) as the design elements to manually approximate a target shape. This error-prone process requires a large amount of time and effort, posing a significant challenge for design space exploration. In this work, we present a novel computational framework that can automatically generate golden ratio logo abstractions from an input image. Our framework is based on a set of carefully identified design principles and a constrained optimization formulation respecting these principles. We also propose a progressive approach that can efficiently solve the optimization problem, resulting in a sequence of abstractions that approximate the input at decreasing levels of detail. We evaluate our work by testing on images with different formats including real photos, clip arts, and line drawings. We also extensively validate the key components and compare our results with manual results by designers to demonstrate the effectiveness of our framework. Moreover, our framework can largely benefit design space exploration via easy specification of design parameters such as abstraction levels, golden circle sizes, etc.  相似文献   
116.
In many RFID applications, the reader repeatedly identifies the same staying tags. Existing anti-collision protocols can rapidly identify the staying tags by remembering the order in which the tags were recognized in the previous identification process. This paper proposes a novel protocol, dynamic blocking adaptive binary splitting (DBA), based on the blocking mechanism, which prevents the newly-arriving tags from colliding with the staying tags. Moreover, DBA utilizes a dynamic condensation technique to reduce the number of idle slots produced when recognized tags leave. Following the condensation process, multiple staying tags may be required to share the same slot, and thus may cause collisions among them. Accordingly, an efficient ordering binary tree mechanism is proposed to split the collided tags deterministically according to the order in which they were recognized. The analytical and simulation results show that DBA consistently outperforms previous algorithms in all of the considered environments.  相似文献   
117.
118.
Universal Access in the Information Society - In many cases, classrooms seem to be functioning as well as ever, though the challenges and expectations have changed quite dramatically. This study...  相似文献   
119.
Efficient algorithms for mining closed itemsets and their lattice structure   总被引:7,自引:0,他引:7  
The set of frequent closed itemsets uniquely determines the exact frequency of all itemsets, yet it can be orders of magnitude smaller than the set of all frequent itemsets. In this paper, we present CHARM, an efficient algorithm for mining all frequent closed itemsets. It enumerates closed sets using a dual itemset-tidset search tree, using an efficient hybrid search that skips many levels. It also uses a technique called diffsets to reduce the memory footprint of intermediate computations. Finally, it uses a fast hash-based approach to remove any "nonclosed" sets found during computation. We also present CHARM-L, an algorithm that outputs the closed itemset lattice, which is very useful for rule generation and visualization. An extensive experimental evaluation on a number of real and synthetic databases shows that CHARM is a state-of-the-art algorithm that outperforms previous methods. Further, CHARM-L explicitly generates the frequent closed itemset lattice.  相似文献   
120.
We use the graphical processing unit (GPU) to accelerate the tensor contractions, which is the most time consuming operations in the variational method based on the plaquette renormalized states. Using a frustrated Heisenberg J1J2 model on a square lattice as an example, we implement the algorithm based on the compute unified device architecture (CUDA). For a single plaquette contraction with the bond dimensions C = 3 of each rank of the tensor, results are obtained 25 times faster on GPU than on a current CPU core. This makes it possible to simulate systems with the size 8 × 8 and larger, which are extremely time consuming on a single CPU. This technology successfully relieves the computing time dependence with C, while in the CPU serial computation, the total required time scales both with C and the system size.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号