首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3576篇
  免费   65篇
  国内免费   9篇
电工技术   56篇
综合类   3篇
化学工业   531篇
金属工艺   88篇
机械仪表   72篇
建筑科学   153篇
矿业工程   11篇
能源动力   74篇
轻工业   322篇
水利工程   31篇
石油天然气   17篇
武器工业   1篇
无线电   256篇
一般工业技术   546篇
冶金工业   965篇
原子能技术   28篇
自动化技术   496篇
  2022年   25篇
  2021年   25篇
  2020年   24篇
  2019年   34篇
  2018年   39篇
  2017年   41篇
  2016年   48篇
  2015年   49篇
  2014年   69篇
  2013年   188篇
  2012年   97篇
  2011年   156篇
  2010年   94篇
  2009年   93篇
  2008年   166篇
  2007年   124篇
  2006年   113篇
  2005年   110篇
  2004年   104篇
  2003年   105篇
  2002年   104篇
  2001年   63篇
  2000年   65篇
  1999年   75篇
  1998年   169篇
  1997年   88篇
  1996年   83篇
  1995年   66篇
  1994年   77篇
  1993年   52篇
  1992年   66篇
  1991年   41篇
  1990年   59篇
  1989年   43篇
  1988年   45篇
  1987年   45篇
  1986年   46篇
  1985年   47篇
  1984年   63篇
  1983年   59篇
  1982年   56篇
  1981年   38篇
  1980年   42篇
  1979年   34篇
  1978年   43篇
  1977年   44篇
  1976年   59篇
  1975年   28篇
  1974年   33篇
  1973年   32篇
排序方式: 共有3650条查询结果,搜索用时 15 毫秒
71.
On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit floating point arithmetic, the performance of many dense and sparse linear algebra algorithms can be significantly enhanced while maintaining the 64-bit accuracy of the resulting solution. The approach presented here can apply not only to conventional processors but also to other technologies such as Field Programmable Gate Arrays (FPGA), Graphical Processing Units (GPU), and the STI Cell BE processor. Results on modern processor architectures and the STI Cell BE are presented.

Program summary

Program title: ITER-REFCatalogue identifier: AECO_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AECO_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 7211No. of bytes in distributed program, including test data, etc.: 41 862Distribution format: tar.gzProgramming language: FORTRAN 77Computer: desktop, serverOperating system: Unix/LinuxRAM: 512 MbytesClassification: 4.8External routines: BLAS (optional)Nature of problem: On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit floating point arithmetic, the performance of many dense and sparse linear algebra algorithms can be significantly enhanced while maintaining the 64-bit accuracy of the resulting solution.Solution method: Mixed precision algorithms stem from the observation that, in many cases, a single precision solution of a problem can be refined to the point where double precision accuracy is achieved. A common approach to the solution of linear systems, either dense or sparse, is to perform the LU factorization of the coefficient matrix using Gaussian elimination. First, the coefficient matrix A is factored into the product of a lower triangular matrix L and an upper triangular matrix U. Partial row pivoting is in general used to improve numerical stability resulting in a factorization PA=LU, where P is a permutation matrix. The solution for the system is achieved by first solving Ly=Pb (forward substitution) and then solving Ux=y (backward substitution). Due to round-off errors, the computed solution, x, carries a numerical error magnified by the condition number of the coefficient matrix A. In order to improve the computed solution, an iterative process can be applied, which produces a correction to the computed solution at each iteration, which then yields the method that is commonly known as the iterative refinement algorithm. Provided that the system is not too ill-conditioned, the algorithm produces a solution correct to the working precision.Running time: seconds/minutes  相似文献   
72.
Wool handling is an important rural occupation where workers process 200 or more fleeces daily, separating them into various quality components. Loads and postures they experience carry substantial risk of low back pain (LBP). Although a formal skill training structure exists, interaction with loads and LBP is unknown. We examined whether skill and LBP influenced trunk postures and loads of 60 wool handlers representing 3 skill levels. LBP prevalence ranged from 20% for junior (lowest skill) to 45% for open class (highest skill) wool handlers. Open class wool handlers demonstrated increased lateral bend and more axially twisted postures, generating greater medio-lateral shear forces and lateral bend and axial twist moments. LBP was associated with open class wool handlers spending more time in severe axially twisted postures. These findings suggest that skill-based training needs to be reviewed to reduce the quantity of axially twisted posture which may help reduce the prevalence of LBP in this workforce.  相似文献   
73.
Fail-stop failures in distributed environments are often tolerated by checkpointing or message logging. In this paper, we show that fail-stop process failures in ScaLAPACK matrix-matrix multiplication kennel can be tolerated without checkpointing or message logging. It has been proved in previous algorithm-based fault tolerance that, for matrix-matrix multiplication, the checksum relationship in the input checksum matrices is preserved at the end of the computation no mater which algorithm is chosen. From this checksum relationship in the final computation results, processor miscalculations can be detected, located, and corrected at the end of the computation. However, whether this checksum relationship can be maintained in the middle of the computation or not remains open. In this paper, we first demonstrate that, for many matrix matrix multiplication algorithms, the checksum relationship in the input checksum matrices is not maintained in the middle of the computation. We then prove that, however, for the outer product version algorithm, the checksum relationship in the input checksum matrices can be maintained in the middle of the computation. Based on this checksum relationship maintained in the middle of the computation, we demonstrate that fail-stop process failures (which are often tolerated by checkpointing or message logging) in ScaLAPACK matrix-matrix multiplication can be tolerated without checkpointing or message logging.  相似文献   
74.
Parametric embedding for class visualization   总被引:1,自引:0,他引:1  
We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.  相似文献   
75.
This work investigates the modeling of aggregate available bandwidth in multi-sender network applications. Unlike the well-established client–server model, where there is only one server sending the requested data, the available bandwidth of multiple senders when combined together does exhibit consistent properties and thus can be modeled and estimated. Through extensive experiments conducted in the Internet this work proposed to model the aggregate available bandwidth using a normal distribution and then illustrates its application through a hybrid download-streaming algorithm and a playback-adaptive streaming algorithm for video delivery under different bandwidth availability scenarios. This new multi-source bandwidth model opens a new way to provide probabilistic performance guarantee in best-effort networks such as the Internet, and is particularly suitable for the emerging peer-to-peer applications, where having multiple sources is the norm rather than the exception.
Jack Y. B. LeeEmail:
  相似文献   
76.
It's a banker     
Griffiths  Andrew 《ITNOW》2007,49(3):12-13
  相似文献   
77.
OBJECTIVE: The objective of the study was to evaluate the differences between sitting on a stability ball and in an office chair in terms of trunk muscle activation and lumbar spine posture. BACKGROUND: Stability balls have become increasingly popular as an alternative to office chairs to help reduce the prevalence of low back pain; however, little research has been conducted on their use as office chairs. METHODS: The 14 participants (7 men, 7 women) were required to sit on both a stability ball and an office chair for 1 hour each while performing various computer workstation tasks throughout the sitting periods. The activation of eight muscles and lumbar spine posture were measured and analyzed. RESULTS: Increased muscle activation in thoracic erector spinae (p = .0352), decreased pelvic tilt (p = .0114), and increased perceived discomfort (p < .0001) while sitting on the stability ball were observed. CONCLUSIONS: The small changes in biological responses when sitting on a stability ball as compared with an office chair, combined with the increased reported discomfort while on the ball, suggests its use for prolonged sitting may not be advantageous. APPLICATION: Prolonged sitting on a stability ball does not greatly alter the manner in which an individual sits, yet it appears to increase the level of discomfort. Therefore, it is important to fully explore a new chair design and consult scientific research before implementing its use.  相似文献   
78.
79.
The composition profiles of GaAs/Ga1?xAlxAs heterostructures prepared in two different Metal-Organic Chemical Vapour Deposition (MOCVD) reactors have been studied. Transmission electron microscopy (TEM). and Auger and secondary ion mass spectrometry (SIMS) sputter profiling results are in good agreement and interface widths below 20 å have been achieved. Significant new results on transient phenomena have been obtained. showing that large and sometimes very sharp excursions in composition can be associated with valve switching actions. Direct evidence is presented that gas pressure or flow transients can occur during valve operations. and it is suggested that such instabilities are the cause of the effects observed.  相似文献   
80.
The relationship between the distribution of the critical temperature, the percolation function, and the resistive transition of the critical temperature is explored for polycrystalline Nb3Sn. In the neighborhood of the critical temperature, Nb3Sn is assumed to be a random mixture of superconducting and normal grains. Percolation concepts are applied to a study of the resistivity. A general analysis is made showing that the onset and shape of the resistive transition for composite conductors are determined by the percolation function and the distribution of the critical temperature. An approximate form of the percolation function is determined based on a linear FEM analysis. Example resistive transitions are calculated for an assumed normal distribution of the critical temperature. An argument is presented that relates grain orientation and strain dependence in Nb3Sn. It is noted that a dependence of the distribution of Tc with strain, in addition to the usual shift in Tc with strain, would be the result of a strain dependence that is a function of grain orientation. The analysis shows the extent to which the slope of the resistive transition is a measure of the distribution of the critical temperature, and therefore a measure of the grain orientation strain sensitivity. Finally, a method is described to determine the percolation function experimentally.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号