首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   726篇
  免费   8篇
电工技术   10篇
综合类   1篇
化学工业   172篇
金属工艺   9篇
机械仪表   11篇
建筑科学   19篇
能源动力   11篇
轻工业   39篇
水利工程   4篇
石油天然气   6篇
无线电   46篇
一般工业技术   98篇
冶金工业   138篇
原子能技术   4篇
自动化技术   166篇
  2024年   8篇
  2023年   4篇
  2022年   6篇
  2021年   12篇
  2020年   16篇
  2019年   14篇
  2018年   11篇
  2017年   19篇
  2016年   17篇
  2015年   12篇
  2014年   23篇
  2013年   36篇
  2012年   45篇
  2011年   42篇
  2010年   33篇
  2009年   40篇
  2008年   38篇
  2007年   34篇
  2006年   18篇
  2005年   27篇
  2004年   17篇
  2003年   14篇
  2002年   13篇
  2001年   9篇
  2000年   6篇
  1999年   8篇
  1998年   35篇
  1997年   25篇
  1996年   18篇
  1995年   6篇
  1994年   17篇
  1993年   12篇
  1992年   9篇
  1991年   8篇
  1990年   5篇
  1989年   8篇
  1988年   8篇
  1987年   5篇
  1986年   7篇
  1985年   12篇
  1983年   3篇
  1982年   2篇
  1980年   4篇
  1979年   2篇
  1978年   4篇
  1977年   7篇
  1976年   2篇
  1975年   3篇
  1971年   2篇
  1968年   2篇
排序方式: 共有734条查询结果,搜索用时 15 毫秒
51.
52.
The problems of how to secure the electromagnetic compatibility of technological equipment with the help of resonance transfilters (matching filter) are examined. An equivalent circuit and mathematical model for transfilters are developed. The tests results verify the adequacy of the mathematical model.  相似文献   
53.
Inorganic oxidizing agents are used in various explosive mixtures that are analysed by analytical chemists. Among them are dynamites, ANFO, black powder, match heads, pyrotechnical devices and home-made bombs. The crucial step in post explosion analysis is the extraction and purification of the explosive residues from the debris. A unique, fast and selective extraction technique for inorganic oxidizing agents is described in this paper. The debris are first extracted with water to yield an aqueous solution of the ions. Oxidizing anions such as nitrate and chlorate, are selectively transfered into the organic phase by the use of lipophilic quarternary ammonium cations. Other anions such as carbonate, sulphate and nitrite are not extracted into the organic phase under these conditions. The extracted anions are then identified by infra-red spectrometry and chemical spot tests.  相似文献   
54.
55.
56.
Summary A self-stabilizing program eventually resumes normal behavior even if excution begins in, an abnormal initial state. In this paper, we explore the possibility of extending an arbitrary program into a self-stabilizing one. Our contributions are: (1) a formal definition of the concept of one program being aself-stabilizing extension of another; (2) a characterization of what properties may hold in such extensions; (3) a demonstration of the possibility of mechanically creating such extensions. The computtional model used is that of an asynchronous distributed message-passing system whose communication topology is an arbitrary graph. We contrast the difficulties of self-stabilization in thismodel with those of themore common shared-memory models. Shmuel Katz received his B.A. in Mathematics and Englisch Literature from U.C.L.A., and his M.Sc. and Ph.D. in Computer Science (1976) from the Weizmann Institute in Rechovot, Israel. From 1976 to 1981 he was a research at the IBM Israel Scientific Center. Presently, he is an Associate Professor in the Computer Science Department at the Technion in Haifa, Israel. In 1977–78 he visited for a year at the University of California, Berkeley, and in 1984–85 was at the University of Texas at Austin. He has been a consultant and vistor at the MCC Software Technology Program, and in 1988–89 was a visiting scientist at the IBM Watson Research Center. His research interests include the methodology of programming, specification methods, program verification and semantics, distributed programming, data structure, and programming languages. Kenneth J. Pery has performed research in the area of distributed computing since obtaining Masters and Doctorate degrees in Computer Science from Cornell Univesity. His current interest is in studying problems of a partical nature in a formal context. He was graduated from Princeton University in 1979 with a B.S.E. degree in Electrical Engineering and Computer Science.The Research of this author was partially supported by Research Grant 120-749 and the Argentinian Research Fund at the Technion  相似文献   
57.
We study broadcasting, also known as one-to-all communication, in synchronous radio networks with known topology modeled by undirected (symmetric) graphs, where the interference range of a node is likely exceeding its transmission range. In this model, if two nodes are connected by a transmission edge they can communicate directly. On the other hand, if two nodes are connected by an interference edge they cannot communicate directly and transmission of one node disables recipience of any message at the other node. For a network $G,$ we term the smallest integer $d$ , s.t., for any interference edge $e$ there exists a simple path formed of at most $d$ transmission edges connecting the endpoints of $e$ as its interference distance $d_I$ . In this model the schedule of transmissions is precomputed in advance. It is based on the full knowledge of the size and the topology (including location of transmission and interference edges) of the network. We are interested in the design of fast broadcasting schedules that are energy efficient, i.e., based on a bounded number of transmissions executed at each node. We adopt $n$ as the number of nodes, $D_T$ is the diameter of the subnetwork induced by the transmission edges, and $\varDelta $ refers to the maximum combined degree (formed of transmission and interference edges) of the network. We contribute the following new results: (1) We prove that for networks with the interference distance $d_I\ge 2$ any broadcasting schedule requires at least $D_T+\varOmega (\varDelta \cdot \frac{\log {n}}{\log {\varDelta }})$ rounds. (2) We provide for networks modeled by bipartite graphs an algorithm that computes $1$ -shot (each node transmits at most once) broadcasting schedules of length $O(\varDelta \cdot \log {n})$ . (3) The main result of the paper is an algorithm that computes a $1$ -shot broadcasting schedule of length at most $4 \cdot D_T + O(\varDelta \cdot d_I \cdot \log ^4{n})$ for networks with arbitrary topology. Note that in view of the lower bound from (1) if $d_I$ is poly-logarithmic in $n$ this broadcast schedule is a poly-logarithmic factor away from the optimal solution.  相似文献   
58.
S. G. Gal 《Calcolo》1990,27(3-4):195-202
For a continuous nonconcave function on [a,b] we prove that the modulus of continuity of f satisfies ω(f;δ)=max{|f(a+δ)−f(a)|; |f(b−δ)−f(b)|}, for δ sufficiently small. Some applications in approximation theory are given.  相似文献   
59.
The problem of defining vector space operations on fuzzy and probability vectors is discussed. It is shown that such a definition is equivalent to choosing a 1-1 and onto mapping from the unit interval into the real axis. Although such a mapping cannot be continuous, it is suggested that under certain approximations a continuous mapping can be chosen. A characterization of some useful mappings with applications to image processing is also given.  相似文献   
60.
This paper examines the problem of specifying database security controls in a manner such that the resulting segmentation of data and the patterns of access rights are consistent with traditional accounting concepts that govern segregation of duties. The mechanism we use for implementation of these controls in a relational accounting system is that of a “view” implemented on the Query-by-Example database management system. A number of examples are presented in detail and some further aspects of security and integrity constraints are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号