首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3181篇
  免费   81篇
电工技术   38篇
综合类   4篇
化学工业   396篇
金属工艺   22篇
机械仪表   34篇
建筑科学   77篇
矿业工程   4篇
能源动力   40篇
轻工业   151篇
水利工程   23篇
石油天然气   3篇
无线电   283篇
一般工业技术   322篇
冶金工业   1390篇
原子能技术   18篇
自动化技术   457篇
  2023年   10篇
  2022年   17篇
  2021年   32篇
  2020年   17篇
  2019年   28篇
  2018年   33篇
  2017年   46篇
  2016年   43篇
  2015年   45篇
  2014年   68篇
  2013年   114篇
  2012年   98篇
  2011年   111篇
  2010年   91篇
  2009年   100篇
  2008年   113篇
  2007年   83篇
  2006年   96篇
  2005年   83篇
  2004年   78篇
  2003年   77篇
  2002年   54篇
  2001年   32篇
  2000年   30篇
  1999年   69篇
  1998年   369篇
  1997年   200篇
  1996年   169篇
  1995年   87篇
  1994年   101篇
  1993年   104篇
  1992年   38篇
  1991年   45篇
  1990年   32篇
  1989年   34篇
  1988年   40篇
  1987年   42篇
  1986年   38篇
  1985年   43篇
  1984年   16篇
  1983年   19篇
  1982年   22篇
  1981年   23篇
  1980年   19篇
  1979年   14篇
  1978年   14篇
  1977年   37篇
  1976年   108篇
  1975年   18篇
  1973年   13篇
排序方式: 共有3262条查询结果,搜索用时 31 毫秒
81.
A performance study of multiprocessor task scheduling algorithms   总被引:1,自引:0,他引:1  
Multiprocessor task scheduling is an important and computationally difficult problem. A large number of algorithms were proposed which represent various tradeoffs between the quality of the solution and the computational complexity and scalability of the algorithm. Previous comparison studies have frequently operated with simplifying assumptions, such as independent tasks, artificially generated problems or the assumption of zero communication delay. In this paper, we propose a comparison study with realistic assumptions. Our target problems are two well known problems of linear algebra: LU decomposition and Gauss–Jordan elimination. Both algorithms are naturally parallelizable but have heavy data dependencies. The communication delay will be explicitly considered in the comparisons. In our study, we consider nine scheduling algorithms which are frequently used to the best of our knowledge: min–min, chaining, A*, genetic algorithms, simulated annealing, tabu search, HLFET, ISH, and DSH with task duplication. Based on experimental results, we present a detailed analysis of the scalability, advantages and disadvantages of each algorithm.
Damla TurgutEmail:
  相似文献   
82.
About 20 years ago, Markus and Robey noted that most research on IT impacts had been guided by deterministic perspectives and had neglected to use an emergent perspective, which could account for contradictory findings. They further observed that most research in this area had been carried out using variance theories at the expense of process theories. Finally, they suggested that more emphasis on multilevel theory building would likely improve empirical reliability. In this paper, we reiterate the observations and suggestions made by Markus and Robey on the causal structure of IT impact theories and carry out an analysis of empirical research published in four major IS journals, Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), the European Journal of Information Systems (EJIS), and Information and Organization (I&O), to assess compliance with those recommendations. Our final sample consisted of 161 theory-driven articles, accounting for approximately 21% of all the empirical articles published in these journals. Our results first reveal that 91% of the studies in MISQ, ISR, and EJIS focused on deterministic theories, while 63% of those in I&O adopted an emergent perspective. Furthermore, 91% of the articles in MISQ, ISR, and EJIS adopted a variance model; this compares with 71% from I&O that applied a process model. Lastly, mixed levels of analysis were found in 14% of all the surveyed articles. Implications of these findings for future research are discussed.  相似文献   
83.
Most active optical range sensors record, simultaneously with the range image, the amount of light reflected at each measured surface location: this information forms what is called a range intensity image, also known as a reflectance image. This paper proposes a method that uses this type of image for the correction of the color information of a textured 3D model. This color information is usually obtained from color images acquired using a digital camera. The lighting condition for the color images are usually not controlled, thus this color information may not be accurate. On the other hand, the illumination condition for the range intensity image is known since it is obtained from a controlled lighting and observation configuration, as required for the purpose of active optical range measurement. The paper describes a method for combining the two sources of information, towards the goal of compensating for a reference range intensity image is first obtained by considering factors such as sensor properties, or distance and relative surface orientation of the measured surface. The color image of the corresponding surface portion is then corrected using this reference range intensity image. A B-spline interpolation technique is applied to reduce the noise of range intensity images. Finally, a method for the estimation of the illumination color is applied to compensate for the light source color. Experiments show the effectiveness of the correction method using range intensity images.  相似文献   
84.
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle, without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the verifier. In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature. In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just simple playing cards. The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols are meant to be understood by “lay-people” and implementable without the use of computers. Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246. Research of M. Naor was supported in part by a grant from the Israel Science Foundation. Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06). Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297.  相似文献   
85.
PURPOSE: To determine whether MR angiography can be used to differentiate between the two vascular causes of bithalamic hyperintensity on T2-weighted MR images: "top of the basilar" artery occlusion and deep cerebral vein thrombosis. METHODS: A retrospective review identified six patients with bithalamic T2 hyperintensity of vascular causes. MR angiography was performed in four patients, MR angiography and conventional angiography in one patient, and conventional angiography in one patient. Data pertaining to clinical presentation and hospital course were collected. MR angiographic techniques were multislab overlapping three-dimensional time-of-flight, 2-D time-of-flight, and 2-D phase-contrast. RESULTS: Three cases of top of the basilar artery occlusion and three cases of deep cerebral vein thrombosis were recognized. In all cases, T2 hyperintensity in a vascular distribution suggested cerebral occlusive disease. Infarction involving the thalami and basal ganglia was present in two cases of deep cerebral vein thrombosis. Infarction of the thalami, mesodiencephalic region, and cerebellar hemispheres was present in two cases of basilar artery occlusion. Bithalamic infarction alone was seen in one case of deep cerebral vein thrombosis and one case of basilar artery occlusion. In the five cases in which MR angiography was used, this technique accurately distinguished the vessels involved (arterial or venous). CONCLUSION: MR angiography is a useful adjunct to MR imaging in the evaluation of bithalamic T2 hyperintensity. It does help distinguish between the two vascular causes: top of basilar artery occlusion and deep cerebral vein thrombosis.  相似文献   
86.
87.
The aim of this study was to reproduce the delayed (secondary) cerebral energy failure previously described in birth-asphyxiated newborn infants and to investigate relationships between primary insult severity and the extent of the delayed energy failure. Phosphorus (31P) magnetic resonance spectroscopy (MRS) at 7 T was used to study the brains of 12 newborn piglets during an acute, reversible, cerebral hypoxic-ischemic episode which continued until nucleotide triphosphates (NTP) were depleted. After reperfusion and reoxygenation, spectroscopy was continued for 48 h. High-energy metabolite concentrations returned to near normal levels after the insult, but later they fell as delayed energy failure developed. The time integral of NTP depletion in the primary insult correlated strongly with the minimum [phosphocreatine (PCr)]/[inorganic orthophosphate (Pi)] observed 24–48 h after the insult. (Linear regression analysis gave slope –8.04 h–1; ordinate intercept=1.23;r=0.92;P<0.0001.) This model is currently being used to investigate the therapeutic potential of various cerebroprotective strategies including hypothermia.  相似文献   
88.
The dynamics of the erbium doped fiber laser is analysed both experimentally and theoretically. This laser operates spontaneously in self-pulsing, in sinusoidal or in CW regime. Experiments have allowed to determine the control parameters : the cavity losses, the pumping rate and the ion pairs concentration. An antiphase dynamics is observed when the laser operates simultaneously at 1.55 µn and 1.536 µm. The self-pulsing behavior is attributed to a fast energy transfer which occurs between two neighboring ions (pair induced quenching). A simple model considering the active medium as a mixture of isolated ions and ions pairs is developped and leads to a good qualitative agreement with the experimental results.  相似文献   
89.
The goal of this paper is twofold : at first, to present the stochastic timed Pétri nets model by emphasizing its ability to express the main characteristics of real time distributed systems (parallelism, synchronization by message exchange, time attributes and in particular time constraints) and to allow both qualitative and quantitative analysis (concept of randomized states graph); second, to show a modeling methodology based on this model that allows a rigorous modeling of theDqdb protocol (Qa access, bwb mechanism role,Pa access influence). A new contribution to theQa mechanism has been done (1).  相似文献   
90.
Integrins exhibit reversible changes in their ability to bind ligands and these changes enable transient cell adhesion. We recently showed that leukocyte integrin CR3 (complement receptor type three, CD11b/CD18, alpha m beta 2) may be purified in a form that is either capable or incapable of binding soluble, monomeric ligand and that "inactive" CR3 may be rendered capable of binding ligand by addition of an anti-CR3 mAb known as KIM-127 (Cai and Wright, JBC. 270: 14358, 1995). Here, we demonstrate that active CR3 may be rendered inactive by treatment of immobilized receptor with EDTA. EDTA-treated CR3 failed to bind ligand even in the presence of mM Ca2+ and Mg2+, suggesting that EDTA-treatment caused a change in the receptor that is not readily reversed. EDTA-treated receptor did, however, bind ligand upon addition of KIM-127 plus Mg2+ with an affinity (17.8 +/- 4.5 nM) similar to untreated, active receptor (12.5 +/- 4.7 nM). EDTA-treated CR3 thus exhibits the properties of inactive CR3, in which the ligand binding site is cryptic but subject to exposure by KIM-127. A candidate for the cryptic ligand binding site is the I-domain, a Mg2+-binding region in the alpha chain of CR3. We found that monomeric C3bi binds directly to recombinant I-domain in a Mg(2+)-dependent fashion with an affinity of 300 +/- 113 nM. These results thus suggest that CR3 may be inactivated by removing tightly bound divalent cation from a cryptic site in CR3.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号