首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   650篇
  免费   37篇
电工技术   5篇
综合类   2篇
化学工业   187篇
金属工艺   18篇
机械仪表   9篇
建筑科学   49篇
矿业工程   2篇
能源动力   17篇
轻工业   38篇
水利工程   2篇
无线电   52篇
一般工业技术   131篇
冶金工业   33篇
原子能技术   6篇
自动化技术   136篇
  2023年   15篇
  2022年   18篇
  2021年   20篇
  2020年   12篇
  2019年   11篇
  2018年   12篇
  2017年   16篇
  2016年   28篇
  2015年   15篇
  2014年   32篇
  2013年   32篇
  2012年   32篇
  2011年   42篇
  2010年   45篇
  2009年   43篇
  2008年   38篇
  2007年   43篇
  2006年   14篇
  2005年   25篇
  2004年   24篇
  2003年   14篇
  2002年   6篇
  2001年   9篇
  2000年   13篇
  1999年   12篇
  1998年   6篇
  1997年   10篇
  1996年   10篇
  1995年   2篇
  1994年   7篇
  1993年   6篇
  1992年   9篇
  1991年   6篇
  1990年   2篇
  1989年   3篇
  1988年   6篇
  1987年   4篇
  1986年   8篇
  1985年   2篇
  1983年   4篇
  1982年   4篇
  1981年   5篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1974年   2篇
  1966年   3篇
  1964年   1篇
排序方式: 共有687条查询结果,搜索用时 0 毫秒
101.
102.
103.
Rapid growth of computer network sizes and uses necessitate analysis of network application middleware in terms of its scalability as well as performance. In this paper we analyze a distributed network management middleware based on agents that can be dispatched to locations where they can execute close to the managed nodes. The described middleware operates between the network protocol layer and the application layer and uses standard TCP protocol and SNMP probes to interface the network. By aggregating requests from many users into a single agent, our system allows multiple managers to probe problem areas with minimal management traffic overhead. We discuss and quantify the benefits of the described middleware by implementing real‐time network managers using our system. The main result of this paper is a comparison of scalability and efficiency of our agent‐based management middleware and traditional SNMP‐based data collection. To this end, we measured traffic in both real and simulated networks. In the latter case, we designed, used and described here a method of separating simulated application flow into separate subflows to simplify design of simulations. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
104.
Local electric defects may result in considerable performance losses in solar cells. Infrared (IR) thermography is one important tool to detect these defects on photovoltaic modules. Qualitative interpretation of IR images has been carried out successfully, but quantitative interpretation has been hampered by the lack of “calibration” defects. The aims of this study are to (i) establish methods to induce well‐defined electric defects in thin‐film solar cells serving as “calibration” defects and to (ii) assess the accuracy of IR imaging methods by using these artificially induced defects. This approach paves the way for improving quality control methods based on imaging in photovoltaic. We created ohmic defects (“shunts”) by using a focused ion beam and weak diodes (“interface shunts”) by applying a femto‐second laser at rather low power on copper indium gallium selenide cells. The defects can be induced precisely and reproducibly, and the severity of the defects on the electrical performance can be well adjusted by focused ion beam/laser parameters. The successive assessment of the IR measurement (ILIT‐Voc) revealed that this method can predict the losses in Pmpp (maximal power extractable) with a mean error of below 10%. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
105.
Randomized search heuristics like local search, tabu search, simulated annealing, or all kinds of evolutionary algorithms have many applications. However, for most problems the best worst-case expected run times are achieved by more problem-specific algorithms. This raises the question about the limits of general randomized search heuristics. Here a framework called black-box optimization is developed. The essential issue is that the problem but not the problem instance is knownto the algorithm which can collect information about the instance only by asking for the value of points in the search space. All known randomized search heuristics fit into this scenario. Lower bounds on the black-box complexity of problems are derived without complexity theoretical assumptions and are compared with upper bounds in this scenario.  相似文献   
106.
107.
The Snowden affair gave rise to a huge public debate about not only the legitimacy of the secret surveillance programs he revealed but also about Snowden himself and about the accuracy of the information he leaked. In this paper we present an analysis of how the affair was discussed in the English language blogosphere, based on a corpus of 15,000 blog posts written about Snowden and published from June 2013 to June 2014, as a sub-corpus of a larger corpus of 100,000 blog posts on the topic of surveillance, written during the period 2006–2014. Automated tools are used to identify the topics that characterize the blogging about surveillance and the posts about the Snowden affair. Through an in-depth analysis of the blog posts that commented on Snowden’s revelations of the PRISM program for surveillance of social media users, we chart how bloggers responded to Snowden and his role in this disclosure, whether they found the information credible, and the extent to which they expressed criticism of the surveillance practices. The analysis is used as a basis for discussing the role of blogs in the civic engagement during the first phase of the Snowden affair.  相似文献   
108.
We investigate the effects of precision on the efficiency of various local search algorithms on 1-D unimodal functions. We present a (1+1)-EA with adaptive step size which finds the optimum in O(log n) steps, where n is the number of points used. We then consider binary (base-2) and reflected Gray code representations with single bit mutations. The standard binary method does not guarantee locating the optimum, whereas using the reflected Gray code does so in Θ((log n)2) steps. A(1+1)-EA with a fixed mutation probability distribution is then presented which also runs in O((log n)2). Moreover, a recent result shows that this is optimal (up to some constant scaling factor), in that there exist unimodal functions for which a lower bound of Ω((log n)2) holds regardless of the choice of mutation distribution. For continuous multimodal functions, the algorithm also locates the global optimum in O((log n)2). Finally, we show that it is not possible for a black box algorithm to efficiently optimise unimodal functions for two or more dimensions (in terms of the precision used).  相似文献   
109.
表面淬火钢的硬化程度对变速器零件的加工和应用起到决定性的作用.硬化程度主要取决于材料的化学成分,是选择表面淬火钢淬火温度的主要标准,因为稳定的材料质量是高效率大规模生产的保证.顶端淬火样品的变形和热处理条件对测量结果具有决定性的影响.由于明显的不确定性,必须考虑到顶端淬火试验测定的硬化程度和材料化学成分之间的不同.在狭窄的硬化程度范围内对表面淬火钢的热处理确保了可预测和可再现的大规模生产.一些实例表明,由于稍稍偏离所需的硬化程度范围造成不规则的热处理变形,并因成本问题而被放弃.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号