首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1275篇
  免费   38篇
  国内免费   5篇
电工技术   90篇
综合类   3篇
化学工业   374篇
金属工艺   23篇
机械仪表   21篇
建筑科学   22篇
矿业工程   1篇
能源动力   87篇
轻工业   86篇
水利工程   1篇
石油天然气   1篇
无线电   113篇
一般工业技术   215篇
冶金工业   156篇
原子能技术   31篇
自动化技术   94篇
  2023年   8篇
  2022年   19篇
  2021年   31篇
  2020年   10篇
  2019年   15篇
  2018年   18篇
  2017年   20篇
  2016年   23篇
  2015年   27篇
  2014年   25篇
  2013年   58篇
  2012年   40篇
  2011年   56篇
  2010年   45篇
  2009年   59篇
  2008年   52篇
  2007年   63篇
  2006年   61篇
  2005年   41篇
  2004年   38篇
  2003年   34篇
  2002年   28篇
  2001年   26篇
  2000年   31篇
  1999年   38篇
  1998年   52篇
  1997年   43篇
  1996年   34篇
  1995年   22篇
  1994年   33篇
  1993年   26篇
  1992年   20篇
  1991年   17篇
  1990年   13篇
  1989年   15篇
  1988年   12篇
  1987年   11篇
  1986年   10篇
  1985年   11篇
  1984年   15篇
  1983年   11篇
  1982年   9篇
  1981年   10篇
  1980年   11篇
  1979年   12篇
  1978年   11篇
  1977年   9篇
  1976年   15篇
  1975年   5篇
  1973年   10篇
排序方式: 共有1318条查询结果,搜索用时 15 毫秒
101.
Digital but physical surrogates are tangible representations of remote people (typically members of small intimate teams), positioned within an office and under digital control. Surrogates selectively collect and present awareness information about the people they represent. They also react to people's explicit and implicit physical actions: a person's explicit acts include grasping and moving them, while their implicit acts include how they move towards or away from the surrogate. By responding appropriately to these physical actions of people, surrogates can control the communication capabilities of a media space in a natural way. Surrogates also balance awareness and privacy by limiting and abstracting how activities are portrayed, and by offering different levels of salience to its users. The combination of all these attributes means that surrogates can make it easy for intimate collaborators to move smoothly from awareness of each other to casual interaction while mitigating privacy and distraction concerns.Exploring different surrogate designs and how they work together can be straightforward if a good infrastructure is in place. We use anawareness server based on a distributed model-view-controller architecture, which automatically captures, stores and distributes events. We also package surrogates as physical widgets orphidgets with a well-defined interface; this makes it easy for a programmer to plug a surrogate into the awareness server as a controller (to generate awareness events), or view (to display events that others have produced), or both. Because surrogate design, implementation and use is still a new discipline, we also present several issues and next steps.  相似文献   
102.
We consider the average consensus problem for the multi-agent system in the discrete-time domain. Three triggering based control protocols are developed, which dictate the broadcast and control update instants of individual agents to alleviate communication and computational burden. Lyapunov-based design methods prescribe when agents should communicate and update their control so that the network converges to the average of agents' initial states. We start with a static version of the distributed event-triggering law and then generalize it so that it involves an internal auxiliary variable to regulate the threshold dynamically for each agent. The third protocol uses a self-triggering algorithm to avoid continuous listening wherein each agent estimates its next triggering time and broadcasts it to its neighbors at the current triggering time. Numerical simulations are shown to validate the efficacy of the proposed algorithms.  相似文献   
103.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
104.
We present a new memory access optimization for Java to perform aggressive code motion for speculatively optimizing memory accesses by applying partial redundancy elimination (PRE) techniques. First, to reduce as many barriers as possible and to enhance code motion, we perform alias analysis to identify all the regions in which each object reference is not aliased. Secondly, we find all the possible barriers. Finally, we perform code motions in three steps. For the first step, we apply a non‐speculative PRE algorithm to move load instructions and their following instructions in the backwards direction of the control flow graph. For the second step, we apply a speculative PRE algorithm to move some of them aggressively before the conditional branches. For the third step, we apply our modified version of a non‐speculative PRE algorithm to move store instructions in the forward direction of the control flow graph and to even move some of them after the merge points. We implemented our new algorithm in our production‐level Java just‐in‐time compiler. Our experimental results show that our speculative algorithm improves the average (maximum) performance by 13.1% (90.7%) for jBYTEmark and 1.4% (4.4%) for SPECjvm98 over the fastest algorithm previously described, while it increases the average (maximum) compilation time by 0.9% (2.9%) for both benchmark suites. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
105.
Many sorting algorithms have been studied in the past, but there are only a few algorithms that can effectively exploit both single‐instruction multiple‐data (SIMD) instructions and thread‐level parallelism. In this paper, we propose a new high‐performance sorting algorithm, called aligned‐access sort (AA‐sort), that exploits both the SIMD instructions and thread‐level parallelism available on today's multicore processors. Our algorithm consists of two phases, an in‐core sorting phase and an out‐of‐core merging phase. The in‐core sorting phase uses our new sorting algorithm that extends combsort to exploit SIMD instructions. The out‐of‐core algorithm is based on mergesort with our novel vectorized merging algorithm. Both phases can take advantage of SIMD instructions. The key to high performance is eliminating unaligned memory accesses that would reduce the effectiveness of SIMD instructions in both phases. We implemented and evaluated the AA‐sort on PowerPC 970MP and Cell Broadband Engine platforms. In summary, a sequential version of the AA‐sort using SIMD instructions outperformed IBM's optimized sequential sorting library by 1.8 times and bitonic mergesort using SIMD instructions by 3.3 times on PowerPC 970MP when sorting 32 million random 32‐bit integers. Also, a parallel version of AA‐sort demonstrated better scalability with increasing numbers of cores than a parallel version of bitonic mergesort on both platforms. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
106.
In this paper, return link systems for wireless mobile camera using 42 GHz-band in multipath fading environments are proposed. The return link systems for wireless mobile camera require wireless transmission with high reliability as same as the conventional wired camera systems. The proposed return link systems achieve transmission with high reliability by taking into consideration frequency and space diversity techniques. The proposed systems can be classified as 3 three types of return link systems according to diversity techniques: FD (frequency diversity) systems, SD (space diversity) systems and FD+SD system (frequency and space diversity). Computer simulations are carried out in order to confirm the effectiveness of the proposed return link systems. It is confirmed that the proposed three types of return link systems have an advantage about BER performances and effectively exploit frequency and space resources.  相似文献   
107.
Grain-growth inhibition in an Fe-10 mass pct Ni alloy, which was continuously cooled from a melt, was studied at 1673 K in the presence of primary deoxidation products of ZrO2 or MgO particles. The mean grain size and grain-size distribution in a cross section were measured as a function of holding time for up to 240 minutes. The grain growth was strongly inhibited by the inclusion particles and was influenced by the dissolved Zr. In the Zr deoxidation, the number of particles per unit area (N A) ranged from 80 to 650 mm−2, the ZrO2 particle size ( ) varied from 1.1 to 1.6 μm, and the dissolved Zr level was below 1800 mass ppm. In the Mg deoxidation, the particle-number density was 90 to 270 mm−2, the MgO particle size was 1.1 to 1.7 μm, and the dissolved Mg level was below 20 mass ppm. In a logarithmic plot of the ratio of limiting mean grain diameter ( ) to the mean particle diameter ( ) against the volume fraction of particles (f V), both the value for a given f V value, which ranged from 0.014 to 0.074 pct, and the slope were significantly lower than that predicted from the two-dimensional relation =(4/π) · f V /−1 , i.e., Zener’s limit. This discrepancy is discussed in light of the fraction of particles at the grain boundaries measured experimentally. Normal grain growth was confirmed from the grain-size distribution observed as a function of holding time, which was best described by the log-normal distribution.  相似文献   
108.
This paper describes three-dimensional microstructures fabricated using a simple self-assembly process involving the thermal shrinkage of polyimide. The proposed method enables hinged structures to be automatically rotated out of the wafer plane and to remain bent without the need to use any interlocking mechanisms. The hinged structures were fabricated using surface micromachining techniques involving heating in a furnace. An increase in the bending angle due to the shrinkage of polyimide was observed with increasing heating temperature, heating time, and length of the polyimide hinge. Of these three parameters, the heating time was found to be the most suitable for precise control of the bending angle. Furthermore, microcubes were fabricated by this method and the self-assembly process was successfully visualized using a CCD camera.  相似文献   
109.
International Journal of Information Security - Card-based cryptography is an attractive and unconventional computation model; it provides secure computing methods using a deck of physical cards....  相似文献   
110.
Reaction control of TiB2 formation from titanium metal and amorphous boron   总被引:1,自引:0,他引:1  
TiB2 powder was synthesized by a controlled formation reaction from titanium metal and amorphous boron. Precursory TiB2 formed by the pretreatment of the mixed powder (mole ratio: B/Ti=2.0) at 600° C for 60 min in an argon stream. Hollow TiB2 powder with an average grain size of 15m was obtained by subsequent heat treatment above 900° C for more than 60 min in an argon stream. The formation reaction of TiB2 powder was further controlled by pretreatment of the mixed powder at 600° C for 60 min in a hydrogen and argon stream and subsequent heat treatment at 1000° C for 360 min in an argon stream, when hollow-free TiB2 powder was formed by a milder formation reaction between amorphous boron and the reformed titanium metal with hydrogen diffused lattice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号