首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   237篇
  免费   10篇
  国内免费   2篇
电工技术   1篇
综合类   1篇
化学工业   43篇
金属工艺   3篇
机械仪表   7篇
建筑科学   6篇
能源动力   13篇
轻工业   27篇
水利工程   2篇
无线电   25篇
一般工业技术   45篇
冶金工业   7篇
原子能技术   1篇
自动化技术   68篇
  2023年   6篇
  2022年   8篇
  2021年   16篇
  2020年   7篇
  2019年   4篇
  2018年   14篇
  2017年   14篇
  2016年   8篇
  2015年   6篇
  2014年   12篇
  2013年   32篇
  2012年   19篇
  2011年   16篇
  2010年   14篇
  2009年   8篇
  2008年   14篇
  2007年   8篇
  2006年   9篇
  2005年   8篇
  2004年   3篇
  2003年   3篇
  2002年   1篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   1篇
  1994年   4篇
  1989年   1篇
  1983年   1篇
  1978年   1篇
  1977年   1篇
  1976年   4篇
排序方式: 共有249条查询结果,搜索用时 15 毫秒
131.
Topology optimization of large deformation two‐dimensional continua is presented using a combined gradient‐stochastic search with negative circular masks. The possibility of generating perfect black and white topologies is explored while attaining the efficiency of first‐order and second‐order search algorithms. The design region is modeled with honeycomb tessellation to thwart the known connectivity singularities such as the checkerboards and point flexures. Mask shrinkage is incorporated for ease in density transition between gradient and stochastic steps. Notches at continuum boundaries are moderated through multiple use of a simple boundary smoothing method. A neo‐Hookean elasticity model is employed to simulate the material nonlinearities in large displacement continua. With examples on stiff beams and large deformation compliant mechanisms, it is illustrated that perfectly binary, connected and smooth topologies can be obtained within a few hundred design evaluations.Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
132.
133.
Adulteration in food has been a concern since the beginning of civilization, as it not only decreases the quality of food products but also results in a number of ill effects on health. Authentic testing of food and adulterant detection of various food products is required for value assessment and to assure consumer protection against fraudulent activities. Through this review we intend to compile different types of adulterations made in different food items, the health risks imposed by these adulterants and detection methods available for them. Concerns about food safety and regulation have ensured the development of various techniques like physical, biochemical/immunological and molecular techniques, for adulterant detection in food. Molecular methods are more preferable when it comes to detection of biological adulterants in food, although physical and biochemical techniques are preferable for detection of other adulterants in food.  相似文献   
134.
Intelligent agents meet the semantic Web in smart spaces   总被引:4,自引:0,他引:4  
A new smart meeting room system called EasyMeeting explores the use of multi-agent systems, Semantic Web ontologies, reasoning, and declarative policies for security and privacy. Building on an earlier pervasive computing system, EasyMeeting provides relevant services and information to meeting participants based on their situational needs. The system also exploits the context-aware support provided by the Context Broker Architecture (Cobra). Cobra's intelligent broker agent maintains a shared context model for all computing entities in the space and enforces user-defined privacy policies.  相似文献   
135.
136.
Dipanjan  Anupam  Yelena 《Ad hoc Networks》2006,4(2):204-224
In this paper, we propose GSR: a new routing and session management protocol for ad-hoc networks as an integral part of a service discovery infrastructure. Traditional approaches place routing at a layer below service discovery. While this distinction is appropriate for wired networked services, we argue that in ad-hoc networks this layering is not as meaningful and show that integrating routing with discovery infrastructure increases system efficiency. Central to our protocol is the idea of reusing the path created by the combination of a service discovery request and a service advertisement for data transmission. This precludes the need to use separate routing and discovery protocols. GSR also combines transport layer features and provides end-to-end session management that detects disconnections, link and node failures and enables service-centric session redirection to handle failures. This enables GSR to accommodate service-centric routing apart from the traditional node-centric routing. We compare GSR with AODV in terms of packet delivery ratio, response time and average number of hops traveled by service requests as well as data. GSR achieves better packet delivery ratio with a minor increase of the average packet delivery delay.  相似文献   
137.
In biped robot dynamics, the foot is generally considered rigid. However, in practical cases, there will be a layer of rubber on the sole to act as a shock absorber. Such electrodynamic contact has been studied in the case of industrial robots, but the experience with biped robots is rare. The goal of this paper is to device a trajectory generation method using a genetic algorithm (GA) for an 8 DOF robot that can walk on flat terrain and climb stairs with deformation at the sole. The proposed method uses splines to model each joint angle and needs a single GA layer, which makes it faster and simpler than earlier models. The method incorporates the dynamics of an actual 8 DOF robot to find the most energy optimal gait. A simple control method is proposed that corrects the computed angle required to follow ZMP incorporating the deformation of the sole. Using the control method the computed angle is first corrected and then the trajectory optimized. Energy consumed in three cases were compared: walk on flat ground with no sole deformation, walk with uncorrected deformed soft sole and walk with deformed soft sole with correction of deformation. It is found that the least energy was consumed in the case of soft sole with correction for deformation. This proves the need for deformation correction of soft sole and the usefulness of our proposed method.  相似文献   
138.
Lu S  Madhukar A 《Nano letters》2007,7(11):3443-3451
Evidence is provided for nonradiative resonant energy transfer (NRET) from excitons in nanocrystal quantum dots (NCQDs) to the confined states of an adjacent quantum well (QW) at low excitation power and rate competitive with the quantum dot radiative decay. This indicates that NRET in optimized NCQD-QW/nanowire systems may provide a solar energy conversion approach with a viable tradeoff with the bottlenecks of charge carrier generation and/or transport to/in electrodes faced by excitonic solar cells.  相似文献   
139.
Singh  Hema  Kumar  Anupam  Thakur  Ankush  Kumar  Pusphender  Nguyen  Van-Huy  Vo  Dai-Viet N.  Sharma  Ajit  Kumar  Deepak 《Topics in Catalysis》2020,63(11-14):1097-1108
Topics in Catalysis - Tri-octyl-amine is known for its potential to assist fabrication of metal and metal oxides nanoparticles. In this work elucidate the synthesis of magnetite-ZnO magnetic nano...  相似文献   
140.
Language usage over computer mediated discourses, such as chats, emails and SMS texts, significantly differs from the standard form of the language and is referred to as texting language (TL). The presence of intentional misspellings significantly decrease the accuracy of existing spell checking techniques for TL words. In this work, we formally investigate the nature and type of compressions used in SMS texts, and develop a Hidden Markov Model based word-model for TL. The model parameters have been estimated through standard machine learning techniques from a word-aligned SMS and standard English parallel corpus. The accuracy of the model in correcting TL words is 57.7%, which is almost a threefold improvement over the performance of Aspell. The use of simple bigram language model results in a 35% reduction of the relative word level error rates.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号