首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1937篇
  免费   75篇
  国内免费   11篇
电工技术   27篇
综合类   1篇
化学工业   405篇
金属工艺   37篇
机械仪表   51篇
建筑科学   42篇
矿业工程   2篇
能源动力   128篇
轻工业   186篇
水利工程   22篇
石油天然气   9篇
无线电   222篇
一般工业技术   452篇
冶金工业   157篇
原子能技术   27篇
自动化技术   255篇
  2024年   10篇
  2023年   28篇
  2022年   43篇
  2021年   79篇
  2020年   51篇
  2019年   51篇
  2018年   79篇
  2017年   64篇
  2016年   76篇
  2015年   51篇
  2014年   62篇
  2013年   148篇
  2012年   86篇
  2011年   96篇
  2010年   82篇
  2009年   101篇
  2008年   97篇
  2007年   80篇
  2006年   49篇
  2005年   32篇
  2004年   20篇
  2003年   31篇
  2002年   32篇
  2001年   24篇
  2000年   24篇
  1999年   22篇
  1998年   27篇
  1997年   34篇
  1996年   30篇
  1995年   17篇
  1994年   19篇
  1993年   24篇
  1992年   18篇
  1991年   18篇
  1989年   15篇
  1988年   22篇
  1987年   15篇
  1986年   20篇
  1985年   24篇
  1984年   24篇
  1983年   28篇
  1982年   18篇
  1981年   25篇
  1980年   21篇
  1979年   11篇
  1978年   17篇
  1977年   11篇
  1976年   22篇
  1975年   13篇
  1974年   10篇
排序方式: 共有2023条查询结果,搜索用时 15 毫秒
151.
The paper addresses the adaptive behaviour of parallel fuzzy proportional plus fuzzy integral plus fuzzy derivative (FP+FI+FD) controller. The parallel FP+FI+FD controller is actually a non-linear adaptive controller whose gain changes continuously with output of the process under control. Two non-stationary processes, whose characteristics change with time, are considered for simulation study. Simulation is performed using software LabVIEW TM . The set-point tracking response of parallel FP+FI+FD is compared with conventional parallel proportional plus integral plus derivative (PID) controller, tuned with the Ziegler-Nichols (Z-N) tuning technique. Simulation results show that conventional PID controller fails to track the set-point and becomes unstable as the process changes its characteristic with time. But the parallel FP+FI+FD controller shows considerably much better set-point tracking response and does not deviate from steady state. Also, a huge spike is observed in the output of PID controller as the reference set-point and process parameters are changed, while the FP+FI+FD controller gives spike free control signal.  相似文献   
152.
Synthy: A system for end to end composition of web services   总被引:2,自引:0,他引:2  
The demand for quickly delivering new applications is increasingly becoming a business imperative today. However, application development is often done in an ad hoc manner resulting in poor reuse of software assets and longer time-to-delivery. Web services have received much interest due to their potential in facilitating seamless business-to-business or enterprise application integration. A web service composition system can help automate the process, from specifying business process functionalities, to developing executable workflows that capture non-functional (e.g. Quality of Service (QoS)) requirements, to deploying them on a runtime infrastructure. Intuitively, web services can be viewed as software components and the process of web service composition similar to software synthesis. In addition, service composition needs to address the build-time and runtime issues of the integrated application, thereby making it a more challenging and practical problem than software synthesis. However, current solutions based on business web services (using WSDL, BPEL, SOAP, etc.) or semantic web services (using ontologies, goal-directed reasoning, etc.) are both piecemeal and insufficient. We formulate the web service composition problem and describe the first integrated system for composing web services end to end, i.e., from specification to deployment. The proposed solution is based on a novel two-staged composition approach that addresses the information modeling aspects of web services, provides support for contextual information while composing services, employs efficient decoupling of functional and non-functional requirements, and leads to improved scalability and failure handling. We also present Synthy, a prototype of the service composition system, and demonstrate its effectiveness with the help of an application scenario from the telecom domain.  相似文献   
153.
Results of scanning electron microscopy (SEM) and energy dispersive X-ray analytical (EDAX) investigations, conducted on some elevated structures displayed by flux grown rare earth orthochromite, RCrO3 (R = La, Yb) crystals, are presented. The peculiar structures exhibited by crystal surfaces indicate imperfections and impurity phases. EDAX of elevated structures reveals the various phases to be composed of lead associated materials which may probably be either Pb2CrO5 or Pb2OF2 (flux). Other secondary crystallization of impurity phases, ROF (R = La, Yb) is illustrated in the case of RCrO3 (R = La, Yb) crystals. The elevated structures illustrate their non-stoichiometric behaviour. Precipitation of impurity phases and formation of imperfections during the growth of RCrO3 (R = La, Yb) crystals and their effect on the crystalline quality is discussed.  相似文献   
154.
In the present article, a compact triple‐band multistubs loaded resonator printed monopole antenna is proposed. The antenna consists of a quarter wavelength two asymmetrical inverted L‐shaped stubs to excite two resonant modes for 3.5/5.5 GHz bands and one integrated horizontally T‐shaped stub with inverted long L‐shaped stub to excite resonant mode for 2.5 GHz band. By loading these stub resonators along y‐axis with distinct gaps, the antenna resonates at three frequencies 2.57/3.52/5.51 GHz covering the desired bands while keeping compact size of 24 × 30 mm2 (0.2 × 0.25 ). The proposed antenna is fabricated on Rogers RT/duroid 5880 substrate with thickness 0.79 mm and its performance experimentally verified. The measured results reveal that the antenna has the impedance bandwidths of about 210 MHz (2.50‐2.71 GHz), 260 MHz (3.37‐3.63 GHz), and 650 MHz (5.20‐5.85 GHz), for 2.5/3.5/5.5 GHz WiMAX and 5.2/5.8 GHz WLAN band systems. The antenna provides omnidirectional radiation patterns and flat antenna gains over the three operating bands. In addition, the design approach and effects of multistubs resonator lengths on the operating bands are also examined and discussed in detail.  相似文献   
155.
The availability of cheap network based video cameras and the prevalence of wireless networks has lead to a major thrust towards deployment of large scale Distributed Video Surveillance (DVS) systems. This has opened up an important area of research to deal with the issues involved in DVS system for efficient collection and transmission of large scale video streams from the cameras at the guarded sites, to the end users in possibly constrained network conditions. In this paper, we propose a framework based on content-based video classification and scalable compression scheme to provide a robust bandwidth efficient video transmission for DVS. The scheme builds on a Discrete Wavelet Transform (DWT) based Color-Set Partitioning for Hierarchical Trees (CSPIHT) coding to obtain a scalable bitstream. Wavelet domain segmentation and compression assists in development of a DVS architecture. The architecture includes a novel module for dynamic allocation of Network bandwidth based on the current available resources and constraints. Different frame constituents are optimally coded based on their relative significance, perceptual quality, and available estimate of network bandwidth. Experimental result over different video sequences and simulations for Network conditions demonstrate the efficient performance of the approach.  相似文献   
156.
A cognitive radio node is a radio device capable of operating over multiple channels. As a result, a network consisting of one or more cognitive radio nodes can adapt to varying channel availability in its geographical region by dynamically changing the channel (or channels) nodes are using for communication.  相似文献   
157.
Determining order relationship between events of a distributed computation is a fundamental problem in distributed systems which has applications in many areas including debugging, visualization, checkpointing and recovery. Fidge/Mattern’s vector-clock mechanism captures the order relationship using a vector of size N in a system consisting of N processes. As a result, it incurs message and space overhead of N integers. Many distributed applications use synchronous messages for communication. It is therefore natural to ask whether it is possible to reduce the timestamping overhead for such applications. In this paper, we present a new approach for timestamping messages and events of a synchronously ordered computation, that is, when processes communicate using synchronous messages. Our approach depends on decomposing edges in the communication topology into mutually disjoint edge groups such that each edge group either forms a star or a triangle. We show that, to accurately capture the order relationship between synchronous messages, it is sufficient to use one component per edge group in the vector instead of one component per process. Timestamps for events are only slightly bigger than timestamps for messages. Many common communication topologies such as ring, grid and hypercube can be decomposed into edge groups, resulting in almost 50% improvement in both space and communication overheads. We prove that the problem of computing an optimal edge decomposition of a communication topology is NP-complete in general. We also present a heuristic algorithm for computing an edge decomposition whose size is within a factor of two of the optimal. We prove that, in the worst case, it is not possible to timestamp messages of a synchronously ordered computation using a vector containing fewer than components when N ≥ 2. Finally, we show that messages in a synchronously ordered computation can always be timestamped in an offline manner using a vector of size at most . An earlier version of this paper appeared in 2002 Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). The author V. K. Garg was supported in part by the NSF Grants ECS-9907213, CCR-9988225, an Engineering Foundation Fellowship. This work was done while the author C. Skawratananond was a Ph.D. student at the University of Texas at Austin.  相似文献   
158.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
159.
A finite element creep analysis of a center crack specimen has been carried out under small scale to extensive creep conditions. The crack was assumed to be stationary. Several constitutive models were used; these consisted of elastic, power-law creep with and without rate-independent plasticity, as well as one which also included primary creep. The mechanics basis of the C t parameter, which has been proposed for correlating creep crack growth behavior under conditions ranging from small scale to extensive creep, is explored.For the aforementioned specimen geometry, consideration of primary creep seems to explain the differences between the measured and previously calculated load line deflection rates based on power-law creep only. It is also concluded that in small scale creep, C t does not characterize the instantaneous crack tip singular stress field, but it accurately characterizes the rate of expansion of the crack tip creep zone regardless of whether primary or secondary creep is occurring. This result provides a rationale for using C t to correlate creep crack growth rates even in the presence of significant primary creep deformation.
Résumé On a procédé à une analyse par éléments finis du fluage d'une éprouvette comportant une fissure centrale, sous des conditions allant du fluage à petite échelle jusqu'à un fluage important. On suppose que la fissue est stationaire. Divers modèles ont été utilisés, à savoir la loi de fluage élastique ou parabolique, avec ou sans plasticité indépendante de la vitesse, ainsi qu'une loi incluant également le fluage primaire. On a étudié la base mécanistique du paramètre C t, proposé pour relier le comportement de la croissance de la fissure de fluage sous des conditions entraînant un fluage depuis une petite échelle jusqu'à une grande échelle.Pour la géométrie citée, les différences entre les vitesses de variation de la courbe de la charge, mesurées et précédemment calculées en se basant sur la seule loi parabolique de fluage, semblent applicables par la prise en considération du fluage primaire. On conclut également que lors de fluage à petite échelle, C t ne caractérise pas le champ singulier de contraintes instantanées à l'extrémité de la fissure, mais plutôt, et de maniére sûre, la vitesse d'extension de la zone de fluage à l'extrémité de la fissure, qu'il y ait fluage primaire ou fluage secondaire. Ce tésultat fournit une base d'utilisation de C t pour connaître les vitesses de croissance d'une fissure de fluage, même en présence d'une déformation de fluage primaire significative.
  相似文献   
160.
With the world growing more complex, computers must help not only by doing ordinary computing but also by doing computing that exhibits intelligence. Efforts in the application of Artificial Intelligence (AI) to intelligent problem solving led to the development of expert systems. An expert system is a useful tool for solving ill defined problems that require a great deal of specialized knowledge that experts in a particular field acquire from long experiences with such tasks. The expert knowledge is contained in what is aptly called a knowledge base.

Offshore structural design is significantly influenced by expert human knowledge. Much of the knowledge is heuristic and attained through experience over the years. The objective of this paper is to highlight the possible use of expert systems in the area of offshore structures. A brief overview of knowledge systems followed by an application example is presented.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号