全文获取类型
收费全文 | 162篇 |
免费 | 1篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 11篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 4篇 |
能源动力 | 1篇 |
轻工业 | 4篇 |
水利工程 | 2篇 |
无线电 | 33篇 |
一般工业技术 | 31篇 |
冶金工业 | 19篇 |
自动化技术 | 57篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2020年 | 7篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 5篇 |
2014年 | 3篇 |
2013年 | 7篇 |
2012年 | 12篇 |
2011年 | 11篇 |
2010年 | 11篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2007年 | 15篇 |
2006年 | 5篇 |
2005年 | 1篇 |
2004年 | 9篇 |
2003年 | 2篇 |
2002年 | 4篇 |
2001年 | 5篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1970年 | 1篇 |
排序方式: 共有166条查询结果,搜索用时 15 毫秒
151.
Boaz Keren-Zur 《Computer Physics Communications》2011,182(2):477-484
SOFTSUSY is a software designed to solve the RG equations of the MSSM and compute its low energy spectrum. HidSecSOFTSUSY is an extension of the SOFTSUSY package which modifies the beta functions to include contributions from light dynamic fields in the hidden sector.
Program summary
Program title: HidSecSOFTSUSYCatalogue identifier: AEHP_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEHP_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 4167No. of bytes in distributed program, including test data, etc.: 141 411Distribution format: tar.gzProgramming language: C++, FortranComputer: Personal computerOperating system: Tested on GNU/LinuxWord size: 32 bitsClassification: 11.6External routines: Requires an installed version of SOFTSUSY (http://projects.hepforge.org/softsusy/)Nature of problem: Calculating supersymmetric particle spectrum and mixing parameters while incorporating dynamic modes from the hidden sector into the renormalization group equations. The solution to the equations must be consistent with a high-scale boundary condition on supersymmetry breaking parameters, as well as a weak-scale boundary condition on gauge couplings, Yukawa couplings and the Higgs potential parameters.Solution method: Nested iterative algorithm.Running time: A few seconds per parameter point. 相似文献152.
153.
For many years, systems, developed to be integrated into a layered defense array, were planned through the “Stand Alone” paradigm, assuming that the layers of defense are independent. Almost all published literature dealing with Layered Defense automatically assumes that the layers of defense are independent of each other. The fact is they are not! Defense layers may influence one another in positive and/or negative ways. We attempt to initiate a new look at developing and deploying systems in an integrated array of defense systems, based on the understanding that influences between systems must be taken into account. A methodology for modeling the dependencies between defense systems engagements, of a single attacker, or of a salvo of attackers, is developed in this paper through an “Influence Decay Function” model. A tractable algorithm is developed to compute the complex effectiveness objective functions. The Non Independent Layered Defense Problem (NILDP) is formulated as a Mixed Integer Non Linear Programming problem. The optimization problem for maximum layered defense effectiveness is solved through powerful heuristic methods. The discussion deals with engineering defense systems to operate within complex environments which include not only threat from an opponent but also friendly systems to which integration is not at all trivial. © 2009 Wiley Periodicals, Inc. Syst Eng 相似文献
154.
The study aims were to assess the independent contribution of motor ability to the incidence of school injuries. The study included 2057 pupils in grades 3-6 of primary schools in a city in the north of Israel. A surveillance system gathered information about injuries that occurred on school premises or during school related activities and required medical treatment or caused limitation of usual activities. Children provided information on sensation seeking, self-appraisal of health, academic performance, physical activity, and dominant hand; anthropometric measurements and motor ability tests were performed.The incidence of injury events was 4% (95% CI=3.2-5.0). Injuries increased with increased balance and agility, but there were no differences according to reaction time. No other study variables were associated with the incidence of injuries. Our findings of an increase in the incidence of injuries with better motor ability may express differences in exposure to risk situations between children with better and poorer motor abilities. 相似文献
155.
Boaz Ronen Ph.D. 《Computers & Industrial Engineering》1987,13(1-4):71-72
Inventory management is being discussed recently as one of the key elements for survival and success in the production industry today. Little efforts were made to solve inventory problems in the Hi R&D environment.
In this paper, a prototype of a Microcomputer Based Decision Support is introduced to support decisions for managing Hi R&D inventories. The decisions involve timing and scheduling of purchased components, as well as classification of those items. 相似文献
156.
157.
158.
In broadcast disks systems, information is broadcasted in a shared medium. When a client needs an item from the disk, it waits until that item is broadcasted. Broadcast disks systems are particularly attractive in settings where the potential customers have a highly-asymmetric communication capabilities, i.e., receiving is significantly cheaper than transmitting. This is the case with satellite networks, mobile hosts in wireless networks, and Teletext system.The fundamental algorithmic problem for such systems is to determine the broadcast schedule based on the demand probability of items, and the cost incurred to the system by clients waiting. The goal is to minimize the mean access cost of a random client. Typically, it was assumed that the access cost is proportional to the waiting time. In this paper, we ask what are the best broadcast schedules for access costs which are arbitrary polynomials in the waiting time. These may serve as reasonable representations of reality in many cases, where the patience of a client is not necessarily proportional to its waiting time.We present an asymptotically optimal algorithm for a fractional model, where the bandwidth may be divided to allow for fractional concurrent broadcasting. This algorithm, besides being justified in its own right, also serves as a lower bound against which we test known discrete algorithms. We show that the Greedy algorithm has the best performance in most cases. Then we show that the performance of other algorithms deteriorate exponentially with the degree of the cost polynomial and approaches the fractional solution for sub-linear cost. Finally, we study the quality of approximating the greedy schedule by a finite schedule. 相似文献
159.
R. W. Gibbs (see record 1992-42479-001) argued that metaphoric expressions may reflect preexisting conventional metaphoric mappings in long-term memory. The class-inclusion model, in contrast, focuses on conceptual structures that are constructed and accessible in working memory during metaphor comprehension. The authors agree that prestored metaphoric mappings may be available, but they may not be accessible and hence not used in any given context. The authors point out problems in identifying those metaphorical mappings that may be relevant to a given metaphoric expression and suggest that conceptual metaphors may not be identifiable until after a metaphor has been interpreted. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
160.