首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   162篇
  免费   1篇
  国内免费   3篇
电工技术   1篇
化学工业   11篇
金属工艺   2篇
机械仪表   1篇
建筑科学   4篇
能源动力   1篇
轻工业   4篇
水利工程   2篇
无线电   33篇
一般工业技术   31篇
冶金工业   19篇
自动化技术   57篇
  2023年   1篇
  2022年   3篇
  2020年   7篇
  2019年   2篇
  2018年   2篇
  2017年   4篇
  2016年   5篇
  2015年   5篇
  2014年   3篇
  2013年   7篇
  2012年   12篇
  2011年   11篇
  2010年   11篇
  2009年   7篇
  2008年   10篇
  2007年   15篇
  2006年   5篇
  2005年   1篇
  2004年   9篇
  2003年   2篇
  2002年   4篇
  2001年   5篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1992年   3篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1987年   3篇
  1986年   1篇
  1985年   2篇
  1983年   1篇
  1982年   1篇
  1974年   1篇
  1973年   2篇
  1970年   1篇
排序方式: 共有166条查询结果,搜索用时 15 毫秒
151.
SOFTSUSY is a software designed to solve the RG equations of the MSSM and compute its low energy spectrum. HidSecSOFTSUSY is an extension of the SOFTSUSY package which modifies the beta functions to include contributions from light dynamic fields in the hidden sector.

Program summary

Program title: HidSecSOFTSUSYCatalogue identifier: AEHP_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEHP_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 4167No. of bytes in distributed program, including test data, etc.: 141 411Distribution format: tar.gzProgramming language: C++, FortranComputer: Personal computerOperating system: Tested on GNU/LinuxWord size: 32 bitsClassification: 11.6External routines: Requires an installed version of SOFTSUSY (http://projects.hepforge.org/softsusy/)Nature of problem: Calculating supersymmetric particle spectrum and mixing parameters while incorporating dynamic modes from the hidden sector into the renormalization group equations. The solution to the equations must be consistent with a high-scale boundary condition on supersymmetry breaking parameters, as well as a weak-scale boundary condition on gauge couplings, Yukawa couplings and the Higgs potential parameters.Solution method: Nested iterative algorithm.Running time: A few seconds per parameter point.  相似文献   
152.
153.
    
For many years, systems, developed to be integrated into a layered defense array, were planned through the “Stand Alone” paradigm, assuming that the layers of defense are independent. Almost all published literature dealing with Layered Defense automatically assumes that the layers of defense are independent of each other. The fact is they are not! Defense layers may influence one another in positive and/or negative ways. We attempt to initiate a new look at developing and deploying systems in an integrated array of defense systems, based on the understanding that influences between systems must be taken into account. A methodology for modeling the dependencies between defense systems engagements, of a single attacker, or of a salvo of attackers, is developed in this paper through an “Influence Decay Function” model. A tractable algorithm is developed to compute the complex effectiveness objective functions. The Non Independent Layered Defense Problem (NILDP) is formulated as a Mixed Integer Non Linear Programming problem. The optimization problem for maximum layered defense effectiveness is solved through powerful heuristic methods. The discussion deals with engineering defense systems to operate within complex environments which include not only threat from an opponent but also friendly systems to which integration is not at all trivial. © 2009 Wiley Periodicals, Inc. Syst Eng  相似文献   
154.
The study aims were to assess the independent contribution of motor ability to the incidence of school injuries. The study included 2057 pupils in grades 3-6 of primary schools in a city in the north of Israel. A surveillance system gathered information about injuries that occurred on school premises or during school related activities and required medical treatment or caused limitation of usual activities. Children provided information on sensation seeking, self-appraisal of health, academic performance, physical activity, and dominant hand; anthropometric measurements and motor ability tests were performed.The incidence of injury events was 4% (95% CI=3.2-5.0). Injuries increased with increased balance and agility, but there were no differences according to reaction time. No other study variables were associated with the incidence of injuries. Our findings of an increase in the incidence of injuries with better motor ability may express differences in exposure to risk situations between children with better and poorer motor abilities.  相似文献   
155.
Inventory management is being discussed recently as one of the key elements for survival and success in the production industry today. Little efforts were made to solve inventory problems in the Hi R&D environment.

In this paper, a prototype of a Microcomputer Based Decision Support is introduced to support decisions for managing Hi R&D inventories. The decisions involve timing and scheduling of purchased components, as well as classification of those items.  相似文献   

156.
157.
158.
Bar-Noy  Amotz  Patt-Shamir  Boaz  Ziper  Igor 《Wireless Networks》2004,10(2):157-168
In broadcast disks systems, information is broadcasted in a shared medium. When a client needs an item from the disk, it waits until that item is broadcasted. Broadcast disks systems are particularly attractive in settings where the potential customers have a highly-asymmetric communication capabilities, i.e., receiving is significantly cheaper than transmitting. This is the case with satellite networks, mobile hosts in wireless networks, and Teletext system.The fundamental algorithmic problem for such systems is to determine the broadcast schedule based on the demand probability of items, and the cost incurred to the system by clients waiting. The goal is to minimize the mean access cost of a random client. Typically, it was assumed that the access cost is proportional to the waiting time. In this paper, we ask what are the best broadcast schedules for access costs which are arbitrary polynomials in the waiting time. These may serve as reasonable representations of reality in many cases, where the patience of a client is not necessarily proportional to its waiting time.We present an asymptotically optimal algorithm for a fractional model, where the bandwidth may be divided to allow for fractional concurrent broadcasting. This algorithm, besides being justified in its own right, also serves as a lower bound against which we test known discrete algorithms. We show that the Greedy algorithm has the best performance in most cases. Then we show that the performance of other algorithms deteriorate exponentially with the degree of the cost polynomial and approaches the fractional solution for sub-linear cost. Finally, we study the quality of approximating the greedy schedule by a finite schedule.  相似文献   
159.
R. W. Gibbs (see record 1992-42479-001) argued that metaphoric expressions may reflect preexisting conventional metaphoric mappings in long-term memory. The class-inclusion model, in contrast, focuses on conceptual structures that are constructed and accessible in working memory during metaphor comprehension. The authors agree that prestored metaphoric mappings may be available, but they may not be accessible and hence not used in any given context. The authors point out problems in identifying those metaphorical mappings that may be relevant to a given metaphoric expression and suggest that conceptual metaphors may not be identifiable until after a metaphor has been interpreted. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号