首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   589篇
  免费   25篇
  国内免费   1篇
电工技术   10篇
化学工业   153篇
金属工艺   2篇
机械仪表   10篇
建筑科学   19篇
能源动力   11篇
轻工业   88篇
石油天然气   1篇
无线电   29篇
一般工业技术   123篇
冶金工业   25篇
原子能技术   6篇
自动化技术   138篇
  2024年   1篇
  2023年   3篇
  2022年   20篇
  2021年   20篇
  2020年   12篇
  2019年   11篇
  2018年   19篇
  2017年   12篇
  2016年   29篇
  2015年   19篇
  2014年   22篇
  2013年   36篇
  2012年   41篇
  2011年   44篇
  2010年   35篇
  2009年   31篇
  2008年   31篇
  2007年   42篇
  2006年   17篇
  2005年   16篇
  2004年   20篇
  2003年   15篇
  2002年   12篇
  2001年   8篇
  2000年   6篇
  1999年   11篇
  1998年   2篇
  1997年   5篇
  1996年   6篇
  1995年   6篇
  1994年   6篇
  1993年   8篇
  1992年   4篇
  1991年   3篇
  1990年   1篇
  1989年   4篇
  1988年   2篇
  1987年   4篇
  1986年   2篇
  1985年   6篇
  1984年   4篇
  1983年   4篇
  1982年   3篇
  1981年   4篇
  1980年   1篇
  1979年   3篇
  1978年   1篇
  1975年   1篇
  1974年   1篇
  1966年   1篇
排序方式: 共有615条查询结果,搜索用时 15 毫秒
31.
The reliability of RF MEMS switches is typically reduced by charging effects occurring in the dielectrics. The aim of this paper is to discuss these effects, and to propose analytical and equivalent circuit models which account for most of the physical contributions present in the structure.  相似文献   
32.
The problem of clustering fingerprint vectors with missing values is an interesting problem in Computational Biology that has been proposed in Figueroa et al. (J. Comput. Biol. 11(5):887–901, 2004). In this paper we show some improvements in closing the gaps between the known lower bounds and upper bounds on the approximability of variants of the biological problem. Moreover, we have studied two additional variants of the original problem proposed in Figueroa et al. (Proc. 11th Computing: The Australasian Theory Symposium (CATS), CRPIT, vol. 41, pp. 57–60, 2005). We prove that all such problems are APX-hard even when each fingerprint contains only two unknown positions and we present a greedy algorithm that has constant approximation factors for these variants. Despite the hardness of these restricted versions of the problem, we show that the general clustering problem on an unbounded number of missing values such that they occur for every fixed position of an input vector in at most one fingerprint is polynomial time solvable.  相似文献   
33.
In this paper, we report some comparative simulations between lattice BGK and lattice Bolzmann schemes for two-dimensional fluid flows. A quantitative assessment of the validity of the lattice BGK and lattice Bolzmann schemes is presented for the two-dimensional weakly compressibleKolmogorov flow. We use this flow to study the difference of the two schemes at small scales. A lowReynolds (R e 300) number simulation shows the almost identical energy spectra for both schemes except for the small-scale dynamics of lattice Bolzmann which is more noisy. Because of the intrinsic difficulties of nonlinear stability analysis, we use numerical simulations to investigate which scheme is more stable. It turns out the lattice BGK is more stable. It turns out the lattice BGK is more robust than lattice Bolzmann by increasing theReynolds numbers. Detailed comparison with other methods (e.g., spectral method) remains to be done in the near future.  相似文献   
34.
In this work, we propose a novel multimedia summarization technique from Online Social Networks (OSNs). In particular, we model each Multimedia Social Network (MSN)—i.e. an OSN focusing on the management and sharing of multimedia information—using an hypergraph based approach and exploit influence analysis methodologies to determine the most important multimedia objects with respect to one or more topics of interest. Successively, we obtain from the list of candidate objects a multimedia summary using a summarization model together with an heuristics that aims to generate summaries with priority (with respect to some user keywords), continuity, variety and not receptiveness features. The performed experiments on Flickr shows the effectiveness of proposed approach.  相似文献   
35.
P systems and Brane calculi are two (families of) computational models inspired by the structure and the functioning of living cells. Although they have different goals there is a recent growing of interests in results that bridge the two research areas.Here we consider an important kind of communication based on the natural budding of mobile membranes (e.g., Golgi apparatus) that is already defined for P systems and we show how to construct an analogous communication in the basic Phago/Exo/Pino Brane calculus.  相似文献   
36.
International Journal of Control, Automation and Systems - In this paper, a safety-enhanced collaborative control framework is proposed for tele-operated minimally invasive surgery (MIS) using a...  相似文献   
37.

Context

Adopting IT innovation in organizations is a complex decision process driven by technical, social and economic issues. Thus, those organizations that decide to adopt innovation take a decision of uncertain success of implementation, as the actual use of a new technology might not be the one expected. The misalignment between planned and effective use of innovation is called assimilation gap.

Objective

This research aims at defining a quantitative instrument for measuring the assimilation gap and applying it to the case of the adoption of OSS.

Method

In this paper, we use the theory of path dependence and increasing returns of Arthur. In particular, we model the use of software applications (planned or actual) by stochastic processes defined by the daily amounts of files created with the applications. We quantify the assimilation gap by comparing the resulting models by measures of proximity.

Results

We apply and validate our method to a real case study of introduction of OpenOffice. We have found a gap between the planned and the effective use despite well-defined directives to use the new OS technology. These findings suggest a need of strategy re-calibration that takes into account environmental factors and individual attitudes.

Conclusions

The theory of path dependence is a valid instrument to model the assimilation gap provided information on strategy toward innovation and quantitative data on actual use are available.  相似文献   
38.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms.  相似文献   
39.
40.
Constraint-based modeling is largely used in computational studies of metabolism. We propose here a novel approach that aims to identify ensembles of flux distributions that comply with one or more target phenotype(s). The methodology has been tested on a small-scale model of yeast energy metabolism. The target phenotypes describe the differential pattern of ethanol production and O2 consumption observed in “Crabtree-positive” and “Crabtree-negative” yeasts in changing environment (i.e., when the upper limit of glucose uptake is varied). The ensembles were obtained either by selection among sampled flux distributions or by means of a search heuristic (genetic algorithm). The former approach provided indication about the probability to observe a given phenotype, but the resulting ensembles could not be unambiguously partitioned into “Crabtree-positive” and “Crabtree-negative” clusters. On the contrary well-separated clusters were obtained with the latter method. The cluster analysis further allowed identification of distinct groups within each target phenotype. The method may thus prove useful in characterizing the design principles underlying metabolic plasticity arising from evolving physio-pathological or developmental constraints.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号