首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1376篇
  免费   76篇
  国内免费   7篇
电工技术   24篇
综合类   3篇
化学工业   281篇
金属工艺   28篇
机械仪表   42篇
建筑科学   86篇
矿业工程   2篇
能源动力   57篇
轻工业   187篇
水利工程   37篇
石油天然气   15篇
武器工业   3篇
无线电   134篇
一般工业技术   237篇
冶金工业   95篇
原子能技术   10篇
自动化技术   218篇
  2024年   2篇
  2023年   13篇
  2022年   42篇
  2021年   64篇
  2020年   54篇
  2019年   58篇
  2018年   65篇
  2017年   61篇
  2016年   67篇
  2015年   38篇
  2014年   68篇
  2013年   117篇
  2012年   93篇
  2011年   95篇
  2010年   83篇
  2009年   74篇
  2008年   55篇
  2007年   64篇
  2006年   36篇
  2005年   27篇
  2004年   31篇
  2003年   24篇
  2002年   12篇
  2001年   12篇
  2000年   19篇
  1999年   26篇
  1998年   20篇
  1997年   29篇
  1996年   17篇
  1995年   9篇
  1994年   3篇
  1993年   4篇
  1992年   7篇
  1991年   4篇
  1990年   3篇
  1989年   7篇
  1988年   11篇
  1986年   4篇
  1985年   6篇
  1984年   6篇
  1983年   3篇
  1982年   2篇
  1981年   8篇
  1980年   4篇
  1979年   2篇
  1978年   4篇
  1976年   2篇
  1975年   1篇
  1971年   1篇
  1970年   1篇
排序方式: 共有1459条查询结果,搜索用时 31 毫秒
41.
Ticks are ectoparasites of great medical and veterinary importance around the world and synthetic chemicals such as permethrin have been used for their control. This study provides a cytochemistry analysis of both degenerative and cell death processes in salivary glands of the brown dog tick Rhipicephalus sanguineus semi-engorged females exposed to 206, 1,031, and 2,062 ppm of permethrin. The results presented herein demonstrate that permethrin is a potent chemical acaricide that would act on the glandular tissue's morphophysiology in this tick species by eliciting severe changes in the acinus shape, intense vacuolation of the acinar cells' cytoplasm, marked glandular tissue disorganization, culminating in an advanced degenerative stage with consequent formation of many apoptotic bodies (cell death). In addition, permethrin induced major changes in the acinar cells' nucleus, such as a change both in its shape and size, chromatin marginalization, nuclear fragmentation, and appearance of picnotic nuclei, especially when the highest concentrations of the product were used. Thus, permethrin induced early degeneration of this tissue characterized by significant changes in the structure of acinar cells and production of enzymes related to the cell death process, in addition to interfering directly in the genetic material of these cells.  相似文献   
42.
Chalak K  White H 《Neural computation》2012,24(7):1611-1668
We study the connections between causal relations and conditional independence within the settable systems extension of the Pearl causal model (PCM). Our analysis clearly distinguishes between causal notions and probabilistic notions, and it does not formally rely on graphical representations. As a foundation, we provide definitions in terms of suitable functional dependence for direct causality and for indirect and total causality via and exclusive of a set of variables. Based on these foundations, we provide causal and stochastic conditions formally characterizing conditional dependence among random vectors of interest in structural systems by stating and proving the conditional Reichenbach principle of common cause, obtaining the classical Reichenbach principle as a corollary. We apply the conditional Reichenbach principle to show that the useful tools of d-separation and D-separation can be employed to establish conditional independence within suitably restricted settable systems analogous to Markovian PCMs.  相似文献   
43.
The working-set bound [Sleator and Tarjan in J. ACM 32(3), 652–686, 1985] roughly states that searching for an element is fast if the element was accessed recently. Binary search trees, such as splay trees, can achieve this property in the amortized sense, while data structures that are not binary search trees are known to have this property in the worst case. We close this gap and present a binary search tree called a layered working-set tree that guarantees the working-set property in the worst case. The unified bound [B?doiu et al. in Theor. Comput. Sci. 382(2), 86–96, 2007] roughly states that searching for an element is fast if it is near (in terms of rank distance) to a recently accessed element. We show how layered working-set trees can be used to achieve the unified bound to within a small additive term in the amortized sense while maintaining in the worst case an access time that is both logarithmic and within a small multiplicative factor of the working-set bound.  相似文献   
44.
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme.  相似文献   
45.
In this paper, a new active fault tolerant control (AFTC) methodology is proposed based on a state estimation scheme for fault detection and identification (FDI) to deal with the potential problems due to possible fault scenarios. A bank of adaptive unscented Kalman filters (AUKFs) is used as a core of FDI module. The AUKF approach alleviates the inflexibility of the conventional UKF due to constant covariance set up, leading to probable divergence. A fuzzy-based decision making (FDM) algorithm is introduced to diagnose sensor and/or actuator faults. The proposed FDI approach is utilized to recursively correct the measurement vector and the model used for both state estimation and output prediction in a model predictive control (MPC) formulation. Robustness of the proposed FTC system, H optimal robust controller and MPC are combined via a fuzzy switch that is used for switching between MPC and robust controller such that FTC system is able to maintain the offset free behavior in the face of abrupt changes in model parameters and unmeasured disturbances. This methodology is applied on benchmark three-tank system; the proposed FTC approach facilitates recovery of the closed loop performance after the faults have been isolated leading to an offset free behavior in the presence of sensor/actuator faults that can be either abrupt or drift change in biases. Analysis of the simulation results reveals that the proposed approach provides an effective method for treating faults (biases/drifts in sensors/actuators, changes in model parameters and unmeasured disturbances) under the unified framework of robust fault tolerant control.  相似文献   
46.
A numerical simulation of the aircraft impact into the exterior columns of the World Trade Center (WTC) was done using LS-DYNA. For simplification, the fuselage was modeled as a thin-walled cylinder, the wings were modeled as box beams with a fuel pocket, and the engines were represented as rigid cylinders. The exterior columns of the WTC were represented as box beams. Actual masses, material properties and dimensions of the Boeing 767 aircraft and the exterior columns of the WTC were used in this analysis. It was found that about 46% of the initial kinetic energy of the aircraft was used to damage columns. The minimum impact velocity of the aircraft to just penetrate the exterior columns would be 130?m/s. It was also found that a Boeing 767 traveling at top speed would not penetrate exterior columns of the WTC if the columns were thicker than 20?mm.  相似文献   
47.
We have designed a new architecture that simplifies integration of heterogeneous IP for multimedia and streaming applications. The multilevel computing architecture (MLCA) is a template architecture featuring multiple processing units. This template architecture for SOC systems uses superscalar techniques to exploit task-level parallelism among different processing units. It supports a natural programming model that relieves programmers from explicitly synchronizing tasks and communicating data. code transformations that improve application performance are easy to incorporate in compilers for this architecture.  相似文献   
48.
A new methodology for computational plasticity of nonassociated frictional materials is presented. The new approach is inspired by the micromechanical origins of friction and results in a set of governing equations similar to those of standard associated plasticity. As such, procedures previously developed for associated plasticity are applicable with minor modification. This is illustrated by adaptation of the standard implicit scheme. Moreover, the governing equations can be cast in terms of a variational principle, which after discretization is solved by means of a newly developed second‐order cone programming algorithm. The effects of nonassociativity are discussed with reference to localization of deformations and illustrated by means of a comprehensive set of examples. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
49.
50.
The explosive increase in data demand coupled with the rapid deployment of various wireless access technologies have led to the increase of number of multi-homed or multi-interface enabled devices. Fully exploiting these interfaces has motivated researchers to propose numerous solutions that aggregate their available bandwidths to increase overall throughput and satisfy the end-user’s growing data demand. These solutions, however, do not utilize their interfaces to the maximum without network support, and more importantly, have faced a steep deployment barrier. In this paper, we propose an optimal deployable bandwidth aggregation system (DBAS) for multi-interface enabled devices. We present the DBAS architecture that does not introduce any intermediate hardware, modify current operating systems, modify socket implementations, nor require changes to current applications or legacy servers. The DBAS architecture is designed to automatically estimate the characteristics of applications and dynamically schedule various connections and/or packets to different interfaces. We also formulate our optimal scheduler as a mixed integer programming problem yielding an efficient solution. We evaluate DBAS via implementation on the Windows OS and further verify our results with simulations on NS2. Our evaluation shows that, with current Internet characteristics, DBAS reaches the throughput upper bound with no modifications to legacy servers. It also highlights the significant enhancements in the response time introduced by DBAS, which directly enhances the user experience.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号