首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   184篇
  免费   4篇
化学工业   33篇
机械仪表   1篇
建筑科学   15篇
能源动力   7篇
轻工业   9篇
石油天然气   2篇
无线电   34篇
一般工业技术   24篇
冶金工业   25篇
原子能技术   1篇
自动化技术   37篇
  2022年   2篇
  2021年   3篇
  2020年   2篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   6篇
  2015年   3篇
  2014年   2篇
  2013年   10篇
  2012年   8篇
  2011年   8篇
  2010年   7篇
  2009年   7篇
  2008年   6篇
  2007年   7篇
  2006年   6篇
  2005年   5篇
  2004年   9篇
  2003年   3篇
  2002年   5篇
  2001年   5篇
  2000年   1篇
  1998年   11篇
  1997年   9篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
  1992年   1篇
  1990年   1篇
  1989年   2篇
  1985年   1篇
  1984年   2篇
  1983年   5篇
  1982年   6篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
  1972年   5篇
  1971年   1篇
  1970年   4篇
  1969年   2篇
  1965年   1篇
排序方式: 共有188条查询结果,搜索用时 31 毫秒
111.
A computational model of flashover is presented that closely follows the experimental setup at CNRS-ENSMA-Poitiers. A propane burner with thermal power of 55 kW is used as a primary source of fire and square beech wood samples (30 mm×30 mm×5 mm) as fire spread targets. The computational model describes the wood pyrolysis with a progress variable. Using the conservation of heat fluxes at the solid–gas interface, the thermal diffusion in the wood samples is coupled with the convective and the radiative heat transfer in the ambient gas phase. The incoming heat flux at the upper surface of the wood samples reaches values between 20 and 30 kW/m2. With the ignition and subsequent combustion of the pyrolysis volatiles, the heat flux increases by approx. 12 kW/m2. The results show that the ignition of the wood samples is triggered at an approx. surface temperature of 650 K. Due to large local variations in incident heat flux, significant differences in the ignition times of the wood samples are observed. The comparison of the calculated and the experimentally measured temperature shows a good agreement for the first wood sample and the model predicts the ignition time very well. But for the second and the third wood samples the model overpredicts the temperature, which leads to a premature ignition of these wood samples.  相似文献   
112.
The effect of axial diffusion, usually neglected in mass transfer calculations, in investigated for the absorption process into a liquid film. The absorption takes place within a finite length of the film and the surface resistance is assumed to be constant. For such a system, several upstream and down-stream boundary conditions are analysed and the results are presented in terms of the overall Sherwood number.It is found that the effect of axial diffusion is appreciable for very short absorbing lengths or relatively low flow velocities. For long absorbing lengths, all cases considered are insensitive to the upstream and downstream boundary conditions.  相似文献   
113.
The paper presents a computer-aided analysis of the combined use of ventilation and structural heat capacity and insulation as a means of saving air-conditioning power in digital telephone exchanges. It is shown that such savings can be effected by increasing air change with outdoor cool air at night, and when feasible, also in daytime, through the air change unit, in a conventional air-conditioning cycle. The total thermal time constant (TTTC) method of calculation used enables the evaluation of daily or seasonal heat-flow balance for a given indoor temperature, considering the tendency of the heat capacity of the building and of envelope components to flatten the fluctuations of this temperature.  相似文献   
114.
Partitioning a sequence into few monotone subsequences   总被引:1,自引:0,他引:1  
In this paper we consider the problem of finding sets of long disjoint monotone subsequences of a sequence of numbers. We give an algorithm that, after preprocessing time, finds and deletes an increasing subsequence of size (if it exists) in time . Using this algorithm, it is possible to partition a sequence of numbers into monotone subsequences in time . Our algorithm yields improvements for two applications: The first is constructing good splitters for a set of lines in the plane. Good splitters are useful for two dimensional simplex range searching. The second application is in VLSI, where we seek a partitioning of a given graph into subsets, commonly refered to as the pages of a book, where all the vertices can be placed on the spine of the book, and each subgraph is planar. Received: 23 July 1990 / 19 June 1997  相似文献   
115.
The recently proposed universally composable security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a protocol proven secure in this framework is guaranteed to maintain its security even when run concurrently with arbitrary other protocols. It has been shown that if a majority of the parties are honest, then universally composable protocols exist for essentially any cryptographic task in the plain model (i.e., with no set-up assumptions beyond that of authenticated communication). When honest majority is not guaranteed, general feasibility results are known only when given a trusted set-up, such as in the common reference string model. Only little was known regarding the existence of universally composable protocols in the plain model without honest majority, and in particular regarding the important special case of two-party protocols. We study the feasibility of universally composable two-party function evaluation in the plain model. Our results show that in this setting, very few functions can be securely computed in the framework of universal composability. We demonstrate this by providing broad impossibility results that apply to large classes of deterministic and probabilistic functions. For some of these classes, we also present full characterizations of what can and cannot be securely realized in the framework of universal composability. Specifically, our characterizations are for the classes of deterministic functions in which (a) both parties receive the same output, (b) only one party receives output, and (c) only one party has input.  相似文献   
116.
A streptomycete strain (FERM-P1185), isolated from soil, secreted a slime on glucose-asparagine agar, and produced viscous growth in liquid media containing peptone as nitrogen source. A purified polysaccharide isolated from the culture broth was composed of glucose and mannose units (molar ratio 1-87:1). Periodate oxidation, Smith degradation, methylation analysis, infrared and 13c nuclear magnetic resonance spectra indicated that this mannoglucan had a linear structure consisting of alpha-1,3- and alpha-1,4-linked glucopyranose and mannopyranose units.  相似文献   
117.
Photonic crystals and optical bandgap structures, which facilitate high-precision control of electromagnetic-field propagation, are gaining ever-increasing attention in both scientific and commercial applications. One common photonic device is the distributed Bragg reflector (DBR), which exhibits high reflectivity at certain frequencies. Analysis of the transient interaction of an electromagnetic pulse with such a device can be formulated in terms of the time-domain volume integral equation and, in turn, solved numerically with the method of moments. Owing to the frequency-dependent reflectivity of such devices, the extent of field penetration into deep layers of the device will be different depending on the frequency content of the impinging pulse. We show how this phenomenon can be exploited to reduce the number of basis functions needed for the solution. To this end, we use spatiotemporal wavelet basis functions, which possess the multiresolution property in both spatial and temporal domains. To select the dominant functions in the solution, we use an iterative impedance matrix compression (IMC) procedure, which gradually constructs and solves a compressed version of the matrix equation until the desired degree of accuracy has been achieved. Results show that when the electromagnetic pulse is reflected, the transient IMC omits basis functions defined over the last layers of the DBR, as anticipated.  相似文献   
118.
Robust linear dimensionality reduction   总被引:1,自引:0,他引:1  
We present a novel family of data-driven linear transformations, aimed at finding low-dimensional embeddings of multivariate data, in a way that optimally preserves the structure of the data. The well-studied PCA and Fisher's LDA are shown to be special members in this family of transformations, and we demonstrate how to generalize these two methods such as to enhance their performance. Furthermore, our technique is the only one, to the best of our knowledge, that reflects in the resulting embedding both the data coordinates and pairwise relationships between the data elements. Even more so, when information on the clustering (labeling) decomposition of the data is known, this information can also be integrated in the linear transformation, resulting in embeddings that clearly show the separation between the clusters, as well as their internal structure. All of this makes our technique very flexible and powerful, and lets us cope with kinds of data that other techniques fail to describe properly.  相似文献   
119.
Deterministic collect algorithms are presented that are adaptive to total contention and are efficient with respect to both the number of registers used and the step complexity. One of them has optimal O(k) step and O(n) space complexities, but assumes that processes’ identifiers are in O(n), where n is the total number of processes in the system and k is the total contention. The step complexity of an unrestricted name space variant of this algorithm remains O(k), but its space complexity increases to O(n 2).  相似文献   
120.
We suggest a new simple forwarding technique to speed up IP destination address lookup. The technique is a natural extension of IP, requires 5 bits in the IP header (IPv4, 7 in IPv6), and performs IP lookup nearly as fast as IP/Tag switching but with a smaller memory requirement and a much simpler protocol. The basic idea is that each router adds a "clue" to each packet, telling its downstream router where it ended the IP lookup. Since the forwarding tables of neighboring routers are similar, the clue either directly determines the best prefix match for the downstream router, or provides the downstream router with a good point to start its IP lookup. The new scheme thus prevents repeated computations and distributes the lookup process across the routers along the packet path. Each router starts the lookup computation at the point its upstream neighbor has finished. Furthermore, the new scheme is easily assimilated into heterogeneous IP networks, does not require routers coordination, and requires no setup time. Even a flow of one packet enjoys the benefits of the scheme without any additional overhead. The speedup we achieve is about 10 times faster than current standard techniques. In a sense, this paper shows that the current routers employed in the Internet are clue-less; namely, it is possible to speed up the IP lookup by an order of magnitude without any major changes to the existing protocols  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号