首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   260篇
  免费   4篇
电工技术   2篇
化学工业   63篇
机械仪表   1篇
建筑科学   9篇
轻工业   2篇
无线电   28篇
一般工业技术   38篇
冶金工业   22篇
自动化技术   99篇
  2023年   3篇
  2022年   3篇
  2021年   12篇
  2020年   2篇
  2019年   4篇
  2018年   3篇
  2016年   4篇
  2015年   8篇
  2014年   3篇
  2013年   11篇
  2012年   15篇
  2011年   9篇
  2010年   10篇
  2009年   22篇
  2008年   13篇
  2007年   14篇
  2006年   8篇
  2005年   3篇
  2004年   9篇
  2003年   3篇
  2002年   7篇
  2001年   3篇
  2000年   7篇
  1999年   5篇
  1998年   3篇
  1997年   5篇
  1996年   6篇
  1995年   5篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   3篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   3篇
  1980年   1篇
  1979年   4篇
  1978年   4篇
  1977年   10篇
  1976年   2篇
  1975年   10篇
  1973年   1篇
  1971年   2篇
  1970年   1篇
  1969年   2篇
  1967年   3篇
排序方式: 共有264条查询结果,搜索用时 15 毫秒
71.
We study challenges raised by the order of Arabic verbs and their subjects in statistical machine translation (SMT). We show that the boundaries of post-verbal subjects (VS) are hard to detect accurately, even with a state-of-the-art Arabic dependency parser. In addition, VS constructions have highly ambiguous reordering patterns when translated to English, and these patterns are very different for matrix (main clause) VS and non-matrix (subordinate clause) VS. Based on this analysis, we propose a novel method for leveraging VS information in SMT: we reorder VS constructions into pre-verbal (SV) order for word alignment. Unlike previous approaches to source-side reordering, phrase extraction and decoding are performed using the original Arabic word order. This strategy significantly improves BLEU and TER scores, even on a strong large-scale baseline. Limiting reordering to matrix VS yields further improvements.  相似文献   
72.
Assembly of materials into microstructures under laser guidance is attracting wide attention. The ability to pattern various materials and form 2D and 3D structures with micron/sub-micron resolution and less energy and material waste compared with standard top-down methods make laser-based printing promising for many applications, for example medical devices, sensors, and microelectronics. Assembly from liquids provides a smaller feature size than powders and has advantages over other states of matter in terms of relatively simple setup, easy handling, and recycling. However, the simplicity of the setup conceals a variety of underlying mechanisms, which cannot be identified simply according to the starting or resulting materials. This progress report surveys the various mechanisms according to the source of the material—preformed or locally synthesized. Within each category, methods are defined according to the driving force of material deposition. The advantages and limitations of each method are critically discussed, and the methods are compared, shedding light on future directions and developments required to advance this field.  相似文献   
73.
Transmission electron microscopy (TEM), atomic force microscopy (AFM), and photoluminescence (PL) spectroscopy were used in order to study the microstructure and optical properties of GaN films grown by metal-organic chemical vapor deposition (MOCVD) on c-plane sapphire by lateral confined epitaxy (LCE). In this method, the substrate is etched prior to growth to form uniform mesas separated by trenches for laterally restricting growth area. As previously observed for LCE GaN on Si(111), the density of threading dislocations was significantly reduced in the areas close to the edge of mesas due to the lateral propagation of the dislocations. Hence, the overall material quality improves with decreasing mesa size, which is consistent with the observed increase in photoluminescence band edge peak intensity. Electron diffraction indicated ∼1° rotation about the [ ] axis between the mesa and trench material, which was also observed in the image contrast of these two regions with g= . Additionally, LCE samples prepared in [ ] and [ ] cross sections were used for comparing the growth rates in these two perpendicular directions. As theoretically expected, growth in the [ ] direction appears to proceed considerably faster than that in the [% MathType!MTEF!2!1!+-% feaafiart1ev1aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn% hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr% 4rNCHbGeaGqiVu0Je9qqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq-Jc9% vqaqpepm0xbba9pwe9Q8fs0-yqaqpepae9pg0FirpepeKkFr0xfr-x% fr-xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaaGymaiaaig% daceaIYaGbaebacaaIWaaaaa!38D1!\[11\bar 20\]] direction.  相似文献   
74.
A new algebraic test is developed to determine whether or not a two-variable (2-D) characteristic polynomial of a recursive linear shift invariant (LSI, discrete-time) system is stable (i.e., it does not vanish in the closed exterior of the unit bi-circle). The method is based on the original form of a unit-circle zero location test for one variable (1-D) polynomials with complex coefficients proposed by the author. The test requires the construction of a table, in the form of a sequence of centrosymmetric matrices or 2-D polynomials, that is obtained using a certain three-term recursion, and examination of the zero location with respect to the unit circle of a few associated 1-D polynomials. The minimal set necessary and sufficient conditions for 2-D stability involves one 1-D polynomial whose zeros must reside inside the unit circle (which may be examined before the table is constructed), and one symmetric 1-D polynomial (which becomes available after completing the table) that is required not to have zeros on the unit circle. A larger set of intermediate necessary conditions for stability (which may be examined during the table's construction) are also given. The test compares favorably with Jury's recently improved 2-D stability test in terms of complexity and munerical stability.  相似文献   
75.
Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation.  相似文献   
76.
Kashter Y  Levi O  Stern A 《Applied optics》2012,51(13):2491-2496
Localization information of moving and changing objects, as commonly extracted from video sequences, is typically very sparse with respect to the full data frames, thus fulfilling one of the basic conditions of compressive sensing theory. Motivated by this observation, we developed an optical compressive change and motion-sensing technique that detects the location of moving objects by using a significantly fewer samples than conventionally taken. We present examples of motion detection and motion tracking with over two orders of magnitude fewer samples than required with conventional systems.  相似文献   
77.
A model aimed at calculating the aeration efficiency of a passively aerated biological vertical bed unit is presented. The model allows the calculation of the mass of air that would flow via convection into the vertical bed, therefore enabling the prediction of the maximal capacity of the bed as an aerobic biological reactor. Aeration efficiency, defined as the volume of air that would enter the bottom of the bed as a function of the volume of water that is drained from it, is predicted in the model as a function of the mean particle size of the gravel media, and the diameter and number of the aeration tubes installed. The model was calibrated in the laboratory and verified using results from a pilot scale vertical bed treating secondary municipal wastewater effluents. The principal model equation is: EPAVB = NPDp4/(NPDp4+0.285pDr22), where EPAFB=efficiency of the passive air pump (—); NP=number of aeration pipes (—); Dp=aeration pipes’ diameter (m); p=medium porosity (—); and Dr=vertical bed diameter (m).  相似文献   
78.
79.
Virtual circuits (VCs) can reduce routing overheads with irregular topologies and provide support for a mix of quality of service (QoS) requirements. Information about network loads and traffic patterns may be used during circuit establishment to utilize network resources more efficiently than is practical with packet routing. Most VC schemes are static—each established VC remains unchanged until the connection is no longer needed. In contrast, we propose the dynamic virtual circuit (DVC) mechanism, which enables existing circuits to be quickly torn down in order to free up resources needed for other circuits or to re-establish circuits along routes that are better suited for current network conditions. We propose a deadlock avoidance technique, based on unconstrained routing of DVCs combined with a deadlock-free virtual network. We present a correctness proof for the scheme, describe key aspects of its implementation, and present performance evaluation results that explore its potential benefits.  相似文献   
80.
Coulomb oscillations and Hall effect in quasi-2D graphite quantum dots   总被引:1,自引:0,他引:1  
We perform low-temperature electrical transport measurements on gated, quasi-2D graphite quantum dots. In devices with low contact resistances, we use longitudinal and Hall resistances to extract carrier densities of 9.2-13 x 10(12) cm(-2) and mobilities of 200-1900 cm(2)/V.s. In devices with high resistance contacts, we observe Coulomb blockade phenomena and infer the charging energies and capacitive couplings. These experiments demonstrate that electrons in mesoscopic graphite pieces are delocalized over nearly the whole graphite piece down to low temperatures.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号