首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9798篇
  免费   719篇
  国内免费   666篇
电工技术   602篇
综合类   639篇
化学工业   227篇
金属工艺   313篇
机械仪表   949篇
建筑科学   338篇
矿业工程   92篇
能源动力   181篇
轻工业   47篇
水利工程   234篇
石油天然气   158篇
武器工业   91篇
无线电   1031篇
一般工业技术   449篇
冶金工业   97篇
原子能技术   86篇
自动化技术   5649篇
  2024年   12篇
  2023年   76篇
  2022年   88篇
  2021年   129篇
  2020年   137篇
  2019年   152篇
  2018年   145篇
  2017年   229篇
  2016年   217篇
  2015年   304篇
  2014年   470篇
  2013年   470篇
  2012年   562篇
  2011年   704篇
  2010年   450篇
  2009年   607篇
  2008年   605篇
  2007年   743篇
  2006年   655篇
  2005年   615篇
  2004年   540篇
  2003年   435篇
  2002年   367篇
  2001年   281篇
  2000年   256篇
  1999年   254篇
  1998年   243篇
  1997年   232篇
  1996年   207篇
  1995年   176篇
  1994年   172篇
  1993年   120篇
  1992年   99篇
  1991年   83篇
  1990年   69篇
  1989年   52篇
  1988年   59篇
  1987年   23篇
  1986年   12篇
  1985年   29篇
  1984年   20篇
  1983年   13篇
  1982年   11篇
  1981年   9篇
  1980年   10篇
  1979年   6篇
  1978年   6篇
  1976年   7篇
  1974年   6篇
  1973年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
51.
横流均匀环境中三维线源型正负浮力射流特性研究   总被引:2,自引:2,他引:0  
本文利用混合有限分析法及交错网格。对横流均匀环境中三维线源型正负浮力射流及负浮力射流的特性进行研究,分析了不同工况下流速,温度和湍动能在断面上的分布及影响射流轨迹线的因素,讨论了轨迹线上温度的变化及浮力射流的贴壁现象。对三维长线源型负浮力射流,分析了流速比,喷口弗汝德数对负浮力射流的影响。  相似文献   
52.
The paper presents a computational approach and numerical data which facilitate the use of the smeared-tip method for cohesive fracture in large enough structures. In the recently developed K-version of the smeared tip method, the large-size asymptotic profile of the stress intensity factor density along a cohesive crack is considered as a material characteristic, which is uniquely related to the softening stress-displacement law of the cohesive crack. After reviewing the K-version, an accurate and efficient numerical algorithm for the computation of this asymptotic profile is presented. The algorithm is based on solving a singular Abel's integral equation. The profiles corresponding to various typical softening stress-displacement laws of the cohesive crack model are computed, tabulated and plotted. The profiles for a certain range of other typical softening laws can be approximately obtained by interpolation from the tables. Knowing the profile, one can obtain with the smeared-tip method an analytical expression for the large-size solution to fracture problems, including the first two asymptotic terms of the size effect law. Consequently, numerical solutions of the integral equations of the cohesive crack model as well as finite element simulations of the cohesive crack are made superfluous. However, when the fracture process zone is attached to a notch or to the body surface and the cohesive zone ends with a stress jump, the solution is expected to be accurate only for large-enough structures.  相似文献   
53.
Frank G. Pagan 《Software》1988,18(6):509-527
There is an effective and quite general method of manually deriving compilers from programming-language interpreters without dealing directly with machine language. The method is an implementation of the largely theoretical and under-appreciated concept of partial computation, but can be understood on its own terms. It involves the translation of a source program's intermediate form into the interpreter's implementation language. This paper shows how the method can be used to transform both a sample iterative interpreter and a sample recursive interpreter into compilers. The result can be a large gain in program execution speed. Other advantages of the method, including the ease and practicality of applying it, are discussed.  相似文献   
54.
The EGS4 code, developed at Stanford Linear Accelerator Center, simulates electron-photon cascading phenomena. The original code is inherently sequential: processing one particle at a time. This paper reports on a series of experiments in parallelizing different versions of EGS4. Our parallel experiments were run on a 30-processor Sequent Balance B21 and a 6-processor Symmetry S27. We have considered the following approaches for parallel execution of this application code:
1. (1) Original sequential version modified for parallel processing: 1 processor;
2. (2) Version 1 run multiprocessed: 1 to 29 processors;
3. (3) Sequential version modified for large-grain parallel processing: 1 procssor;
4. (4) Version 3 run using the Sequent Microtasking Library: 1 to 29 processors.

For each approach, we discuss the relative advantages and disadvantages in the areas of coding effort, understandability and portability, as well as performance, and outline a new parallelization approach we are currently pursuing based on Large-Grain Data Flow techniques.  相似文献   

55.
FM3808是Ramtron公司生产的新型超低功耗非易失铁电存储器,该器件可支持对存储区的高速读写,并可进行近乎无限次的写入。FM3808内部除具有256kB的存储阵列外还集成了实时时钟和系统监控模块,因而功能十分强大。文中介绍了FM3808的性能特点、内部结构和工作原理,分析了TMS320VC5402 DSP的并行引导装载模式。给出了DSP与FM3808组成的并行引导接口方案。  相似文献   
56.
一种高并行度的H.264帧内预测器的VLSI设计   总被引:3,自引:2,他引:1  
杨晨  李树国 《微电子学与计算机》2006,23(12):111-114,117
分析了帧内预测的17种模式,对于每个4×4大小块的16个像素点的不同模式的预测公式之间的相同运算,采用数字强度缩减的方法去除计算的冗余,提出了一种高并行度的帧内预测器,可以每个时钟周期处理16个像素点的预测值。基于SMIC0.18μm工艺,用verilog对该设计进行了VLSI实现,综合后的电路的关键路径最大时延为10ns,电路规模不超过1.4万门,数据吞吐率可以达到1600Msamples/s。从实现结果来看,与采用可重构方法的设计相比,该设计在相同的并行度下减小了电路面积,简化了控制逻辑。  相似文献   
57.
The problem of delay-insensitive data communication is described. The notion of delay-insensitive code is defined, giving precise conditions under which delay-insensitive data communication is feasible. Examples of these codes are presented and analyzed. It appears that delay-insensitive codes are equivalent with antichains in partially ordered sets and with all unidirectional error-detecting codes. Tom Verhoeff received the B.S. and M.S. degrees in mathematics from Eindhoven University of Technology, The Netherlands, in 1985. He is currently an Assistant Professor at the Department of Mathematics and Computing Science of the same university. His main research interests are parallel computations, especially formalisms for their specification and design, and their implementation as delay-insensitive VLSI circuits.  相似文献   
58.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
59.
BKX-Ⅰ型并联机床的谐响应分析   总被引:3,自引:1,他引:2  
应用有限元分析软件(ANSYS),对BKXⅠ型并联机床进行谐响应分析,分别得到了机床各节点沿机床的虚拟轴X、Y和Z向的位移谐响应曲线。在此基础上,还分析了该机床的谐响应规律,并明确了谐响应的特点,为改善此类机床的动态特性提供了一定的参考依据。  相似文献   
60.
We say that a distribution over {0,1}n is (ε,k)-wise independent if its restriction to every k coordinates results in a distribution that is ε-close to the uniform distribution. A natural question regarding (ε,k)-wise independent distributions is how close they are to some k-wise independent distribution. We show that there exist (ε,k)-wise independent distributions whose statistical distance is at least nO(k)·ε from any k-wise independent distribution. In addition, we show that for any (ε,k)-wise independent distribution there exists some k-wise independent distribution, whose statistical distance is nO(k)·ε.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号