首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1389篇
  免费   164篇
  国内免费   127篇
电工技术   17篇
综合类   81篇
化学工业   58篇
金属工艺   34篇
机械仪表   50篇
建筑科学   59篇
矿业工程   45篇
能源动力   38篇
轻工业   26篇
水利工程   144篇
石油天然气   667篇
武器工业   5篇
无线电   51篇
一般工业技术   71篇
冶金工业   31篇
原子能技术   19篇
自动化技术   284篇
  2024年   7篇
  2023年   21篇
  2022年   38篇
  2021年   58篇
  2020年   62篇
  2019年   68篇
  2018年   50篇
  2017年   64篇
  2016年   59篇
  2015年   59篇
  2014年   74篇
  2013年   84篇
  2012年   89篇
  2011年   108篇
  2010年   80篇
  2009年   72篇
  2008年   73篇
  2007年   63篇
  2006年   66篇
  2005年   62篇
  2004年   49篇
  2003年   51篇
  2002年   53篇
  2001年   30篇
  2000年   27篇
  1999年   33篇
  1998年   30篇
  1997年   27篇
  1996年   17篇
  1995年   19篇
  1994年   15篇
  1993年   13篇
  1992年   10篇
  1991年   16篇
  1990年   2篇
  1989年   6篇
  1988年   5篇
  1987年   6篇
  1986年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1981年   5篇
  1980年   4篇
排序方式: 共有1680条查询结果,搜索用时 11 毫秒
1.
The aim of this paper is to propose a new way to deal with observability of systems governed by ODEs, in a more general setting than the standard output equation.The primary finding is that observability over a time horizon reduces to single-valuedness of the vertical section of a set we name the observability kernel.The latter consists of the viability kernel of the output domain under the augmented system.The approach may be used either for global or local observability,to which available results on single-valuedness of multifunctions shall be applied in order to get necessary and/or sufficient characterizing conditions.Several examples are provided in order to illustrate the method.  相似文献   
2.
Three-dimensional (3D) human body modeling is an important research direction in the field of clothing virtual design. On the basis of 3D human body scanning, this paper studied a method to build a 3D parametric lower body model according to body classification. The research includes three main parts. (1) Anthropometry and body shape classification. We randomly selected 333 young women ages 18–25 years old in Northeast China as the experimental sample. Then we divided the lower body shape into three categories using principal component analysis and K-means clustering. (2) Determination of feature cross sections and points, and reconstruction of feature curves. According to the average values of each body type, we obtained the mean reference body by Euclidean distance method. We determined feature cross sections and points, and extracted the 3D coordinates of the feature points of the mean reference body to reconstruct the feature curves. (3) The surface lofting and establishment of parametric 3D lower body model. According to the shape characteristics of the lower body, we constructed the guiding lines for the crotch and lower limbs, and established parametric lower body models for three body types.Relevance to industry3D human modeling is an important part of garment industry digitization. This research provides an effective way to construct a parametric 3D lower body model. The method offers a reference for the parametric virtual human modeling and virtual fitting of trousers.  相似文献   
3.
LetR be a unidirectional asynchronous ring ofn identical processors each with a single input bit. Letf be any cyclic nonconstant function ofn boolean variables. Moran and Warmuth (1986) prove that anydeterministic algorithm that evaluatesf onR has communication complexity (n logn) bits. They also construct a family of cyclic nonconstant boolean functions that can be evaluated inO(n logn) bits by a deterministic algorithm.This contrasts with the following new results:
1.  There exists a family of cyclic nonconstant boolean functions which can be evaluated with expected complexity bits by arandomized algorithm forR.
2.  Anynondeterministic algorithm forR which evaluates any cyclic nonconstant function has communication complexity bits.
  相似文献   
4.
利用有限元方法,建立了小腿冲击器与汽车前部结构的碰撞模型,用以评价某款车保险杠系统对小腿损伤的影响。通过增加吸能部件、副保险杠加强板等方式减轻行人下肢的损伤,并通过正交试验设计研究了吸能部件的材料、吸能部件前后面之间的距离、副保险杠加强板的厚度以及副保险杠加强板前后面之间的距离对行人下肢损伤的影响。研究结果表明,经正交试验设计后的前保险杠系统能有效地减小小腿冲击器的胫骨加速度以及膝关节弯曲角度,使得下肢保护指标满足Eu-roNCAP法规要求。优化设计后的前保险杠系统更好的防护行人下肢的损伤。  相似文献   
5.
The two basic performance parameters that capture the complexity of any VLSI chip are the area of the chip,A, and the computation time,T. A systematic approach for establishing lower bounds onA is presented. This approach relatesA to the bisection flow, . A theory of problem transformation based on , which captures bothAT 2 andA complexity, is developed. A fundamental problem, namely, element uniqueness, is chosen as a computational prototype. It is shown under general input/output protocol assumptions that any chip that decides ifn elements (each with (1+)lognbits) are unique must have =(nlogn), and thus, AT2=(n 2log2 n), andA= (nlogn). A theory of VLSI transformability reveals the inherentAT 2 andA complexity of a large class of related problems.This work was supported in part by the Semiconductor Research Corporation under contract RSCH 84-06-049-6.  相似文献   
6.
知识的属性扰动引起知识规律的变化,这些变化的规律称为扰动规律.利用单向S-粗集和单向S-粗集对偶,给出属性扰动的知识规律的上规律.下规律的概念,并对知识规律与属性扰动的知识规律进行了讨论,提出了属性扰动知识规律(上规律,下规律)的不等式定理.  相似文献   
7.
The timestamp problem captures a fundamental aspect of asynchronous distributed computing. It allows processes to label events throughout the system with timestamps that provide information about the real-time ordering of those events. We consider the space complexity of wait-free implementations of timestamps from shared read-write registers in a system of n processes. We prove an lower bound on the number of registers required. If the timestamps are elements of a nowhere dense set, for example the integers, we prove a stronger, and tight, lower bound of n. However, if timestamps are not from a nowhere dense set, this bound can be beaten: we give an implementation that uses n − 1 (single-writer) registers. We also consider the special case of anonymous implementations, where processes are programmed identically and do not have unique identifiers. In contrast to the general case, we prove anonymous timestamp implementations require n registers. We also give an implementation to prove that this lower bound is tight. This is the first anonymous timestamp implementation that uses a finite number of registers.  相似文献   
8.
It is foreseen that more and more music objects in symbolic format and multimedia objects, such as audio, video, or lyrics, integrated with symbolic music representation (SMR) will be published and broadcasted via the Internet. The SMRs of the flowing songs or multimedia objects will form a music stream. Many interesting applications based on music streams, such as interactive music tutorials, distance music education, and similar theme searching, make the research of content-based retrieval over music streams much important. We consider multiple queries with error tolerances over music streams and address the issue of approximate matching in this environment. We propose a novel approach to continuously process multiple queries over the music streams for finding all the music segments that are similar to the queries. Our approach is based on the concept of n-grams, and two mechanisms are designed to reduce the heavy computation of approximate matching. One mechanism uses the clustering of query n-grams to prune the query n-grams that are irrelevant to the incoming data n-gram. The other mechanism records the data n-gram that matches a query n-gram as a partial answer and incrementally merges the partial answers of the same query. We implement a prototype system for experiments in which songs in the MIDI format are continuously broadcasted, and the user can specify musical segments as queries to monitor the music streams. Experiment results show the effectiveness and efficiency of the proposed approach.  相似文献   
9.
Exploring the power of shared memory communication objects and models, and the limits of distributed computability are among the most exciting research areas of distributed computing. In that spirit, this paper focuses on a problem that has received considerable interest since its introduction in 1987, namely the renaming problem. It was the first non-trivial problem known to be solvable in an asynchronous distributed system despite process failures. Many algorithms for renaming and variants of renaming have been proposed, and sophisticated lower bounds have been proved, that have been a source of new ideas of general interest to distributed computing. It has consequently acquired a paradigm status in distributed fault-tolerant computing.In the renaming problem, processes start with unique initial names taken from a large name space, then deciding new names such that no two processes decide the same new name and the new names are from a name space that is as small as possible.This paper presents an introduction to the renaming problem in shared memory systems, for non-expert readers. It describes both algorithms and lower bounds. Also, it discusses strong connections relating renaming and other important distributed problems such as set agreement and symmetry breaking.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号