首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   458篇
  免费   23篇
  国内免费   1篇
电工技术   6篇
化学工业   90篇
金属工艺   4篇
机械仪表   8篇
建筑科学   10篇
能源动力   5篇
轻工业   71篇
水利工程   4篇
石油天然气   5篇
无线电   32篇
一般工业技术   42篇
冶金工业   156篇
自动化技术   49篇
  2023年   2篇
  2022年   6篇
  2021年   15篇
  2020年   6篇
  2019年   8篇
  2018年   10篇
  2017年   7篇
  2016年   18篇
  2015年   10篇
  2014年   16篇
  2013年   21篇
  2012年   19篇
  2011年   27篇
  2010年   12篇
  2009年   14篇
  2008年   12篇
  2007年   17篇
  2006年   18篇
  2005年   11篇
  2004年   22篇
  2003年   6篇
  2002年   12篇
  2001年   6篇
  2000年   9篇
  1999年   13篇
  1998年   73篇
  1997年   35篇
  1996年   20篇
  1995年   10篇
  1994年   4篇
  1993年   6篇
  1990年   1篇
  1987年   2篇
  1985年   1篇
  1984年   1篇
  1982年   2篇
  1981年   1篇
  1979年   1篇
  1977年   2篇
  1976年   6篇
排序方式: 共有482条查询结果,搜索用时 31 毫秒
1.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms.  相似文献   
2.
The prime characteristic of spread spectrum modulated signals is that their bandwidth is greater than the information rate. In this way a redundancy is introduced that allows the severe levels of inteference inherent in the transmission of digital information over radio and satellite links to be overcome. Current spread spectrum applications are primarily in military communications; nevertheless, there is growing interest in this technique for third generation mobile radio networks (UMTS, FPLTS, etc.) with open discussion regarding the practicality of using a multiple access system based on spread spectrum techniques (CDMA). However, in order to support as many users in the same bandwidth as other multiple access techniques such as TDMA or FDMA, it is important how to generate large families of sequences that present low cross-correlation. The aim of this paper is to describe a spreading codes generator that can produce a large number of PN sequences with good properties of auto- and cross-correlation. Moreover, the codes generated shows high unpredictability and good statistical behaviour. This also allows the implementation of some features that are common on military networks such as message privacy (increasingly important in commercial networks) without additional cost. The structure presented shows itself to be advantageous for high speed generation of codes at a low cost, low power consumption (allowing longer life for batteries), small size and simplicity of implementation, essential ingredients for commercial equipment. Another attractive feature is its structural parallelism, useful in VLSI implementations. All of these features render it potentially suitable for the implementation of channel bandwidth sharing systems in future wireless personal communications networks.  相似文献   
3.
The subventricular zone of the adult mammalian forebrain contains progenitor cells that, by migrating along a restricted pathway called the 'rostral migratory stream' (RMS), add new neurons to the olfactory bulb throughout life. To determine the influence of the olfactory bulb on the development of these progenitor cells, we performed lesions that interrupt this pathway and separate the olfactory bulb from the rest of the forebrain. By labelling cells born at several survival times after the lesions with the thymidine analogue bromodeoxyuridine (BrdU), we found that disconnection from the bulb influences the rate of BrdU incorporation by the progenitor cells. The number of labelled cells in lesioned mice was almost half that found in control mice. In the disconnected migratory pathway, the number of neurons expressing calretinin was increased indicating that neuronal differentiation was enhanced: newly born neurons occurred within and around the RMS, most of them expressed calretinin and left the pathway starting about 2 weeks after the lesion. Thereafter, these neurons preserving their phenotype, spread for long distances, and accumulated ectopically in dorsal regions of the anterior olfactory nucleus and the frontal cortex. Finally, transplantation of adult subventricular cells into the lesioned pathway showed that the lesion neither prevents neuronal migration nor alters its direction. Thus, although the olfactory bulb appears to regulate the pace of the developmental processes, its disconnection does not prevent the proliferation, migration and phenotypic acquisition of newly generated bulbar interneurons that, since they cannot reach their terminal domains, populate some precise regions of the lesioned adult forebrain.  相似文献   
4.
This paper examines the effects of exposure to mass media messages promoting family planning on the reproductive behaviour of married women in Nigeria using cross-sectional data. Longitudinal data are also used to ensure that exposure to media messages pre-dates the indicators of reproductive behaviour. Cross-sectional analysis suggests that: (1) contraceptive use and intention are positively associated with exposure to mass media messages, and (2) women who are exposed to media messages are more likely to desire fewer children than those who are not exposed to such messages. Similarly, analysis of the longitudinal data shows that exposure to mass media messages is a significant predictor of contraceptive use. Thus, exposure to mass media messages about family planning may be a powerful tool for influencing reproductive behaviour in Nigeria.  相似文献   
5.
The kaolinite-mullite reaction series in single crystal kaolinite has been characterized by transmission electron microscopy. The exotherm observed at 980° C is attributed to the formation of a spinel phase. Mullite crystallites have also been observed with the spinel phase and both phases have a composition near that of 32 mullite. Subsequent heat treatment leads to the growth of mullite crystallites on the original kaolinite plates with the c-axis perpendicular to the plate.  相似文献   
6.
Distributed and Parallel Databases - Given two datasets of points (called Query and Training), the Group (K) Nearest-Neighbor (GKNN) query retrieves (K) points of the Training with the smallest sum...  相似文献   
7.
Efficient and effective processing of the distance-based join query (DJQ) is of great importance in spatial databases due to the wide area of applications that may address such queries (mapping, urban planning, transportation planning, resource management, etc.). The most representative and studied DJQs are the K Closest Pairs Query (KCPQ) and εDistance Join Query (εDJQ). These spatial queries involve two spatial data sets and a distance function to measure the degree of closeness, along with a given number of pairs in the final result (K) or a distance threshold (ε). In this paper, we propose four new plane-sweep-based algorithms for KCPQs and their extensions for εDJQs in the context of spatial databases, without the use of an index for any of the two disk-resident data sets (since, building and using indexes is not always in favor of processing performance). They employ a combination of plane-sweep algorithms and space partitioning techniques to join the data sets. Finally, we present results of an extensive experimental study, that compares the efficiency and effectiveness of the proposed algorithms for KCPQs and εDJQs. This performance study, conducted on medium and big spatial data sets (real and synthetic) validates that the proposed plane-sweep-based algorithms are very promising in terms of both efficient and effective measures, when neither inputs are indexed. Moreover, the best of the new algorithms is experimentally compared to the best algorithm that is based on the R-tree (a widely accepted access method), for KCPQs and εDJQs, using the same data sets. This comparison shows that the new algorithms outperform R-tree based algorithms, in most cases.  相似文献   
8.
Melanoma is the most deathful of all skin cancers and the number of cases grows every year. The extirpation in early phases implies a high degree of survival so it is fundamental to diagnose it as soon as possible. In this paper we present a clinical decision support system for melanoma diagnosis using as input an image set of the skin lesion to be diagnosed. The system analyses the image sequence to extract the affected area, determinates the characteristics which indicate the degree of damage and, according to them, it makes a decision. Several methods of classification are proposed: a multilayered perceptron, a Bayesian classifier and the algorithm of the K nearest neighbours. These methods work independently and also in combination making a collaborative decision support system. The classification rates obtained are around 87%.  相似文献   
9.
The large increase of spam deliveries since the first half of 2013 entailed hard to solve troubles in spam filters. In order to adequately fight spam, the throughput of spam filtering platforms should be necessarily increased. In this context, and taking into consideration the widespread utilization of rule‐based filtering frameworks in the spam filtering domain, this work proposes three novel scheduling strategies for optimizing the time needed to classify new incoming e‐mails through an intelligent management of computational resources depending on the Central Processing Unit (CPU) usage and Input/Output (I/O) delays. In order to demonstrate the suitability of our approaches, we include in our experiments a comparative study in contrast to other successful heuristics previously published in the scientific literature. Results achieved demonstrated that one of our alternative heuristics allows time savings of up to 10% in message filtering, while keeping the same classification accuracy. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
10.
Laser Doppler velocimetry with polarization-bistable VCSELs   总被引:1,自引:0,他引:1  
We present a rate equation model of a single mode vertical-cavity surface-emitting laser (VCSEL) with two states of linear polarization, subject to Doppler-shifted optical feedback. Recent experimental work has shown that the polarization bistability often observed in VCSELs can be exploited to enhance the responsivity of these semiconductor lasers in speed-sensing applications. We review these experimental results briefly and use the rate equation model to explain the increased signal-to-noise ratio.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号