首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   337篇
  免费   11篇
电工技术   4篇
化学工业   73篇
机械仪表   2篇
建筑科学   9篇
能源动力   4篇
轻工业   31篇
水利工程   1篇
石油天然气   2篇
无线电   39篇
一般工业技术   65篇
冶金工业   66篇
原子能技术   2篇
自动化技术   50篇
  2023年   3篇
  2022年   21篇
  2021年   22篇
  2020年   4篇
  2019年   5篇
  2018年   7篇
  2017年   3篇
  2016年   2篇
  2015年   8篇
  2014年   11篇
  2013年   15篇
  2012年   19篇
  2011年   15篇
  2010年   8篇
  2009年   15篇
  2008年   15篇
  2007年   12篇
  2006年   14篇
  2005年   8篇
  2004年   5篇
  2003年   13篇
  2002年   6篇
  2001年   6篇
  2000年   5篇
  1999年   12篇
  1998年   24篇
  1997年   14篇
  1996年   9篇
  1995年   8篇
  1994年   7篇
  1993年   5篇
  1992年   2篇
  1991年   3篇
  1990年   2篇
  1989年   2篇
  1986年   1篇
  1985年   1篇
  1983年   3篇
  1981年   2篇
  1980年   1篇
  1978年   1篇
  1977年   2篇
  1976年   5篇
  1971年   1篇
  1966年   1篇
排序方式: 共有348条查询结果,搜索用时 15 毫秒
1.
First-order polarization-mode dispersion (PMD) compensation by means of a polarization controller and a differential delay line is not sufficient to guarantee error-free transmission for 40-Gb/s channels when higher order effects severely increase signal distortion. Higher order mitigation is possible by cascading more than one first-order block. However, only two-stage or three-stage devices remain simple enough to be actually controlled. The performance of such higher order PMD compensators is evaluated by means of numerical simulations. Two different feedback signals have been used, demonstrating that first-order and higher order PMD distortion of nonreturn-to-zero (NRZ) pulses at 40 Gb/s can be strongly mitigated for instantaneous values of the differential group delay (DGD) up to the bit slot, when the compensator is properly controlled.  相似文献   
2.
For pt. I see ibid., p. 102-19. In this part of the paper the authors concentrate on the unique diversification role of the crossover operator in genetic algorithms. The explorative behavior of a generic crossover operator is revealed through a detailed large-sample analysis. Recursive equations for the population distributions are derived for a uniform crossover operator in multi-dimensional continuous space, showing how the crossover operator probes new regions of the solution space while keeping the population within the feasible region. The results of this analysis can be extended to the setting of a discrete space in a straightforward manner, shedding much light on the understanding of the essential role of crossover in genetic algorithms.  相似文献   
3.
A coal-oil mixture (COM) was prepared from a South African coal and a synthetic oil derived from the same coal by hydroliquefaction. The settling and rheological properties of this mixture were compared with those of a mixture of the same coal with fuel oil. The synthetic oil mixture showed greater settling stability, comparable with that of a commercial COM containing additives. The increased stability may be related to polar compounds present in the oil and on the coal surface.  相似文献   
4.
We consider the two Wai-Menyuk models of birefringence in periodically spun fibers, and we show that the differential group delay differs significantly for the two models when the spin period approaches or exceeds the fiber beat length. When the fiber correlation length is large, we explain this difference quantitatively, and we explain it qualitatively for any fiber correlation length.  相似文献   
5.
Summary Ready‐to‐eat breakfast cereals immersed in milk undergo undesirable changes in texture because of sudden moisture uptake. The textural changes are ascribable to a plasticizing effect of water, which modifies the mechanical strength of products by softening the starch/protein matrix. In this work, some textural parameters of different cereal flakes were derived from the force–displacement curves monitored during 300 s of immersion in milk. Hardness loss, deformability increment and changes in the force–displacement curve profile were calculated and plotted against soaking time. The application of a sugar coating process to a model cereal flake increased the initial product hardness and improved the preservation of the textural parameters during immersion. The Peleg model closely fitted the experimental data, with regression coefficients from 0.967 to 0.999.  相似文献   
6.
This paper presents a completely new method able to characterize polarization mode dispersion (PMD) properties of randomly birefringent single-mode fibers, using polarization sensitive backscattering technique. We show analytical relationships between evolution of polarization state of backscattered signal with respect to state of polarization of forward one. Our technique allows one to measure differential group delay, beat length, and correlation length at the same time over long single-mode fibers using only one fiber end. Experimental data fit very well with numerical results, confirming the capability of our technique for fast routine characterization of PMD during cabling, before and after installation  相似文献   
7.
8.
As widely acknowledged, 40–50% of all melanoma patients harbour an activating BRAF mutation (mostly BRAF V600E). The identification of the RAS–RAF–MEK–ERK (MAP kinase) signalling pathway and its targeting has represented a valuable milestone for the advanced and, more recently, for the completely resected stage III and IV melanoma therapy management. However, despite progress in BRAF-mutant melanoma treatment, the two different approaches approved so far for metastatic disease, immunotherapy and BRAF+MEK inhibitors, allow a 5-year survival of no more than 60%, and most patients relapse during treatment due to acquired mechanisms of resistance. Deep insight into BRAF gene biology is fundamental to describe the acquired resistance mechanisms (primary and secondary) and to understand the molecular pathways that are now being investigated in preclinical and clinical studies with the aim of improving outcomes in BRAF-mutant patients.  相似文献   
9.
Sensitivity analysis studies how the variation in model outputs can be due to different sources of variation. This issue is addressed, in this study, as an application of sensitivity analysis techniques to a crop model in the Mediterranean region. In particular, an application of Morris and Sobol' sensitivity analysis methods to the rice model WARM is presented. The output considered is aboveground biomass at maturity, simulated at five rice districts of different countries (France, Greece, Italy, Portugal, and Spain) for years characterized by low, intermediate, and high continentality. The total effect index of Sobol' (that accounts for the total contribution to the output variation due a given parameter) and two Morris indices (mean μ and standard deviation σ of the ratios output changes/parameter variations) were used as sensitivity metrics. Radiation use efficiency (RUE), optimum temperature (Topt), and leaf area index at emergence (LAIini) ranked in most of the combinations site × year as first, second and third most relevant parameters. Exceptions were observed, depending on the sensitivity method (e.g. LAIini resulted not relevant by the Morris method), or site-continentality pattern (e.g. with intermediate continentality in Spain, LAIini and Topt were second and third ranked; with low continentality in Portugal, RUE was outranked by Topt). Low σ values associated with the most relevant parameters indicated limited parameter interactions. The importance of sensitivity analyses by exploring site × climate combinations is discussed as pre-requisite to evaluate either novel crop-modelling approaches or the application of known modelling solutions to conditions not explored previously. The need of developing tools for sensitivity analysis within the modelling environment is also emphasized.  相似文献   
10.
In the last years, the interest in methods and techniques for circumventing the security of the available digital video broadcasting systems is continuously increasing. Digital TV providers are struggling to restrict access to their video contents only to authorized users, by deploying more and more sophisticated conditional access systems. At the state-of-the-art, the most significant menace is the card-sharing activity which exploits a known weakness allowing an authorized subscriber to provide access to digital contents to a potentially large group of unauthorized ones connected over a communication network. This is usually realized by using ad hoc customized devices. Detecting the presence of these illegal systems on a network, by recognizing their related traffic is an issue of primary importance. Unfortunately, to avoid the identification of such traffic, payload obfuscation strategies based on encryption are often used, hindering packet inspection techniques.This paper presents a strategy for the detection of card-sharing traffic, empowered by machine-learning-driven traffic classification techniques and based on the natural capability of wavelet analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas have been used for the proof-of-concept implementation of an SVM-based binary classification scheme that relies only on time regularities of the traffic and not on the packet contents and hence is immune to payload obfuscation techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号