首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   325篇
  免费   18篇
  国内免费   1篇
电工技术   10篇
化学工业   94篇
金属工艺   7篇
机械仪表   7篇
建筑科学   9篇
矿业工程   1篇
能源动力   10篇
轻工业   9篇
水利工程   1篇
无线电   55篇
一般工业技术   49篇
冶金工业   33篇
原子能技术   2篇
自动化技术   57篇
  2024年   2篇
  2023年   3篇
  2022年   8篇
  2021年   3篇
  2020年   6篇
  2019年   5篇
  2018年   16篇
  2017年   6篇
  2016年   10篇
  2015年   4篇
  2014年   8篇
  2013年   13篇
  2012年   14篇
  2011年   10篇
  2010年   10篇
  2009年   17篇
  2008年   11篇
  2007年   15篇
  2006年   10篇
  2005年   11篇
  2004年   9篇
  2003年   6篇
  2002年   11篇
  2001年   4篇
  2000年   6篇
  1999年   6篇
  1998年   8篇
  1997年   6篇
  1996年   7篇
  1995年   9篇
  1994年   2篇
  1993年   3篇
  1992年   2篇
  1991年   5篇
  1990年   4篇
  1989年   4篇
  1988年   5篇
  1987年   6篇
  1986年   5篇
  1985年   11篇
  1984年   14篇
  1983年   5篇
  1982年   4篇
  1981年   3篇
  1979年   2篇
  1978年   4篇
  1977年   3篇
  1976年   2篇
  1975年   5篇
  1973年   1篇
排序方式: 共有344条查询结果,搜索用时 15 毫秒
1.
Computational fluid dynamics (CFD) models were employed to investigate flow conditions inside a model reactor in which yield stress non‐Newtonian liquid is mobilized using submerged recirculating jets. The simulation results agree well with the experimental results of active volume in the reactor obtained using flow visualization by the authors in a previous study. The models developed are capable of predicting a critical jet velocity (vc) that determines the extent of active volume obtained due to jet mixing. The vc values are influenced both by the rheological properties of the liquid and the nozzle orientation. The liquid with higher effective viscosity leads to higher vc for a downward facing injection nozzle. However, an upward facing injection nozzle along with a downward facing suction nozzle generates enhanced complementary flow fields which overcome the rheological constraints of the liquid and lead to lower vc.  相似文献   
2.
The technique of high pressure is utilized to study the carrier transport behaviour in doped and undoped bulk amorphous (GeSe3·5)100−x Bi x (x=0, 2, 4, 10) down to liquid nitrogen temperature to observe impurity induced modifications in amorphous semiconductors. It is observed that pressure induced effects in lightly doped (2 at % Bi) and heavily doped (x=4, 10) semiconductors are markedly different. Results are discussed in view of the incorporation behaviour of the bismuth impurity.  相似文献   
3.
Modulo scheduling theory can be applied successfully to overlap Fortran DO loops on pipelined computers issuing multiple operations per cycle both with and without special loop architectural support. This paper shows that a broader class of loops—REPEAT-UNTIL, WHILE, and loops with more than one exit, in which the trip count is not known beforehand—can also be overlapped efficiently on multiple-issue pipelined machines. The approach is described with respect to a specific machine model, but it can be extended to other models. Special features in the architecture, as well as compiler representations for accelerating these loop constructs, are discussed. Performance results are presented for a few select examples.An earlier version of this paper was presented at Supercomputing '90.  相似文献   
4.
Organic molecular scintillating crystals are noted for their good timing and particle discrimination process. Trans-stilbene is one such candidate noted for its good particle detection characteristics for the past five decades. Progressive strengthening of detection characteristics of trans-stilbene has been attempted by improving crystal perfection. A series of timing resolution studies have been carried out for the Bridgman grown trans-stilbene crystals under different experimental conditions. The results were compared with the previously reported values. Pulse shape discrimination process has been carried out for 241Am and 252Cf sources and good discrimination has been obtained for gamma-alpha and gamma-neutron sources from the grown organic phosphor crystal. Electronic Publication  相似文献   
5.
Theoretical Analysis of the Fiber Pullout and Pushout Tests   总被引:4,自引:0,他引:4  
The fiber pullout and pushout tests have been analyzed to predict the load-displacement behavior in terms of fiber/matrix interface parameters. The effects of residual axial strain in the fiber and fiber surface topography were included. The residual axial strain was found to be a significant parameter. It is shown that the interface failure can be progressive or catastrophic. In the case of a progressive failure of the interface, the load-displacement curve is nonlinear. The portion of the curve from above the first nonlinearity to near the peak load can be predicted in terms of parameters of the interface, viz., the friction coefficient, the radial stress at the interface, the fracture toughness of the interface, and the residual axial strain in the fiber. Values for these parameters can be obtained from a single loaddeflection curve. The peak load and load drop, which are usually reported, are found not to be directly relatable to any interface property, since the length of the last portion of the fiber to debond is influenced by end effects and hence not easily predicted. However, for data which describe the peak load as a function of initial embedded length, that factor can be eliminated and the data reduced to yield the relevant interface parameters. In pullout, the peak and friction loads saturate with large specimen thickness. Catastrophic failure is favored when the debond initiation load is high or when residual stress is low. Finally, a methodology to extract interface parameters from experimental data is suggested.  相似文献   
6.
Described is a reaction sequence for the total synthesis of lyso platelet activating factor (lysoPAF; 1-O-alkyl-sn-glycero-3-phosphocholine) and its enantiomer. The procedure is versatile and yields optically pure isomers of defined chain length. The synthesis is equally suited for the preparation of lysoPAF analogues and its enantiomers with unsaturation in the long aliphatic chain. First,rac-1(3)-O-alkylglycerol is prepared by alkylation ofrac-isopropylideneglycerol with alkyl methanesulfonate followed by acid-catalyzed removal of the ketal group. The primary hydroxy group of alkylglycerol is then protected by tritylation, the secondary hydroxy group is acylated, and the protective trityl group is removed under mild acidic conditions with boric acid on silicic acid, essentially without acyl migration. Condensation of the diradylglycerol with bromoethyl dichlorophosphate in diethyl ether, hydrolysis of the resulting chloride, and nucleophilic displacement of the bromine with trimethylamine givesrac-1-O-alkyl-2-acylglycero-3-phosphocholine in good overall yield. The racemic alkylacylglycerophosphocholine is finally treated with snake venom phospholipase A2 (Ophiophagus hannah) which affords 1-O-alkyl-sn-glycero-3-phosphocholine (lysoPAF) of natural configuration in optically pure form. The “unnatural” 3-O-alkyl-2-O-acyl-sn-glycerol-1-phosphocholine enantiomer, which is not susceptible to phospholipase A2 cleavage, gives 3-O-alkyl-sn-glycero-1-phosphocholine upon deacylation with methanolic sodium hydroxide. Homogeneity and structure of the intermediates and final products were ascertained by carbon-13 nuclear magnetic resonance spectroscopy on monomeric solutions.  相似文献   
7.
Standard genetic algorithms (SGAs) are investigated to optimise discrete-time proportional-integral-derivative (PID) controller parameters, by three tuning approaches, for a multivariable glass furnace process with loop interaction. Initially, standard genetic algorithms (SGAs) are used to identify control oriented models of the plant which are subsequently used for controller optimisation. An individual tuning approach without loop interaction is considered first to categorise the genetic operators, cost functions and improve searching boundaries to attain the desired performance criteria. The second tuning approach considers controller parameters optimisation with loop interaction and individual cost functions. While, the third tuning approach utilises a modified cost function which includes the total effect of both controlled variables, glass temperature and excess oxygen. This modified cost function is shown to exhibit improved control robustness and disturbance rejection under loop interaction.  相似文献   
8.
The aim of this paper is to design a current source obtained as a representation of p information symbols \(\{I_k\}\) so that the electromagnetic (EM) field generated interacts with a quantum atomic system producing after a fixed duration T a unitary gate U(T) that is as close as possible to a given unitary gate \(U_g\). The design procedure involves calculating the EM field produced by \(\{I_k\}\) and hence the perturbing Hamiltonian produced by \(\{I_k\}\) finally resulting in the evolution operator produced by \(\{I_k\}\) up to cubic order based on the Dyson series expansion. The gate error energy is thus obtained as a cubic polynomial in \(\{I_k\}\) which is minimized using gravitational search algorithm. The signal to noise ratio (SNR) in the designed gate is higher as compared to that using quadratic Dyson series expansion. The SNR is calculated as the ratio of the Frobenius norm square of the desired gate to that of the desired gate error.  相似文献   
9.
For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique, and then a stacking classifier was employed to ensemble multiple algorithms to predict various types of child abuse. The proposed approach successfully predicted crime types with 93% of accuracy, precision, recall, and F1-Score. The AUC value of the same was 0.989. However, when compared to the Extra Trees model (17.55), which is the second best, the proposed model’s execution time was significantly longer (476.63). We discovered that Machine Learning methods effectively evaluate the demographic and spatial-temporal characteristics of the crimes and predict the occurrences of various subtypes of child abuse. The results indicated that the proposed Borderline-SMOTE enabled Stacking Classifier model (BS-SC Model) would be effective in the real-time child abuse prediction and prevention process.  相似文献   
10.
We present polylogarithmic approximations for the R|prec|C max  and R|prec|∑ j w j C j problems, when the precedence constraints are “treelike”—i.e., when the undirected graph underlying the precedences is a forest. These are the first non-trivial generalizations of the job shop scheduling problem to scheduling with precedence constraints that are not just chains. These are also the first non-trivial results for the weighted completion time objective on unrelated machines with precedence constraints of any kind. We obtain improved bounds for the weighted completion time and flow time for the case of chains with restricted assignment—this generalizes the job shop problem to these objective functions. We use the same lower bound of “congestion + dilation”, as in other job shop scheduling approaches (e.g. Shmoys, Stein and Wein, SIAM J. Comput. 23, 617–632, 1994). The first step in our algorithm for the R|prec|C max  problem with treelike precedences involves using the algorithm of Lenstra, Shmoys and Tardos to obtain a processor assignment with the congestion + dilation value within a constant factor of the optimal. We then show how to generalize the random-delays technique of Leighton, Maggs and Rao to the case of trees. For the special case of chains, we show a dependent rounding technique which leads to a bicriteria approximation algorithm for minimizing the flow time, a notoriously hard objective function. A preliminary version of this paper appeared in the Proc. International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), pages 146–157, 2005. V.S. Anil Kumar supported in part by NSF Award CNS-0626964. Part of this work was done while at the Los Alamos National Laboratory, and supported in part by the Department of Energy under Contract W-7405-ENG-36. M.V. Marathe supported in part by NSF Award CNS-0626964. Part of this work was done while at the Los Alamos National Laboratory, and supported in part by the Department of Energy under Contract W-7405-ENG-36. Part of this work by S. Parthasarathy was done while at the Department of Computer Science, University of Maryland, College Park, MD 20742, and in part while visiting the Los Alamos National Laboratory. Research supported in part by NSF Award CCR-0208005 and NSF ITR Award CNS-0426683. Research of A. Srinivasan supported in part by NSF Award CCR-0208005, NSF ITR Award CNS-0426683, and NSF Award CNS-0626636.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号