首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   680篇
  免费   32篇
  国内免费   2篇
电工技术   10篇
综合类   1篇
化学工业   155篇
金属工艺   11篇
机械仪表   13篇
建筑科学   21篇
矿业工程   5篇
能源动力   41篇
轻工业   54篇
水利工程   6篇
石油天然气   2篇
无线电   75篇
一般工业技术   164篇
冶金工业   52篇
原子能技术   1篇
自动化技术   103篇
  2024年   1篇
  2023年   13篇
  2022年   21篇
  2021年   30篇
  2020年   18篇
  2019年   25篇
  2018年   28篇
  2017年   38篇
  2016年   36篇
  2015年   22篇
  2014年   31篇
  2013年   68篇
  2012年   32篇
  2011年   36篇
  2010年   37篇
  2009年   27篇
  2008年   26篇
  2007年   28篇
  2006年   13篇
  2005年   20篇
  2004年   9篇
  2003年   8篇
  2002年   15篇
  2001年   17篇
  2000年   11篇
  1999年   10篇
  1998年   9篇
  1997年   12篇
  1996年   8篇
  1995年   6篇
  1994年   4篇
  1993年   3篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1987年   4篇
  1986年   3篇
  1985年   6篇
  1984年   5篇
  1983年   4篇
  1982年   6篇
  1981年   3篇
  1980年   3篇
  1979年   1篇
  1978年   5篇
  1977年   3篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
排序方式: 共有714条查询结果,搜索用时 15 毫秒
1.
On the SEP of Cooperative Diversity with Opportunistic Relaying   总被引:1,自引:0,他引:1  
We analyze the exact symbol error probability (SEP) of cooperative diversity with opportunistic amplify-and-forward (AF) relaying. The benefit of this opportunism to the SEP is assessed by comparing with maximal ratio combining of orthogonal multiple AF relay transmissions.  相似文献   
2.
The rise of Web 2.0 is signaled by sites such as Flickr, del.icio.us, and YouTube, and social tagging is essential to their success. A typical tagging action involves three components, user, item (e.g., photos in Flickr), and tags (i.e., words or phrases). Analyzing how tags are assigned by certain users to certain items has important implications in helping users search for desired information. In this paper, we develop a dual mining framework to explore tagging behavior. This framework is centered around two opposing measures, similarity and diversity, applied to one or more tagging components, and therefore enables a wide range of analysis scenarios such as characterizing similar users tagging diverse items with similar tags or diverse users tagging similar items with diverse tags. By adopting different concrete measures for similarity and diversity in the framework, we show that a wide range of concrete analysis problems can be defined and they are NP-Complete in general. We design four sets of efficient algorithms for solving many of those problems and demonstrate, through comprehensive experiments over real data, that our algorithms significantly out-perform the exact brute-force approach without compromising analysis result quality.  相似文献   
3.
This paper reports on the experimental investigation carried out to evaluate fractional dispersed phase holdup for a gas‐liquid mixture in a modified multi‐stage bubble column (with contraction and expansion disks), which has been conceived, designed and fabricated as a wet scrubber for control of air pollution; in addition it has versatile use as a gas‐liquid contactor in chemical process industries. A correlation developed for predicting fractional dispersed phase holdup has been found to be encouraging and highly significant from statistical analysis.  相似文献   
4.
Spatiotemporal deformations of the free charged surface of a thin electrolyte film undergoing a coupled electrokinetic flow composed of an electroosmotic flow (EOF) on a charged solid substrate and an electrophoretic flow (EPF) at its free surface are explored through linear stability analysis and the long-wave nonlinear simulations. The nonlinear evolution equation for the deforming surface is derived by considering both the Maxwell’s stresses and the hydrodynamic stresses. The electric potential across the film is obtained from the Poisson–Boltzmann equation under the Debye–Hückel approximation. The simulations show that at the charged electrolyte–air interface, the applied electric field generates an EPF similar to that of a large charged particle. The EOF near the solid–electrolyte interface and the EPF at the electrolyte–air interface are in the same (or opposite) directions when the zeta potentials at the two interfaces are of the opposite (or same) signs. The linear and nonlinear analyses of the evolution equation predict the presence of travelling waves, which is strongly modulated by the applied electric field and the magnitude/sign of the interface zeta potentials. The time and length scales of the unstable modes reduce as the sign of zeta potential at the two interfaces is varied from being opposite to same and also with the increasing applied electric field. The increased destabilization is caused by a reverse EPF near the free surface when the interfaces bear the same sign of zeta potentials. Flow reversal by EPF at the free surface occurs at smaller zeta potential of the free surface when the film is thicker because of less influence of the EOF arising at the solid–electrolyte boundary. The amplitude of the surface waves is found to be smaller when the unstable waves travel at a faster speed. The films can undergo pseudo-dewetting when the free surface is almost stationary under the combined influences of EPF and EOF. The free surface instability of the coupled EOF and EPF has some interesting implications in the development of micro/nano fluidic devices involving a free surface.  相似文献   
5.
6.
As we live in a culture where “everything can be commodified, measured and calculated and can be put in the competitive market for sale, detached from its roots and purpose,” there is need to redefine our humanness in terms of the changing nature of science, technology, and their deeper impact on human life. More than anything else, it is Information Technology that now has tremendous influence on all spheres of our life, and in a sense, IT has become the destiny of our life. And this is where the real trauma lies. On the one hand, our being in the cyberspace opens up new and exciting horizons before us; on the other hand, we ourselves are changed and transformed in the process. The virtual world transforms human users to a problem-solver technocrat. The speed at which Information Technology is changing the way that youth around the world are socializing, playing, and researching, it is the common practice now for a 15-year old to go home and update their MySpace page, followed by playing online games, or looking up the new trendy YouTube video. These forms of technology are often the topic of adolescent conversations as YouTube, blogs, e-magazines, Face book, MySpace, iPhones, and iPods dominate the commercial and social networking market. Some researchers refer to this phenomenon as ubiquitous technology drawing attention to the fact that ubiquitous technology acknowledges the speedy adoption of day-to-day use of technology as a global phenomenon. In this background, this article aims at revisiting the question, “What is to be human in the era of Ubiquitous Technology?” From a feminist perspective, one can still redefine the boundaries between femininity and masculinity in the context of IT and its impact on our lifestyle and thought style. While examining the ways in which our definitions of “woman” and “man” are shifting in this new communication environment, Elizabeth Lane Lawley observes that we cannot fix a single center from which the experiences of women with computer and communication systems can be viewed and that such fixity would only serve to deepen inequities rather than exposing and removing them. She finally submits, “It is possible to use new theoretical perspectives on the shifting boundaries of gender definitions to rethink a previously deterministic view of the effect of new technologies on society, and particularly the effect of those technologies on women. While the gradual absence of the subject from the field of Artificial Intelligence leads to the invisibility of feminine care along with social and relational nature of man, some feminists dismiss the biological sex distinction on such issues and encourage females to ‘imitate man’ and to become more aggressive, assertive and dominating” (Lawley 1993). What are the possible impacts of this new technology on the so-called feminine traits of our human nature? How far our definitions of “woman” and “man” are shifting in this new communication environment? This is what this article seeks to explore.  相似文献   
7.
A novel bioactive, porous silica–calcium phosphate nanocomposite (SCPC) that can be used to treat large bone defects in load-bearing positions has been tested and has shown great potential for applications in tissue engineering. Porosity is essential to the performance of the composite material as a tissue engineering scaffold, as porous scaffolds provide a physical, 3-D template to support new tissue formation. However, porosity characterization using conventional techniques such as porosimetry or scanning electron microscopy requires extensive preparation of samples and may destroy important features during preparation and analysis stage. In this work, the new composite is characterized using an advanced high resolution X-ray computed tomography, which is a non-destructive testing technique that allows construction of the 3-D topology of the microstructure. The results clearly show the effectiveness and versatility of this technique in characterizing the porous architecture of the novel composite biomaterial. The pore distribution, morphology and interconnectivity in the composite scaffolds were found to be ideal for use in tissue engineering applications.  相似文献   
8.
The single server queue with vacation has been extended to include several types of extensions and generalisations, to which attention has been paid by several researchers (e.g. see Doshi, B. T., Single server queues with vacations — a servey. Queueing Systems, 1986, 1, 29–66; Takagi, H., Queueing Analysis: A Foundation of Performance evaluation, Vol. 1, Vacation and Priority systems, Part. 1. North Holland, Amsterdam, 1991; Medhi, J., Extensions and generalizations of the classical single server queueing system with Poisson input. J. Ass. Sci. Soc., 1994, 36, 35–41, etc.). The interest in such types of queues have been further enhanced in resent years because of their theoretical structures as well as their application in many real life situations such as computer, telecommunication, airline scheduling as well as production/inventory systems. This paper concerns the model building of such a production/inventory system, where machine undergoes extra operation (such as machine repair, preventive maintenance, gearing up machinery, etc.) before the processing of raw material is to be started. To be realistic, we also assume that raw materials arrive in batch. This production system can be formulated as an Mx/M/1 queues with a setup time. Further, from the utility point of view of idle time this model can also be formulated as a case of multiple vacation model, where vacation begins at the end of each busy period. Besides, the production/inventory systems, such a model is generally fitted to airline scheduling problems also. In this paper an attempt has been made to study the steady state behavior of such an Mx/M/1 queueing system with a view to provide some system performance measures, which lead to remarkable simplification when solving other similar types of queueing models.This paper deals with the steady state behaviour of a single server batch arrival Poisson queue with a random setup time and a vacation period. The service of the first customer in each busy period is preceded by a random setup period, on completion of which service starts. As soon as the system becomes empty the server goes on vacation for a random length of time. On return from vacation, if he finds customer(s) waiting, the server starts servicing the first customer in the queue. Otherwise it takes another vacation and so on. We study the steady state behaviour of the queue size distribution at random (stationary) point of time as well as at departure point of time and try to show that departure point queue size distribution can be decomposed into three independent random variables, one of which is the queue size of the standard Mx/M/1 queue. The interpretation of the other two random variables will also be provided. Further, we derive analytically explicit expressions for the system state (number of customers in the system) probabilities and provide their appropriate interpretations. Also, we derive some system performance measures. Finally, we develop a procedure to find mean waiting time of an arbitrary customer.  相似文献   
9.
The increasing gap in performance between processors and main memory has made effective instructions prefetching techniques more important than ever. A major deficiency of existing prefetching methods is that most of them require an extra port to I-cache. A recent study by Rivers et al. [19] shows that this factor alone explains why most modern microprocessors do not use such hardware-based I-cache prefetch schemes. The contribution of this paper is two-fold. First, we present a method that does not require an extra port to I-cache. Second, the performance improvement for our method is greater than the best competing method BHGP [23] even disregarding the improvement from not having an extra port. The three key features of our method that prevent the above deficiencies are as follows. First, late prefetching is prevented by correlating misses to dynamically preceding instructions. For example, if the I-cache miss latency is 12 cycles, then the instruction that was fetched 12 cycles prior to the miss is used as the prefetch trigger. Second, the miss history table is kept to a reasonable size by grouping contiguous cache misses together and associated them with one preceding instruction, and therefore, one table entry. Third, the extra I-cache port is avoided through efficient prefetch filtering methods. Experiments show that for our benchmarks, chosen for their poor I-cache performance, an average improvement of 9.2% in runtime is achieved versus the BHGP methods [23], while the hardware cost is also reduced. The improvement will be greater if the runtime impact of avoiding an extra port is considered. When compared to the original machine without prefetching, our method improves performance by about 35% for our benchmarks.  相似文献   
10.
Duden T  Gautam A  Dahmen U 《Ultramicroscopy》2011,111(11):1574-1580
This article describes a novel software tool, the KSpaceNavigator, which combines sample stage and crystallographic coordinates in a control sphere. It also provides simulated kinematic diffraction spot patterns, Kikuchi line patterns and a unit cell view in real time, thus allowing intuitive and transparent navigation in reciprocal space. By the overlay of experimental data with the simulations and some interactive alignment algorithms, zone axis orientations of the sample can be accessed quickly and with great ease. The software can be configured to work with any double-tilt or tilt–rotation stage and overcomes nonlinearities in existing goniometers by lookup tables. A subroutine for matching the polyhedral shape of a nanoparticle assists with 3D analysis and modeling. The new possibilities are demonstrated with the case of a faceted BaTiO3 nanoparticle, which is tilted into three low-index zone axes using the piezo-controlled TEAM stage, and with a multiply twinned tetrahedral Ge precipitate in Al, which is tilted into four equivalent zone axes using a conventional double-tilt stage. Applications to other experimental scenarios are also outlined.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号