首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2727篇
  免费   38篇
  国内免费   9篇
电工技术   41篇
综合类   6篇
化学工业   590篇
金属工艺   44篇
机械仪表   58篇
建筑科学   158篇
矿业工程   23篇
能源动力   48篇
轻工业   258篇
水利工程   16篇
石油天然气   14篇
无线电   194篇
一般工业技术   347篇
冶金工业   560篇
原子能技术   26篇
自动化技术   391篇
  2021年   19篇
  2019年   23篇
  2018年   26篇
  2017年   17篇
  2016年   25篇
  2015年   26篇
  2014年   34篇
  2013年   133篇
  2012年   66篇
  2011年   95篇
  2010年   84篇
  2009年   102篇
  2008年   102篇
  2007年   99篇
  2006年   86篇
  2005年   79篇
  2004年   73篇
  2003年   79篇
  2002年   77篇
  2001年   62篇
  2000年   50篇
  1999年   63篇
  1998年   104篇
  1997年   76篇
  1996年   84篇
  1995年   47篇
  1994年   65篇
  1993年   42篇
  1992年   37篇
  1991年   34篇
  1990年   32篇
  1989年   33篇
  1988年   31篇
  1987年   39篇
  1986年   26篇
  1985年   30篇
  1984年   58篇
  1983年   52篇
  1982年   43篇
  1981年   36篇
  1980年   27篇
  1979年   41篇
  1978年   29篇
  1977年   49篇
  1976年   42篇
  1975年   40篇
  1974年   23篇
  1973年   27篇
  1972年   16篇
  1971年   18篇
排序方式: 共有2774条查询结果,搜索用时 15 毫秒
1.
The Two-Dimensional Clifford-Fourier Transform   总被引:1,自引:0,他引:1  
Recently several generalizations to higher dimension of the Fourier transform using Clifford algebra have been introduced, including the Clifford-Fourier transform by the authors, defined as an operator exponential with a Clifford algebra-valued kernel. In this paper an overview is given of all these generalizations and an in depth study of the two-dimensional Clifford-Fourier transform of the authors is presented. In this special two-dimensional case a closed form for the integral kernel may be obtained, leading to further properties, both in the L 1 and in the L 2 context. Furthermore, based on this Clifford-Fourier transform Clifford-Gabor filters are introduced. AMS subject classification numbers: 42B10, 30G35 Fred Brackx received a diploma degree in mathematics from Ghent University, Belgium, in 1970 and a Ph.D. degree in mathematics from the same university in 1973. Since 1984 he is professor for mathematical analysis at Ghent University and currently he is leading the Clifford Research Group. His main interests are function theory and functional analysis for functions with values in quaternion and Clifford algebras. The research covers Clifford distributions, generalized Fourier, Radon and Hilbert transforms, orthogonal polynomials and multi-dimensional wavelets. Nele De Schepper received a diploma degree in mathematics from Ghent University, Belgium, in 2001. Since then she holds an assistantship at the Department of Mathematical Analysis of Ghent University and is a member of the Clifford Research Group. Her main interests are function theory and functional analysis for functions with values in Clifford algebras. The research covers generalized Fourier transforms, orthogonal polynomials and multi-dimensional wavelets. Frank Sommen received a diploma degree in mathematics from Ghent University, Belgium, in 1978, a Ph.D. degree in mathematics from the same university in 1980, and a habilitation degree in mathematical analysis in 1984. From 1978 until 1999 he was at the National Fund for Scientific Research (Flanders). Since 2000 he holds a Research professorship at Ghent University. His main interests are function theory and functional analysis for functions with values in quaternion and Clifford algebras. The research covers Clifford distributions, generalized Fourier, Radon and Hilbert transforms, orthogonal polynomials and multi-dimensional wavelets, algebraic analysis, hyperfunctions and radial algebra.  相似文献   
2.
Currently there are design barriers inhibiting the implementation of high-precision digital signal processing (DSP) objects with field programmable logic (FPL) devices. This paper explores overcoming these barriers by fusing together the popular distributed arithmetic (DA) method with the residue number system (RNS) for use in FPL-centric designs. The new design paradigm is studied in the context of a high-performance filter bank and a discrete wavelet transform (DWT). The proposed design paradigm is facilitated by a new RNS accumulator structure based on a carry save adder (CSA). The reported methodology also introduces a polyphase filter structure that results in a reduced look-up table (LUT) budget. The 2C-DA and RNS-DA are compared, in the context of a FPL implementation strategy, using a discrete wavelet transform (DWT) filter bank as a common design theme. The results show that the RNS-DA, compared to a traditional 2C-DA design, enjoys a performance advantage that increases with precision (wordlength).  相似文献   
3.
In this paper we present a general strategy for finding efficient permutation routes in parallel networks. Among the popular parallel networks to which the strategy applies are mesh networks, hypercube networks, hypercube-derivative networks, ring networks, and star networks. The routes produced are generally congestion-free and take a number of routing steps that is within a small constant factor of the diameter of the network. Our basic strategy is derived from an algorithm that finds (in polynomial time) efficient permutation routes for aproduct network, G×H, given efficient permutation routes forG andH. We investigate the use of this algorithm for routingmultiple permutations and extend its applicability to a wide class of graphs, including several families ofCayley graphs. Finally, we show that our approach can be used to find efficient permutation routes among the remaining live nodes infaulty networks.This research was supported in part by a grant from the NSF, Grant No. CCR-88-12567.  相似文献   
4.
A new and simple method of finite-element grid improvement is presented. The objective is to improve the accuracy of the analysis. The procedure is based on a minimization of the trace of the stiffness matrix. For a broad class of problems this minimization is seen to be equivalent to minimizing the potential energy. The method is illustrated with the classical tapered bar problem examined earlier by Prager and Masur. Identical results are obtained.  相似文献   
5.
6.
Hypersonic flight powered by airbreathing engines offers the potential for faster response time at long ranges, and reduced cost for access-to-space. In the present paper the operating environment of typical hypersonic vehicles are discussed, including results for the radiation equilibrium wall temperature of external vehicle surfaces and the flow properties through three sample engines spanning the range of hydrocarbon-fueled Mach 4-8 flight and hydrogen-fueled flight at speeds up to Mach 17. Flow conditions at several locations through the sample engines were calculated to provide indications of the required operating flow environment. Additional system consideration such a seals, joints, vehicle integration and in-service engineering are addressed.  相似文献   
7.
IEEE Security & Privacy's associate editor in chief discusses technology's role in identity fraud and identity theft.  相似文献   
8.
The current study investigated the impact of requiring respondents to elaborate on their answers to a biodata measure on mean scores, the validity of the biodata item composites, subgroup mean differences, and correlations with social desirability. Results of this study indicate that elaborated responses result in scores that are much lower than nonelaborated responses to the same items by an independent sample. Despite the lower mean score on elaborated items, it does not appear that elaboration affects the size of the correlation between social desirability and responses to biodata items or that it affects criterion-related validity or subgroup mean differences in a practically significant way. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
9.
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
10.
Elder mistreatment, both abuse and neglect, is an important health care problem for women since they are involved as victims and as perpetrators. The incidence of both forms of such mistreatment is increasing, and both often occur within the context of long-term care. Elder abuse occurs in both unidirectional and dual directional forms, and includes parent abuse and spouse abuse. Elder neglect occurs in two forms; neglect by others and self-neglect. While elderly men and women are both neglected and/or abused, women may suffer greater physical and psychological consequences. To date, researchers have inadequately addressed the relevance of gender to both forms of elder mistreatment. This literature review addresses what is currently known about elder abuse and neglect that is of particular relevance to older women.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号