首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1108篇
  免费   70篇
  国内免费   48篇
电工技术   91篇
综合类   104篇
化学工业   63篇
金属工艺   9篇
机械仪表   23篇
建筑科学   94篇
矿业工程   28篇
能源动力   59篇
轻工业   5篇
水利工程   68篇
石油天然气   10篇
武器工业   8篇
无线电   109篇
一般工业技术   135篇
冶金工业   16篇
原子能技术   4篇
自动化技术   400篇
  2024年   2篇
  2023年   9篇
  2022年   10篇
  2021年   9篇
  2020年   19篇
  2019年   23篇
  2018年   26篇
  2017年   27篇
  2016年   23篇
  2015年   29篇
  2014年   36篇
  2013年   52篇
  2012年   73篇
  2011年   83篇
  2010年   64篇
  2009年   60篇
  2008年   65篇
  2007年   78篇
  2006年   80篇
  2005年   63篇
  2004年   69篇
  2003年   46篇
  2002年   45篇
  2001年   33篇
  2000年   43篇
  1999年   27篇
  1998年   12篇
  1997年   24篇
  1996年   13篇
  1995年   11篇
  1994年   6篇
  1993年   10篇
  1992年   7篇
  1991年   6篇
  1990年   9篇
  1989年   7篇
  1988年   6篇
  1987年   4篇
  1986年   4篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1978年   1篇
排序方式: 共有1226条查询结果,搜索用时 10 毫秒
1.
Sample pathwise numerical integration of noise-driven engineering dynamical systems cannot generally be performed beyond a limited level of accuracy, especially when the noise processes are modelled using (filtered) white noises. Recently, a locally transversal linearization (LTL) strategy has been proposed by the author (Proc Roy Soc London A 2001; 457 :539–566) for direct integration of deterministic and stochastic non-linear dynamical systems. The present effort is focussed on a host of extensions along with detailed theoretical error analyses of the linearization approach, especially as applied to problems in non-linear stochastic engineering dynamics. Thus, to begin with, estimates of local and global error orders in the basic LTL scheme are obtained separately for the displacement and velocity vectors when the system is driven either by a set of additive noises or by an arbitrary combination of (independently evolving) additive and multiplicative noises. Following this, a new family of higher-order LTL schemes is proposed in order to improve upon the basic LTL method and the associated error orders are established. A stepwise implementation of the lower- and higher-order versions of the LTL method, along with certain computational aspects, is also outlined. The proposed schemes are numerically illustrated, to a limited extent, for a single degree-of-freedom (SDOF) and a two degree-of-freedom (TDOF) non-linear engineering systems under additive and/or multiplicative white noise excitations. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
2.
In this work a new class of numerical methods for the BGK model of kinetic equations is presented. In principle, schemes of any order of accuracy in both space and time can be constructed with this technique. The methods proposed are based on an explicit–implicit time discretization. In particular the convective terms are treated explicitly, while the source terms are implicit. In this fashion even problems with infinite stiffness can be integrated with relatively large time steps. The conservation properties of the schemes are investigated. Numerical results are shown for schemes of order 1, 2 and 5 in space, and up to third-order accurate in time.  相似文献   
3.
Coordinating production and distribution of jobs with bundling operations   总被引:1,自引:0,他引:1  
We consider an integrated scheduling and distribution model in which jobs completed by two different machines must be bundled together for delivery. The objective is to minimize the sum of the delivery cost and customers' waiting costs. Such a model not only attempts to coordinate the job schedules on both machines, but also aims to coordinate the machine schedules with the delivery plan. Polynomial-time heuristics and approximation schemes are developed for the model with only direct shipments as well as the general model with milk-run deliveries.  相似文献   
4.
中国的三种非同步轨道卫星移动通信系统星座方案   总被引:6,自引:1,他引:5  
吴诗其  胡剑浩 《通信学报》1996,17(6):115-119
本文介绍基于我国的三种非同步轨道卫星移动通信系统星座方案:低、中轨系统各有24和18颗星,轨道高度分别为1326和8035km,两系统各以5°和30°的仰角对我国的覆盖率为99.78%和99.96%;椭圆轨道系统12颗星,近、远地点分别为427和2906km,以7°和15°仰角对我国北纬20°以上地区覆盖率分别为97.90%和89.61%,若增加4颗中轨卫星,以15°仰角对我国的覆盖率为99.99%。  相似文献   
5.
We present some new lower bounds on the optimal information rate and on the optimal average information rate of secret sharing schemes with homogeneous access structure. These bounds are found by using some covering constructions and a new parameter, the k-degree of a participant, that is introduced in this paper. Our bounds improve the previous ones in almost all cases.  相似文献   
6.
In the last three years or so we at Enterprise Platforms Group at Intel Corporation have been applying formal methods to various problems that arose during the process of defining platform architectures for Intel's processor families. In this paper we give an overview of some of the problems we have worked on, the results we have obtained, and the lessons we have learned. The last topic is addressed mainly from the perspective of platform architects.  相似文献   
7.
在非AWGN环境下,针对CW,AM,FM,OOK,PSK,QPSK,16QAM,FSK,MSK,SSB十种混合调制信号,对调制类型特征提取方法和自动识别算法进行了分析、综合、设计和计算机仿真。提出了梯层电平分析方法、频率瞬时信号分析、剔除载波的归一化能量分析、平方后信号的频谱分析、四次方后的信号频谱分析等方法。当SNR=10dB时,计算机仿真结果是正确识别率不低于95%,自动识别的平均处理时间为不超过10s。  相似文献   
8.
The concept of the combinatorial matrix of an unrestricted code and the notion of anr-partition design admitted by a code are introduced and discussed in detail. The theory includes a characterization of completely regular codes, and a combinatorial interpretation of the fact that the distinct rows of the distance distribution matrix of a code are linearly independent. In general, it is possible to compute the distance distribution matrix of any code admitting a given partition design by solving a well-defined system of linear equations; this is an efficient technique provided the number of classes in the partition is relatively small.  相似文献   
9.
Broadcasting is the process of spreading one piece of information among a group of individuals connected by an interconnection network. In this paper we give exact lower and upper bounds for the number of broadcast schemes in arbitrary networks. Also, we give the exact value for complete bipartite graphs and an upper bound for regular networks. Based on the counting method we describe a new random algorithm for broadcasting in networks.  相似文献   
10.
Threshold cryptography based on Asmuth-Bloom secret sharing   总被引:1,自引:0,他引:1  
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号