首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4254篇
  免费   235篇
  国内免费   9篇
工业技术   4498篇
  2023年   20篇
  2022年   26篇
  2021年   78篇
  2020年   68篇
  2019年   79篇
  2018年   103篇
  2017年   95篇
  2016年   121篇
  2015年   107篇
  2014年   158篇
  2013年   274篇
  2012年   227篇
  2011年   291篇
  2010年   223篇
  2009年   181篇
  2008年   220篇
  2007年   202篇
  2006年   180篇
  2005年   150篇
  2004年   130篇
  2003年   116篇
  2002年   129篇
  2001年   61篇
  2000年   74篇
  1999年   67篇
  1998年   67篇
  1997年   83篇
  1996年   69篇
  1995年   69篇
  1994年   62篇
  1993年   43篇
  1992年   43篇
  1991年   38篇
  1990年   47篇
  1989年   40篇
  1988年   27篇
  1987年   26篇
  1986年   24篇
  1985年   40篇
  1984年   40篇
  1983年   37篇
  1982年   44篇
  1981年   33篇
  1980年   17篇
  1979年   28篇
  1978年   17篇
  1977年   18篇
  1976年   18篇
  1974年   15篇
  1970年   15篇
排序方式: 共有4498条查询结果,搜索用时 15 毫秒
91.
We present an efficient method for importance sampling the product of multiple functions. Our algorithm computes a quick approximation of the product on the fly, based on hierarchical representations of the local maxima and averages of the individual terms. Samples are generated by exploiting the hierarchical properties of many low-discrepancy sequences, and thresholded against the estimated product. We evaluate direct illumination by sampling the triple product of environment map lighting, surface reflectance, and a visibility function estimated per pixel. Our results show considerable noise reduction compared to existing state-of-the-art methods using only the product of lighting and BRDF.  相似文献   
92.
Search games are attractive for their correspondence with classical width parameters. For instance, the invisible search number (a.k.a. node search number) of a graph is equal to its pathwidth plus 1, and the visible search number of a graph is equal to its treewidth plus 1. The connected variants of these games ask for search strategies that are connected, i.e., at every step of the strategy, the searched part of the graph induces a connected subgraph. We focus on monotone search strategies, i.e., strategies for which every node is searched exactly once. The monotone connected visible search number of an n-node graph is at most O(logn) times its visible search number. First, we prove that this logarithmic bound is tight. Precisely, we prove that there is an infinite family of graphs for which the ratio monotone connected visible search number over visible search number is Ω(logn). Second, we prove that, as opposed to the non-connected variant of visible graph searching, “recontamination helps” for connected visible search. Precisely, we prove that, for any k4, there exists a graph with connected visible search number at most k, and monotone connected visible search number >k  相似文献   
93.
This paper introduces time stream Pétri nets (Ts treamPn), a model for the formal specification of multimedia synchronization scenarios. This new model extends time Pétri nets to formally describe the timed behaviour of multimedia objects and streams in asynchronous distributed systems. The proposed approach uses time intervals to label the arcs exiting from the places of the net, and typed transitions to define different firing rules. This model allows a complete and accurate specification of synchronization constraints between multimedia streams and can be used at different levels of granularity.  相似文献   
94.
We focus on termination proofs of rewrite systems, especially of rewrite systems containing associative and commutative operators. We prove their termination by elementary interpretations, more specifically, by functions defined by addition, multiplication and exponentiation. We discuss a method based on polynomial interpretations and propose an implementation of a mechanisation of the comparison of expressions built with polynomials and exponentials.  相似文献   
95.
碳化硅(SiC)器件的新特性和移动应用的功率密度要求给功率器件的封装技术提出了新的挑战。现有功率器件的封装技术主要是在硅基的绝缘栅双极晶体管(Insulated Gate Bipolar Transistor,IGBT)和金属氧化物半导体场效应晶体管(Metal Oxide Semiconductor Field Effect Transistor,MOSFET)等基础上发展起来的,并一直都在演进,但这些渐进改良尚不足以充分发挥SiC器件的性能,因而封装技术需要革命性的进步。在简述现有封装技术及其演进的基础上,主要从功率模块的角度讨论了封装技术的发展方向。同时讨论了功率模块的新型叠层结构以及封装技术的离散化、高温化趋势,并对SiC器件封装技术的发展方向做出了综合评估。  相似文献   
96.
Microsystem Technologies - This paper presents recent advances on two dimensional length-extension mode (2D-LEM) quartz resonators providing high quality (Q) factor on resonances at a few MHz. The...  相似文献   
97.
98.
Metallic conductive nanowires (NWs) with DNA bundle core are achieved, thanks to an original process relying on double‐stranded DNA alignment and physical vapor deposition (PVD) metallization steps involving a silicon substrate. First, bundles of DNA are suspended with a repeatable process between 2 µm high parallel electrodes with separating gaps ranging from 800 nm to 2 µm. The process consists in the drop deposition of a DNA lambda‐phage solution on the electrodes followed by a naturally evaporation step. The deposition process is controlled by the DNA concentration within the buffer solution, the drop volume, and the electrode hydrophobicity. The suspended bundles are finally metallized with various thicknesses of titanium and gold by a PVD e‐beam evaporation process. The achieved NWs have a width ranging from a few nanometers up to 100 nm. The electrical behavior of the achieved 60 and 80 nm width metallic NWs is shown to be Ohmic and their intrinsic resistance is estimated according to different geometrical models of the NW section area. For the 80 nm width NWs, a resistance of about few ohms is established, opening exploration fields for applications in microelectronics.  相似文献   
99.
100.
We investigate the ability to move of large objects—referred to as intruders—embedded in a granular material and subjected to cyclic loadings. A discrete element method is used to simulate the dynamics response of intruders subjected to a vertical uplift cyclic force, exploring a wide range of loading magnitudes and frequencies. The analysis of the intruder and grains displacements over many cycles reveals three mobility regimes. In the first two regimes, called confined and failure the intruder either do not significantly move or consistently moves upward after each cycles. We introduce a physically based model considering an inertial drag force to rationalise the existence of these regimes depending on the loading frequency and magnitude. We further evidence a third intermediate regime of creep, where intruder trajectories exhibit long periods of confinement punctuated by shorter periods of sustained uplift motion. Finally, we observe unexpected failures at low loading magnitudes and specific frequencies, which we attribute to a process of elasto-inertial resonance. These results highlight the important differences in the mobility of intruders upon constant and cyclic loadings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号