首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   243篇
  免费   13篇
  国内免费   1篇
电工技术   3篇
综合类   1篇
化学工业   20篇
金属工艺   1篇
机械仪表   7篇
建筑科学   12篇
能源动力   35篇
轻工业   14篇
水利工程   34篇
无线电   39篇
一般工业技术   38篇
冶金工业   11篇
原子能技术   1篇
自动化技术   41篇
  2023年   3篇
  2022年   4篇
  2021年   8篇
  2020年   8篇
  2019年   14篇
  2018年   14篇
  2017年   15篇
  2016年   16篇
  2015年   3篇
  2014年   15篇
  2013年   18篇
  2012年   20篇
  2011年   23篇
  2010年   16篇
  2009年   17篇
  2008年   18篇
  2007年   23篇
  2006年   5篇
  2005年   6篇
  2004年   3篇
  2003年   3篇
  2002年   1篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
排序方式: 共有257条查询结果,搜索用时 15 毫秒
1.
Samani  Saeideh  Vadiati  Meysam  Azizi  Farahnaz  Zamani  Efat  Kisi  Ozgur 《Water Resources Management》2022,36(10):3627-3647
Water Resources Management - Precise estimation of groundwater level (GWL) might be of great importance for attaining sustainable development goals and integrated water resources management....  相似文献   
2.
Decoding delay is an important consideration for the use of turbo codes in practical applications. We propose a new structure for turbo codes which is very suitable for parallel decoding. It is shown by union bound analysis and simulation results that the proposed system performance is comparable to that of the classical turbo codes  相似文献   
3.
Parallel test application helps reduce the otherwise considerable test times in SOCs; yet its applicability is limited by average and peak power considerations. The typical test vector loading techniques result in frequent transitions in the scan chain, which in turn reflect into significant levels of circuit switching unnecessarily. Judicious utilization of logic in the scan chain can help reduce transitions while loading the test vector needed. The transitions embedded in both test stimuli and the responses are handled through scan chain modifications consisting of logic gate insertion between scan cells as well as inversion of capture paths. No performance degradation ensues as these modifications have no impact on functional execution. To reduce average and peak power, we herein propose computationally efficient schemes that identify the location and the type of logic to be inserted. The experimental results confirm the significant reductions in test power possible under the proposed scheme.  相似文献   
4.
The capacity scaling of extended two-dimensional wireless networks is known in the high-attenuation regime, i.e., when the power path loss exponent alpha is greater than 4. This has been accomplished by deriving information-theoretic upper bounds for this regime that match the corresponding lower bounds. On the contrary, not much is known in the so-called low-attenuation regime when 2lesalphales4. (For one-dimensional networks, the uncharacterized regime is 1lesalphales2.5.) The dichotomy is due to the fact that while communication is highly power-limited in the first case and power-based arguments suffice to get tight upper bounds, the study of the low-attenuation regime requires a more precise analysis of the degrees of freedom involved. In this paper, we study the capacity scaling of extended wireless networks with an emphasis on the low-attenuation regime and show that in the absence of small scale fading, the low attenuation regime does not behave significantly different from the high attenuation regime.  相似文献   
5.
Ensuring a high manufacturing test quality of an integrated electronic circuit mandates the application of a large volume test set. Even if the test data can be fit into the memory of an external tester, the consequent increase in test application time reflects into elevated production costs. Test data compression solutions have been proposed to address the test time and data volume problem by storing and delivering the test data in a compressed format, and subsequently by expanding the data on-chip. In this paper, we propose a scan cell positioning methodology that accompanies a compression technique in order to boost the compression ratio, and squash the test data even further. While we present the application of the proposed approach in conjunction with the fan-out based decompression architecture, this approach can be extended for application along with other compression solutions as well. The experimental results also confirm the compression enhancement of the proposed methodology.  相似文献   
6.
Classification of brain hemorrhage computed tomography (CT) images provides a better diagnostic implementation for emergency patients. Attentively, each brain CT image must be examined by doctors. This situation is time-consuming, exhausting, and sometimes leads to making errors. Hence, we aim to find the best algorithm owing to a requirement for automatic classification of CT images to detect brain hemorrhage. In this study, we developed OzNet hybrid algorithm, which is a novel convolution neural networks (CNN) algorithm. Although OzNet achieves high classification performance, we combine it with Neighborhood Component Analysis (NCA) and many classifiers: Artificial neural networks (ANN), Adaboost, Bagging, Decision Tree, K-Nearest Neighbor (K-NN), Linear Discriminant Analysis (LDA), Naïve Bayes and Support Vector Machines (SVM). In addition, Oznet is utilized for feature extraction, where 4096 features are extracted from the fully connected layer. These features are reduced to have significant and informative features with minimum loss by NCA. Eventually, we use these classifiers to classify these significant features. Finally, experimental results display that OzNet-NCA-ANN excellent classifier model and achieves 100% accuracy with created Dataset 2 from Brain Hemorrhage CT images.  相似文献   
7.
While scan-based compression is widely utilized in order to alleviate the test time and data volume problems,the overall compression level is dictated not only by the chain to channel ratio but also the ratio of encodable patterns.Aggressively increasing the number of scan chains in an effort to raise the compression levels may reduce the ratio of encodable patterns,degrading the overall compression level.In this paper,we present various methods to improve the ratio of encodable patterns.These methods are b...  相似文献   
8.
The purpose of this study was to develop and apply the neural networks models to estimate daily pan evaporation (PE) for different climatic zones such as temperate and arid climatic zones, Republic of Korea and Iran. Three kinds of the neural networks models, namely multilayer perceptron-neural networks model (MLP-NNM), generalized regression neural networks model (GRNNM), and support vector machine-neural networks model (SVM-NNM), were used to estimate daily PE. The available climatic variables, consisted of mean air temperature (Tmean), mean wind speed (Umean), sunshine duration (SD), mean relative humidity (RHmean), and extraterrestrial radiation (Ra) were used to estimate daily PE using the various input combinations of climate variables. The measurements for the period of January 1985?CDecember 1990 (Republic of Korea) and January 2002?CDecember 2008 (Iran) were used for training and testing the employed neural networks models. The results obtained by SVM-NNM indicated that it performs better than MLP-NNM and GRNNM for estimating daily PE. A comparison was also made among the employed models, which demonstrated the superiority of MLP-NNM, GRNNM, and SVM-NNM over Linacre model and multiple linear regression model (MLRM).  相似文献   
9.
Cooperative transmissions have received recent attention and research papers have demonstrated their benefits for wireless networks. Such benefits include improving the reliability of links through diversity and/or increasing the reach of a link compared to a single transmitter transmitting to a single receiver (single-input single-output or SISO). In one form of cooperative transmissions, multiple nodes can act as virtual antenna elements and provide diversity gain or range improvement using space-time coding. In a multi-hop ad hoc or sensor network, a source node can make use of its neighbors as relays with itself to reach an intermediate node with greater reliability or at a larger distance than otherwise possible. The intermediate node will use its neighbors in a similar manner and this process continues till the destination is reached. Thus, for the same reliability of a link as SISO, the number of hops between a source and destination may be reduced using cooperative transmissions as each hop spans a larger distance. However, the presence of malicious or compromised nodes in the network impacts the benefits obtained with cooperative transmissions. Using more relays can increase the reach of a link, but if one or more relays are malicious, the transmission may fail. However, the relationships between the number of relays, the number of hops, and success probabilities are not trivial to determine. In this paper, we analyze this problem to understand the conditions under which cooperative transmissions fare better or worse than SISO transmissions. We take into consideration additional parameters such as the path-loss exponent and provide a framework that allows us to evaluate the conditions when cooperative transmissions are better than SISO transmissions. This analysis provides insights that can be employed before resorting to simulations or experimentation.  相似文献   
10.
Ozfatura  M. Emre  ElAzzouni  Sherif  Ercetin  Ozgur  ElBatt  Tamer 《Wireless Networks》2019,25(4):1931-1947
Wireless Networks - In this paper, we study a full-duplex cooperative cognitive radio network with multiple full-duplex secondary users acting as potential relays for transmitting the packets of a...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号