首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   302篇
  免费   8篇
电工技术   1篇
化学工业   33篇
金属工艺   10篇
机械仪表   7篇
建筑科学   26篇
能源动力   14篇
轻工业   34篇
水利工程   1篇
无线电   31篇
一般工业技术   27篇
冶金工业   13篇
自动化技术   113篇
  2023年   2篇
  2021年   1篇
  2020年   2篇
  2019年   4篇
  2018年   12篇
  2017年   6篇
  2016年   8篇
  2015年   8篇
  2014年   8篇
  2013年   21篇
  2012年   12篇
  2011年   28篇
  2010年   9篇
  2009年   23篇
  2008年   18篇
  2007年   20篇
  2006年   17篇
  2005年   11篇
  2004年   10篇
  2003年   7篇
  2002年   12篇
  2001年   7篇
  2000年   9篇
  1999年   4篇
  1998年   5篇
  1997年   3篇
  1996年   6篇
  1995年   5篇
  1994年   4篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1990年   6篇
  1989年   3篇
  1988年   2篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1976年   1篇
  1960年   2篇
  1926年   2篇
  1924年   3篇
排序方式: 共有310条查询结果,搜索用时 552 毫秒
1.
The main result of the paper is the use of orthogonal Hermite polynomials as the basis functions of feedforward neural networks. The proposed neural networks have some interesting properties: (i) the basis functions are invariant under the Fourier transform, subject only to a change of scale, (ii) the basis functions are the eigenstates of the quantum harmonic oscillator, and stem from the solution of Schrödinger's diffusion equation. The proposed feed-forward neural networks demonstrate the particle-wave nature of information and can be used in nonparametric estimation. Possible applications of the proposed neural networks include function approximation, image processing and system modelling.  相似文献   
2.
3.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
4.
An effective way to in situ monitor the metalorganic chemical vapor deposition (MOCVD) of HgCdTe/CdTe/ZnTe on GaAs or GaAs/Si substrates is presented. Specular He-Ne laser reflectance was used to in situ monitor the growth rates, layer thickness, and morphology for each layer in the grown multilayer structure. In situ monitoring has enabled precise measurements of ZnTe nucleation and CdTe buffer layer thicknesses. Monitoring the constancy of reflectance during the thicker CdTe buffer growth where absorption in the CdTe reduces reflectance to just the surface component has led to optimum buffer growth ensuring good quality of subsequently grown HgCdTe. During the interdiffused multilayer process (IMP) HgCdTe growth, because multiple interfaces are present within the absorption length, a periodic reflectance signal is maintained throughout this growth cycle. A theoretical model was developed to extract IMP layer thicknesses from in situ recorded experimental data. For structures that required the growth of a larger band gap HgCdTe cap layer on top of a smaller band gap active layer, in situ monitored reflectance data allowed determination of alloy composition in the cap layer as well. Continuous monitoring of IMP parameters established the stability of growth conditions, translating into depth uniformity of the grown material, and allowed diagnosis of growth rate instabilities in terms of changes in the HgTe and CdTe parts of the IMP cycle. A unique advantage of in situ laser monitoring is the opportunity to perform “interactive” crystal growth, a development that is a key to real time MOCVD HgCdTe feedback growth control.  相似文献   
5.
In this report electrostatic force microscopy (EFM) is used to study different peptide self-assembled structures such as tubes and particles. It is shown that not only geometrical information can be obtained using EFM, but also information about the composition of different structures. In particular we use EFM to investigate the structures of diphenylalanine peptide tubes, particles, and CSGAITIG peptide particles placed on pre-fabricated SiO(2) surfaces with a backgate. We show that the cavity in the peptide tubes could be due to the presence of water residues. Additionally we show that self-assembled amyloid peptides form spherical solid structures containing the same self-assembled peptide in its interior. In both cases transmission electron microscopy is used to verify these structures. Further, the limitations of the EFM technique are discussed, especially when the observed structures become small compared with the radius of the AFM tip used. Finally, an agreement between the detected signal and the structure of the hollow peptide tubes is demonstrated.  相似文献   
6.
Linear Feedback Shift Registers (LFSRs) constitute a very efficient mechanism for generating pseudoexhaustive or pseudo-random test sets for the built-in self-testing of digital circuits. However, a well-known problem with the use of LFSRs is the occurrence of linear dependencies in the generated patterns. In this paper, we show for the first time that the amount of linear dependencies can be controlled by selecting appropriate characteristic polynomials and reordering the LFSR cells. We identify two classes of such polynomials which, by appropriate LFSR cell ordering, guarantee that a large ratio of linear dependencies cannot occur. Experimental results show significant enhancements on the fault coverage for pseudo-random testing and support the theoretical relation between minimization of linear dependencies and effective fault coverage.This work was partially supported by NSF grant MIP-9409905, a 1993–94 ACM/IEEE Design Automation Scholarship and a grant from Nissan Corporation. A preliminary version of this work appeared in A Class of Good Characteristic Polynomials for LFSR Test Pattern Generators, in Proc. of IEEE International Conference on Computer Design, Oct. 1994, pp. 292–295, where it received the ICCD'94 Best Paper Award.  相似文献   
7.
Borodin, Nielsen and Rackoff [13] introduced the class of priority algorithms as a framework for modeling deterministic greedy-like algorithms. In this paper we address the effect of randomization in greedy-like algorithms. More specifically, we consider approximation ratios within the context of randomized priority algorithms. As case studies, we prove inapproximation results for two well-studied optimization problems, namely facility location and makespan scheduling.  相似文献   
8.
In this paper a switching fuzzy logic controller for mobile robots with a bounded curvature constraint is presented. The controller tracks piece-wise linear paths, which are an approximation of the feasible smooth reference path. The controller is constructed through the use of a map, which transforms the problem to a simpler one; namely the tracking of straight lines. This allows the use of an existing fuzzy tracker deployed in a previous work, and its simplification leading to a 70% rule reduction. Simulation results and a comparison analysis with existing trackers are also presented along with some stability considerations on the impulsive error dynamics which emerge.  相似文献   
9.
The sophisticated method for mathematical modeling of humanoid robots formulated in Part 1 of this paper is applied here to the dynamic task of keeping a posture under disturbance, which is equally important to humans and humanoid robots. The idea of this work is to develop and realize a simulator tool for dynamic analysis of human-or-humanoid behavior under disturbances. To show the potentials and verify this tool, we comparatively analyze the robustness of some postures to external disturbance. At this stage of research we do not conduct real experiments with humans/humanoids but try to verify our simulation tool by relying on available experience. Therefore, the postures for comparison are taken from everyday life and from sports: upright standing, squat posture, and three karate postures. As the external disturbance we choose an impulse and a permanent force, both with variable direction and magnitude.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号