首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   67篇
  免费   0篇
电工技术   1篇
化学工业   5篇
能源动力   1篇
轻工业   1篇
无线电   7篇
一般工业技术   11篇
冶金工业   13篇
自动化技术   28篇
  2022年   1篇
  2020年   2篇
  2017年   1篇
  2014年   2篇
  2013年   4篇
  2012年   1篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2005年   2篇
  2004年   4篇
  2003年   2篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   3篇
  1998年   7篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1994年   3篇
  1991年   1篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1975年   2篇
  1963年   1篇
排序方式: 共有67条查询结果,搜索用时 15 毫秒
31.
The lower and upper bounds on the minimum time needed to process a given directed acyclic task graph for a given number of processors are derived. It is proved that the proposed lower bound on time is not only sharper than the previously known values but also easier to calculate. The upper bound on time, which is useful in determining the worst case behavior of a given task graph, is presented. The lower and upper bounds on the minimum number of processors required to process a given task graph in the minimum possible time are also derived. It is seen with a number of randomly generated dense task graphs that the lower and upper bounds we derive are equal, thus giving the optimal time for scheduling directed acyclic task graphs on a given set of processors  相似文献   
32.
One of the basic problems in the area of microprocessor-based process control is the estimation of execution time and storage required to implement a given control algorithm on a specified microprocessor. With improvements in the capability of microprocessors and increases, in sophistication and cost of control software higher level languages particularly, Pascal is becoming popular in control applications. In this paper, a methodology is suggested for estimating the execution-time bound and storage requirements of control algorithms coded in Pascal when they are run on a specified microprocessor. The method consists of some modifications of the Pascal P-compiler, which yields the P-code and together with it a subsidiary sequential file of records to facilitate timing and storage calculation. This sequential file, together with the parameters used in program loops in the PASCAL application program and P-code instruction execution time and code size for a specified microprocessor, yields the execution-time bound and memory requirements. Using this methodology, the performance of a set of recently announced 16-bit microprocessors in some control applications is evaluated.  相似文献   
33.
We present an implementation of a multicast network of processors. The processors are connected in a fully connected network and it is possible to broadcast data in a single instruction. The network works at the processor-memory speed and therefore provides a fast communication link among processors. A number of interesting architectures are possible using such a network. We show some of these architectures which have been implemented and are functional. We also show the system software calls which allow programming of these machines in parallel mode.  相似文献   
34.
When a three-phase cage induction motor is started on a half winding, space harmonic MMFs occur, and the machine usually fails to accelerate beyond the speed of the principal harmonic. A mathematical theory is presented in this paper which not only explains such behavior observed in the past, but also predicts whether, and at what speed, a motor will hang up or crawl on any particular arrangement of half winding. The theory also provides a basis for the design of harmonic-free half windings on which the machine will accelerate smoothly to full speed. This is illustrated by application to a 6-pole motor  相似文献   
35.
Fat-soluble vitamins and their metabolites modulate immune function in a variety of animal species. The objective of the present study was to determine the role of fat-soluble vitamins in colostrum and milk in the development of specific aspects of immune function in the calf during the 1st wk postpartum. During this period, control calves (n = 6) were fed normal colostrum and milk, and calves in the treatment group (n = 6) were fed skimmed colostrum and skimmed milk supplemented with coconut oil. Treated calves did not experience the progressive increase in concentrations of retinol, beta-carotene, alpha-tocopherol, 1,25-dihydroxyvitamin D, or retinoic acids in serum that was observed in control calves. Acquisition of passive immunity, which is indicated by concentrations of immunoglobulin G1 in serum, was unaffected by treatment. Composition and functional capacities of populations of blood mononuclear leukocytes that were collected from birth to 7 d postpartum were also unaffected by treatment. Major changes in the function and composition of mononuclear leukocyte populations from all calves occurred during the experimental period and were unrelated to the concentrations of fat-soluble vitamins in serum. Populations of blood mononuclear leukocytes from calves were functionally hyporesponsive and compositionally different from populations of blood mononuclear leukocytes from adult nongravid cows. These differences likely reflected the immaturity of the immune system of the neonatal calf and may contribute to the increased susceptibility of the calf to infectious disease.  相似文献   
36.
A cDNA isolated by a subtractive hybridization procedure detected loss of mtDNA and the mRNA coding for NADH dehydrogenase subunit 3 in 8 of 13 tumor kidney tissues obtained from patients with renal cell carcinoma. Sequencing revealed a stretch of nucleotides homologous to the mitochondrial NADH dehydrogenase subunit 3 gene in the middle of the cDNA. The depletion phenomenon was also observed in five of six renal carcinoma cell lines. In the case of a benign renal oncocytoma, however, the mtDNA content was increased 200% more than that of the adjacent normal tissue. The frequency with which this phenomenon occurs in renal cell carcinomas, but not in other types of cancers, suggests that this may be an important phenotype associated with renal cell neoplastic transformation. However, the absence of any structural alterations within the mitochondrial genome suggests that the depletion may be a secondary event associated with the oncogenic transformation process.  相似文献   
37.
BACKGROUND: Ileo-jejunal transposition (IJT; transposition of the distal quarter of the small intestine into the proximal jejunum) is known to stimulate mucosal growth of the transposed ileum, but the effects on other parts of the small intestine are controversial. The effect of aging on the trophic action of IJT is not known. METHODS: We examined the trophic effect of IJT (3 weeks post-operation) on the gastrointestinal tract and pancreas, and on plasma levels of neurotensin and gastrin in three different aged groups of Fischer 344 rats (4, 12, and 24 months old). RESULTS: Three weeks after IJT, the mucosal mass, villus height, and crypt depth increased significantly in the transposed ileum as well as in the remainder of the small intestine. The weights of the colon and pancreas increased significantly after IJT. These responses were not affected by aging. In each of the three age groups, IJT did not affect plasma gastrin level, but significantly increased plasma level of neurotensin. CONCLUSIONS: The distal ileum appears to play an important role in the regulation of growth in the intestine and pancreas; this role is preserved in aged rats. Neurotensin may play an important role in this mechanism.  相似文献   
38.
Rajaraman  V. Vikas  O. 《Electronics letters》1975,11(14):305-307
Slow unidirectional shift registers can be used to realise a large-size inexpensive stack. A simple configuration of such a shift-register stack will frequently force a processing unit needing access to it into an idle state. In the letter, a scheme using a small number of fast bidirectional shift registers appended to a unidirectional shift-register stack is suggested. This configuration makes the entire stack look, for most of the time, as if it were made of fast bidirectional shift registers. A design method is presented to determine the number of bits needed in the bidirectional shift register to meet given specifications.  相似文献   
39.
An efficient distributed algorithm for constructing small dominating sets   总被引:1,自引:0,他引:1  
The dominating set problem asks for a small subset D of nodes in a graph such that every node is either in D or adjacent to a node in D. This problem arises in a number of distributed network applications, where it is important to locate a small number of centers in the network such that every node is nearby at least one center. Finding a dominating set of minimum size is NP-complete, and the best known approximation is logarithmic in the maximum degree of the graph and is provided by the same simple greedy approach that gives the well-known logarithmic approximation result for the closely related set cover problem. We describe and analyze new randomized distributed algorithms for the dominating set problem that run in polylogarithmic time, independent of the diameter of the network, and that return a dominating set of size within a logarithmic factor from optimal, with high probability. In particular, our best algorithm runs in rounds with high probability, where n is the number of nodes, is one plus the maximum degree of any node, and each round involves a constant number of message exchanges among any two neighbors; the size of the dominating set obtained is within of the optimal in expectation and within of the optimal with high probability. We also describe generalizations to the weighted case and the case of multiple covering requirements. Received: January 2002 / Accepted: August 2002 RID="*" ID="*" Supported by NSF CAREER award NSF CCR-9983901 RID="*" ID="*" Supported by NSF CAREER award NSF CCR-9983901  相似文献   
40.
Adler  Khanna  Rajaraman  Rosén 《Algorithmica》2003,36(2):123-152
The time-constrained packet routing problem is to schedule a set of packets to be transmitted through a multinode network, where every packet has a source and a destination (as in traditional packet routing problems) as well as a release time and a deadline. The objective is to schedule the maximum number of packets subject to deadline constraints. This problem is studied in [1], where it is shown that the problem is NP-Complete even when the underlying topology is a linear array. Approximation algorithms are also provided in [1] for the linear array and the unidirectional ring for both the case where packets may be buffered in transit and the case where they may not be. In this paper we extend the results of [1] in two directions. First, we consider the more general network topologies of trees and two-dimensional meshes. Second, we associate with each packet a measure of utility, called a weight, and study the problem of maximizing the total weight of the packets that are scheduled subject to their timing constraints. For the bufferless case, we provide constant factor approximation algorithms for the time-constrained scheduling problem with weighted packets on trees and meshes. We also provide logarithmic approximations for the same problems in the buffered case. These results are complemented by new lower bounds, which demonstrate that we cannot hope to achieve the same results for general network topologies. For example, we show that if k packets are required to follow prescribed paths in an arbitrary graph, then unless NP = ZPP, there is no polynomial-time k1-ε -approximation, for any ε > 0 , to the optimal set of packets that can be scheduled.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号