首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   210篇
  免费   4篇
电工技术   2篇
化学工业   37篇
建筑科学   3篇
轻工业   1篇
无线电   25篇
一般工业技术   31篇
冶金工业   19篇
自动化技术   96篇
  2023年   3篇
  2022年   3篇
  2021年   12篇
  2020年   2篇
  2019年   4篇
  2018年   3篇
  2017年   1篇
  2016年   4篇
  2015年   8篇
  2014年   2篇
  2013年   8篇
  2012年   14篇
  2011年   8篇
  2010年   9篇
  2009年   21篇
  2008年   13篇
  2007年   13篇
  2006年   7篇
  2005年   2篇
  2004年   9篇
  2003年   3篇
  2002年   7篇
  2001年   3篇
  2000年   5篇
  1999年   5篇
  1998年   3篇
  1997年   4篇
  1996年   4篇
  1995年   3篇
  1992年   1篇
  1991年   3篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1979年   3篇
  1978年   2篇
  1977年   6篇
  1976年   2篇
  1975年   5篇
  1973年   1篇
排序方式: 共有214条查询结果,搜索用时 0 毫秒
101.
Algorithmic cooling (AC) is a recent spin-cooling approach that employs entropy compression methods in open systems. AC reduces the entropy of spins on suitable molecules beyond Shannon's bound on the degree of entropy compression by reversible manipulations. Remarkably, AC makes use of thermalization, a generally destructive facet of spin systems, as an integral part of the cooling scheme. AC is capable of cooling spins to very low temperatures and provides significant cooling for molecules containing as few as 5–7 spins. Application of AC to slightly larger molecules could lead to breakthroughs in high-sensitivity NMR spectroscopy in the near future. Furthermore, AC may be germane to the development of scalable NMR quantum computers. We introduce here a new practicable algorithm, “PAC3”, and several new exhaustive cooling algorithms, such as the Tribonacci and k-bonacci algorithms. In particular, we present the “all-bonacci” algorithm, which appears to reach the maximal degree of cooling obtainable by the optimal AC approach. AC is potentially beneficial for NMR-derived biomedical applications, which involve bio-molecules with isotope enrichments, such as 13 C- and 15 N-labeled amino acids. We briefly survey AC experiments, including a recent 3-spin experiment in which Shannon's bound was bypassed. The difficulties associated with cooling molecules bearing a greater number of spins are explained. Finally, the potential of selected cooling algorithms (practicable, exhaustive, and optimal algorithms) is illustrated with regard to a highly relevant bio-medical target— 13 C-labeled glucose.  相似文献   
102.
In this study, we propose a new approach for detecting previously unencountered instances of known classes of malicious software based on their temporal behavior. In the proposed approach, time-stamped security data are continuously monitored within the target computer system or network and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of running processes) and events (e.g., installation of a software) are integrated with a security-domain, temporal-abstraction knowledge-base (i.e., a security ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher-level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions can be monitored to detect suspicious temporal patterns. These patterns are compatible with a set of predefined classes of malware as defined by a security expert employing a set of time and value constraints. The new approach was applied for detecting worm-related malware using two different ontologies. Evaluation results demonstrated the effectiveness of the new approach. The approach can be used for detecting other types of malware by updating the security ontology with new definitions of temporal patterns.  相似文献   
103.
The theory of flow argues that subjective well-being results from absorption in an activity that strikes a good balance between challenges and skills. This absorption has been termed flow. Such absorption is often reported in combat situations, in which it contributes both to the subjective well-being and to the efficiency of soldiers. This article suggests that combat flow may have been central to military training and military performance throughout history. The study of combat flow could therefore shed new light on military history and form the basis for the development of new training techniques. The article simultaneously probes the ethical and political implications of manipulating the subjective well-being of soldiers in such a way. It cautions scholars of flow and subjective well-being that they should be aware of the ethical and political implications of their studies and warns against the dangerous political results of equating subjective well-being with happiness. The article further calls for greater cooperation between psychologists and historians in the study of well-being. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
104.
We use a constraint-based language to specify repeating temporal patterns. The Constraint-based Pattern Specification Language (CAPSUL) is simple to use, but allows a wide variety of patterns to be expressed. This paper describes in detail the syntax of CAPSUL, including its layers of abstraction and four types of constraints. We also discuss the semantics of CAPSUL, including the concept of interference between patterns and the expressive power of the language. We have implemented CAPSUL in a temporal-abstraction system called Résumé, and used it in a graphical knowledge-acquisition tool to acquire domain-specific knowledge from experts about patterns to be found in large databases. We summarize the results of preliminary experiments using the pattern-specification and pattern-detection tools on data about patients who have cancer and have been seen at the Rush Presbyterian/St. Luke's Medical Center. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
105.
106.
Our survey of some 40 network maintenance expert systems reveals theri main shortcoming, which is the difficulty to acquire troubleshooting knowledge both when initializing the expert system and after its deployment. Additionally, the state-of-the-art troubleshooting expert systems do not optimize troubleshooting cost. We present theAO * algorithm to generate a network troubleshooting expert system which minimizes the expected troubleshooting cost and learns better troubleshooting techniques during its operation.  相似文献   
107.
This paper considers a family of spatially discrete approximations, including boundary treatment, to initial boundary value problems in evolving bounded domains. The presented method is based on the Cartesian grid embedded Finite-Difference method, which was initially introduced by Abarbanel and Ditkowski (ICASE Report No. 96-8, 1996; and J. Comput. Phys. 133(2), 1997) and Ditkowski (Ph.D. thesis, Tel Aviv University, 1997), for initial boundary value problems on constant irregular domains. We perform a comprehensive theoretical analysis of the numerical issues, which arise when dealing with domains, whose boundaries evolve smoothly in the spatial domain as a function of time. In this class of problems the moving boundaries are impenetrable with either Dirichlet or Neumann boundary conditions, and should not be confused with the class of moving interface problems such as multiple phase flow, solidification, and the Stefan problem. Unlike other similar works on this class of problems, the resulting method is not restricted to domains of up to 3-D, can achieve higher than 2nd-order accuracy both in time and space, and is strictly stable in semi-discrete settings. The strict stability property of the method also implies, that the numerical solution remains consistent and valid for a long integration time. A complete convergence analysis is carried in semi-discrete settings, including a detailed analysis for the implementation of the diffusion equation. Numerical solutions of the diffusion equation, using the method for a 2nd and a 4th-order of accuracy are carried out in one dimension and two dimensions respectively, which demonstrates the efficacy of the method. This research was supported by the Israel Science Foundation (grant No. 1362/04).  相似文献   
108.
A 70.9% majority of the U.S. male veterans in a nationwide sample appraised the impact of their service in Vietnam on their present lives as mainly positive. A substantial minority, 41.7%, judged the effects to be highly salient. With controls on level of exposure to war-zone stressors measured with data from military records, the valence and salience of these appraisals are investigated in relation to posttraumatic stress disorder (PTSD) and other indicators of wartime and postwar functioning. The results are consistent with the hypothesis that mainly positive tertiary appraisals are affirmations of successful wartime and postwar adaptation rather than defensive denials related to maladaptive outcomes. The possibility that mainly positive tertiary appraisals also contribute to successful postwar adaptation is discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
109.
Inferring PoP level maps is gaining interest due to its importance to many areas, e.g., for tracking the Internet evolution and studying its properties. In this paper we introduce a novel structural approach to automatically generate large scale PoP level maps using traceroute measurement from multiple locations. The PoPs are first identified based on their structure, and are then assigned a location using information from several geo-location databases. We discuss the tradeoffs in this approach and provide extensive validation details. The generated maps can be widely used for research, and we provide some possible directions.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号