首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   330篇
  免费   20篇
电工技术   5篇
化学工业   73篇
金属工艺   2篇
机械仪表   4篇
建筑科学   18篇
矿业工程   1篇
能源动力   35篇
轻工业   20篇
水利工程   8篇
无线电   41篇
一般工业技术   35篇
冶金工业   8篇
原子能技术   1篇
自动化技术   99篇
  2024年   1篇
  2023年   6篇
  2022年   16篇
  2021年   17篇
  2020年   7篇
  2019年   16篇
  2018年   15篇
  2017年   17篇
  2016年   11篇
  2015年   11篇
  2014年   11篇
  2013年   24篇
  2012年   29篇
  2011年   38篇
  2010年   19篇
  2009年   23篇
  2008年   11篇
  2007年   22篇
  2006年   9篇
  2005年   2篇
  2004年   9篇
  2003年   7篇
  2002年   4篇
  2001年   5篇
  2000年   2篇
  1999年   2篇
  1998年   3篇
  1997年   4篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1987年   1篇
  1979年   1篇
  1976年   4篇
排序方式: 共有350条查询结果,搜索用时 15 毫秒
131.
The potential of Botanic Gardens (BGs) to contribute to environmental education is well documented. To what degree this potential is met concerning school students’ environmental education is to be considered. In Greece, Environmental Education Centres (EECs) develop Environmental Education Programmes (EEPs) for schools to implement. A questionnaire survey addressing teachers employed at the EECs in Greece investigated the use of BGs as a means of environmental education and identified their most important features in supporting school EEPs. Findings indicated that the majority of EEC teachers (90.6%) have not developed EEPs involving the use of BGs, although BGs were ranked as most suitable amongst other green spaces for conducting such programmes, particularly for primary school students. Teachers identified the need for BGs to be designed accordingly and provide the necessary infrastructure to be educationally effective that included facilitating teaching (e.g. open spaces, areas to congregate, easy access paths and indoor facilities) and plant-orientated elements as well as plant management displays. A strategy by BGs to promote their role in environmental education and a multidisciplinary design approach would maximise student benefit.  相似文献   
132.
The electrochemical oxidation of ammonia (NH4+/NH3) in sodium perchlorate was investigated on IrO2 electrodes prepared by two techniques: the thermal decomposition of H2IrCl6 precursor and the anodic oxidation of metallic iridium. The electrochemical behaviour of Ir(IV)/Ir(III) surface redox couple differs between the electrodes indicating that on the anodic iridium oxide film (AIROF) both, the surface and the interior of the electrode are electrochemically active whereas on the thermally decomposed iridium oxide films (TDIROF), mainly the electrode surface participates in the electrochemical processes.On both electrodes, ammonia is oxidized in the potential region of Ir(V)/Ir(IV) surface redox couple activity, thus, may involve Ir(V). During ammonia oxidation, TDIROF is deactivated, probably by adsorbed products of ammonia oxidation. To regenerate TDIROF, it is necessary to polarize the electrode in the hydrogen evolution region. On the contrary, AIROF seems not to be blocked during ammonia oxidation indicating its fast regeneration during the potential scan. The difference between both electrodes results from the difference in the activity of the iridium oxide surface redox couples.  相似文献   
133.
We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the signal‐to‐interference‐plus‐noise ratio (SINR) executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms. The local algorithms fall into two categories: simple threshold that raise an alarm if the output of the SINR‐based metrics we consider deviates from a predefined detection threshold and cumulative sum (cusum) algorithms that raise an alarm if the aggregated output exceeds the predefined threshold. For collaborative detection, we use the Dempster–Shafer theory of evidence algorithm. We collect SINR traces from a real IEEE 802.11 network, and with the use of a new evaluation method, we evaluate both the local and the Dempster–Shafer algorithms in terms of the detection probability, false alarm rate, and their robustness to different detection threshold values, under different attack intensities. The evaluation shows that the cusums achieve higher performance than the simple threshold algorithms under all attack intensities. The Dempster–Shafer algorithm when combined with the simple algorithms, it can increase their performance by more than 80%, but for the cusum algorithms it does not substantially improve their already high performance.Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
134.
135.
Motivated by the way R-trees are implemented in commercial databases systems, in this paper we examine several deletion techniques for R-trees. In particular, in commercial systems R-tree entries are mapped onto relational tables, which implement their own concurrency protocols on top of existing table-level concurrency mechanisms. In analogy, the actual industrial implementations of B-trees do not apply the well-known merging procedure from textbooks in case of node underflows, but rather they apply the free-at-empty technique. This way, space is sacrificed for the benefit of faster deletions and less locking operations, whereas the search performance practically remains unaffected. In this context, we examine the efficiency of modifications to the original R-tree deletion algorithm, which relax certain constraints of this algorithm and perform a controlled reorganization procedure according to a specified criterion. We present the modified algorithms and experimental results about the impact of these modifications on the tree quality, the execution time for the deletion operation and the processing time of search queries, considering several parameters. The experimental results indicate that the modified algorithms improve the efficiency of the deletion operation, while they do not affect the quality of the R-tree and its performance with respect to search operations.  相似文献   
136.
Nickel and nickel-phosphorous matrix composite coatings reinforced by TiO2, SiC and WC particles were produced under direct and pulse current conditions from an additive-free Watts' type bath. The influence of the variable electrolysis parameters (type of current, frequency of current pulses and current density) and the reinforcing particles properties (type, size and concentration in the bath) on the surface morphology and the structure of the deposits was examined. It is demonstrated that the embedding of ceramic particles modifies in various ways the nickel electrocrystallisation process. On the other hand, Ni-P amorphous matrix is not affected by the occlusion of the particles. Overall, the imposition of pulse current conditions leads to composite coatings with increased embedded percentage and more homogenous distribution of particles in the matrix than coatings produced under direct current regime.  相似文献   
137.
We present a novel and practical way to integrate techniques from computer vision to low bit-rate coding systems for video teleconferencing applications. Our focus is to locate and track the faces and selected facial features of persons in typical head-and-shoulders video sequences, and to exploit the location information in a ‘classical’ video coding/decoding system. The motivation is to enable the system to encode selectively various image areas and to produce perceptually pleasing coded images where faces are sharper. We refer to this approach—a mix of classical waveform coding and model—based coding-as model-assisted coding. We propose two totally automatic algorithms which, respectively, perform the detection of a head outline, and identify an ‘eyes-nose-mouth’ region, both from downsampled binary thresholded edge images. The algorithms operate accurately and robustly, even in cases of significant head rotation or partial occlusion by moving objects. We show how the information about face and facial feature location can be advantageously exploited by low bit-rate waveform-based video coders. In particular, we describe a method of object-selective quantizer control in a standard coding system based on motion-compensated discrete cosine transform—CCITT's recommendation H.261. The approach is based on two novel algorithms, namely buffer rate modulation and buffer size modulation. By forcing the rate control algorithm to transfer a fraction of the total available bit-rate from the coding of the non-facial to that of the facial area, the coder produces images with better-rendered facial features, i.e. coding artefacts in the facial area are less pronounced and eye contact is preserved. The improvement was found to be perceptually significant on video sequences coded at the ISDN rate of 64 kbps, with 48 kbps for the input (color) video signal in QCIF format.  相似文献   
138.
During the past years, several attempts have been made to develop functionality for mobility management support and QoS provision in the realm of the IP networks. Since IP was not designed to support such functionality, new protocols have been specified and implemented to tackle these issues. Mobile IP is currently the dominant protocol that allows users to retain connectivity while roaming in IP networks. RSVP (Resource reSerVation Protocol) is a well established protocol for reserving network resources to support QoS requirements. These protocols, when deployed separately, can work quite efficiently. However, if their functionality is combined, several inefficiencies arise in terms of QoS deterioration and misuse of the network resources. To minimize these inefficiencies, we propose a new approach that limits mobility and QoS related network modifications inside the domain, in which a user moves. The deployment of our scheme enhances the network resource usage efficiency, while minimizing the duration of the QoS deterioration experienced after a terminal movement. To quantify the advantages of our proposal, we have developed an analytical and a simulation model that we also present in this paper.  相似文献   
139.
In our days, efficient management of the available network resources becomes a critical issue, both from a functional point of view (so that users can be provided with the bandwidth they need), and an economical point of view (so that carriers can satisfactorily and efficiently serve as many customers as possible and at the same time increase their revenue). In this paper we consider a bandwidth control scheme (i.e. managed bandwidth service) for an ATM network infrastructure which is applied to the Greek research and technology network (GRNET). We present some methods that we have tested (in a simulation setting) in order to increase the efficiency of the system and the utilization of the available bandwidth. More specifically, we consider a bandwidth‐resizing algorithm for virtual paths, in order to keep the allocated bandwidth very close to the bandwidth actually used. This leads to an increased number of accepted requests and better network utilization. We, also, use the simulation results in order to get an estimation of the effective bandwidth for VBR paths that can be used in call admission. Finally, we consider a semi‐offline scheme where requests are gathered and considered for acceptance in regular intervals. Simulation results show an increase in the utilization of resources. As a further improvement, we allow connections to be allocated a little before or after the time initially requested. This leads to further improvement in network utilization. All the improvement schemes were tested with the ATM‐TN simulator and the results look promising. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
140.
Efficient similarity search for market basket data   总被引:2,自引:0,他引:2  
Several organizations have developed very large market basket databases for the maintenance of customer transactions. New applications, e.g., Web recommendation systems, present the requirement for processing similarity queries in market basket databases. In this paper, we propose a novel scheme for similarity search queries in basket data. We develop a new representation method, which, in contrast to existing approaches, is proven to provide correct results. New algorithms are proposed for the processing of similarity queries. Extensive experimental results, for a variety of factors, illustrate the superiority of the proposed scheme over the state-of-the-art method. Edited by R. Ng. Received: August 6, 2001 / Accepted: May 21, 2002 Published online: September 25, 2002  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号