首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   159篇
  免费   8篇
电工技术   2篇
化学工业   22篇
金属工艺   3篇
建筑科学   2篇
能源动力   5篇
轻工业   7篇
水利工程   7篇
无线电   33篇
一般工业技术   16篇
冶金工业   1篇
自动化技术   69篇
  2023年   5篇
  2022年   10篇
  2021年   11篇
  2020年   9篇
  2019年   6篇
  2018年   7篇
  2017年   9篇
  2016年   9篇
  2015年   9篇
  2014年   13篇
  2013年   11篇
  2012年   14篇
  2011年   11篇
  2010年   12篇
  2009年   11篇
  2008年   7篇
  2007年   4篇
  2006年   4篇
  2005年   1篇
  2003年   1篇
  2002年   1篇
  2000年   1篇
  1999年   1篇
排序方式: 共有167条查询结果,搜索用时 15 毫秒
91.
The acceptance and use of computer based assessment   总被引:1,自引:0,他引:1  
The effective development of a computer based assessment (CBA) depends on students’ acceptance. The purpose of this study is to build a model that demonstrates the constructs that affect students’ behavioral intention to use a CBA. The proposed model, Computer Based Assessment Acceptance Model (CBAAM) is based on previous models of technology acceptance such as Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), and the Unified Theory of Acceptance and Usage of Technology (UTAUT). Constructs from previous models were used such as Perceived Usefulness, Perceived Ease of Use, Computer Self Efficacy, Social Influence, Facilitating Conditions and Perceived Playfulness. Additionally, two new variables, Content and Goal Expectancy, were added to the proposed research model. Data were collected from 173 participants in an introductory informatics course using a survey questionnaire. Partial Least Squares (PLS) was used to test the measurement and the structural model. Results indicate that Perceived Ease of Use and Perceived Playfulness have a direct effect on CBA use. Perceived Usefulness, Computer Self Efficacy, Social Influence, Facilitating Conditions, Content and Goal Expectancy have only indirect effects. These eight variables explain approximately 50% of the variance of Behavioural Intention.  相似文献   
92.
This paper proposes a “reading” of the church of San Lorenzo in Turin, designed by Guarino Guarini, through the philosophical notion of “fold” introduced by Gilles Deleuze. The paper consists of two parts. The first part contains an exploration of the notion of “fold” in architecture and in philosophy and examines the use of the fold in the theory of Baroque architecture as well as the range of this new tool in architectural practise in contemporary architecture and in philosophy and examines the use of the fold as fundamental condition for understanding Baroque era. The second part contains the application of the notion of fold as a philosophical and conceptual framework for the “reading” of the chapel.  相似文献   
93.
We consider the problem of partial shape matching. We propose to transform shapes into sequences and utilize an algorithm that determines a subsequence of a target sequence that best matches a query. In the proposed algorithm we map the problem of the best matching subsequence to the problem of a cheapest path in a directed acyclic graph (DAG). The approach allows us to compute the optimal scale and translation of sequence values, which is a nontrivial problem in the case of subsequence matching. Our experimental results demonstrate that the proposed algorithm outperforms the commonly used techniques in retrieval accuracy.  相似文献   
94.
Society’s increasing reliance on services provided by web applications places a high demand on their reliability. The flow of control through web applications heavily depends on user inputs and interactions, so user inputs should be thoroughly validated before being passed to the back-end software. Although several techniques are used to validate inputs on the client, users can easily bypass this validation and submit arbitrary data to the server. This can cause unexpected behavior, and even allow unauthorized access. A test technique called bypass testing intentionally sends invalid data to the server by bypassing client-side validation. This paper reports results from a comprehensive case study on 16 deployed, widely used, commercial web applications. As part of this project, the theory behind bypass testing was extended and an automated tool, AutoBypass, was built. The case study found failures in 14 of the 16 web applications tested, some significant. This study gives evidence that bypass testing is effective, has positive return on investment, and scales to real applications.  相似文献   
95.
Matrix-Matrix Multiplication (MMM) is a highly important kernel in linear algebra algorithms and the performance of its implementations depends on the memory utilization and data locality. There are MMM algorithms, such as standard, Strassen–Winograd variant, and many recursive array layouts, such as Z-Morton or U-Morton. However, their data locality is lower than that of the proposed methodology. Moreover, several SOA (state of the art) self-tuning libraries exist, such as ATLAS for MMM algorithm, which tests many MMM implementations. During the installation of ATLAS, on the one hand an extremely complex empirical tuning step is required, and on the other hand a large number of compiler options are used, both of which are not included in the scope of this paper. In this paper, a new methodology using the standard MMM algorithm is presented, achieving improved performance by focusing on data locality (both temporal and spatial). This methodology finds the scheduling which conforms with the optimum memory management. Compared with (Chatterjee et al. in IEEE Trans. Parallel Distrib. Syst. 13:1105, 2002; Li and Garzaran in Proc. of Lang. Compil. Parallel Comput., 2005; Bilmes et al. in Proc. of the 11th ACM Int. Conf. Super-comput., 1997; Aberdeen and Baxter in Concurr. Comput. Pract. Exp. 13:103, 2001), the proposed methodology has two major advantages. Firstly, the scheduling used for the tile level is different from the element level’s one, having better data locality, suited to the sizes of memory hierarchy. Secondly, its exploration time is short, because it searches only for the number of the level of tiling used, and between (1, 2) (Sect. 4) for finding the best tile size for each cache level. A software tool (C-code) implementing the above methodology was developed, having the hardware model and the matrix sizes as input. This methodology has better performance against others at a wide range of architectures. Compared with the best existing related work, which we implemented, better performance up to 55% than the Standard MMM algorithm and up to 35% than Strassen’s is observed, both under recursive data array layouts.  相似文献   
96.
Biologists, medical experts, biochemical engineers and researchers working on DNA microarray experiments are increasingly turning on Grid computing with the scope of leveraging the Grid’s computing power, immense storage resources, and quality of service to the expedient processing of a wide range of datasets. In this paper we present a combined experience of grid application experts and bioinformatics scientists in deploying a pilot service enabling computationally efficient processing and analysis of data stemming from microarray experiments. This pilot service is accessible over the Hellenic portion of the EGEE grid and has been demonstrated in the scope of several public events. We highlight the process of grid application enablement, grid deployment challenges, as well as lessons learnt from a bi-annual effort to port and deploy a MATLAB DNA microarray application on a production grid. In addition to describing the parallelization of the application, we also emphasize on the development of a distributed federated database for storing and post-processing the results of the microarray experiments. Overall we believe that our experience could be proven valuable not only to microarray data scientists but also to other Grid users that intend to Grid-enable and deploy their applications.  相似文献   
97.
Up to now magnesium phosphate cements are mainly being utilized in wastewater treatment due to their adsorptive properties. Recently they also have been shown to have a high potential as degradable biocements for application as replacement materials for bone defects. In comparison to degradable calcium phosphate cements they have the advantage of setting at neutral pH, which is favorable in biological environment. In this study two parameters of the cement composition, namely powder-to-liquid ratio (PLR) and citrate content, were varied in order to optimize the injectability properties of the cement paste and the mechanical properties of the reaction product. These properties were determined by means of testing setting time and temperature, paste viscosity, and injectability as well as phase composition and compressive strength of the set cements. Best results were obtained, when the cements were prepared with a PLR of 2.5 and a binder liquid consisting of an aqueous solution of 3 mol/l diammonium hydrogen phosphate and 0.5 mol/l diammonium citrate.  相似文献   
98.
In this work, we focus on the Joint Channel Assignment and Routing (JCAR) problem in Cognitive Radio Networks (CRNs) and especially on the optimal reconfiguration of secondary networks under the presence of primary users. Secondary CRN users need to adapt their transmission channels promptly, while effectively limit additional or escalating system modifications triggered by the intertweaved primary user activity. Our approach takes into consideration the underlying spectrum switching dynamics and concurrently aims at a fair resource allocation among the active network flows. We take an optimization perspective and formulate the JCAR and network reconfiguration problems as mixed integer linear programs, addressing fairness concerns as well. We propose a heuristic approach which is based on a sequential reduced search space methodology, in order to obtain efficiently solutions of otherwise tough and demanding reconfiguration problems. The operation, effectiveness and performance of the proposed mechanisms are evaluated through analysis and simulations under various working conditions. The obtained numerical results indicate the benefits of the proposed schemes in terms of overhead performance and their scaling properties with respect to more realistic and thus demanding topologies.  相似文献   
99.
This paper presents a complete system for the secure distribution of a copyrighted MPEG-1/2 video stored on a DVD-ROM disc. A combined selective watermarking and encryption method that operates in the compressed MPEG domain is introduced. Watermarking resistant to a number of attacks is used for copyright protection. The video quality deteriorates significantly due to encryption, thus restraining unauthorized viewers from viewing it. The video can only be viewed using the developed Secure MPEG Player, which performs real-time decryption of the encrypted video. The decryption requires a secret key that is extracted from the DVD-ROM disc in a cryptographically secure manner.This work was supported by the EU IST Project "ASPIS"  相似文献   
100.
The antioxidant ability of phenolic extracts of olive fruits during maturity in Chondrolia and Amfissis cultivars grown at 10 m and 300 m altitude showed that altitude affected phenol content, antioxidant and Fe2+/Fe3+ reduction/binding ability. The hydroxyl radical, peroxyl radical and peroxynitrite-induced DNA nicking assays have been used to evaluate the anti-radical activity of the extracts. Results showed that the ability of olive extracts to prevent radical-mediated DNA damage arises from the triple synergistic action of the genotype, the altitude and the maturation stage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号