首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   166篇
  免费   7篇
电工技术   2篇
化学工业   31篇
金属工艺   1篇
机械仪表   6篇
建筑科学   4篇
矿业工程   1篇
能源动力   7篇
轻工业   23篇
水利工程   3篇
无线电   14篇
一般工业技术   28篇
冶金工业   16篇
自动化技术   37篇
  2023年   1篇
  2022年   4篇
  2021年   6篇
  2020年   5篇
  2019年   5篇
  2018年   2篇
  2017年   5篇
  2016年   4篇
  2015年   7篇
  2014年   8篇
  2013年   12篇
  2012年   5篇
  2011年   8篇
  2010年   6篇
  2009年   4篇
  2008年   9篇
  2007年   20篇
  2006年   5篇
  2005年   5篇
  2004年   4篇
  2003年   2篇
  2002年   5篇
  2001年   5篇
  2000年   5篇
  1999年   5篇
  1998年   6篇
  1997年   9篇
  1996年   2篇
  1995年   2篇
  1993年   1篇
  1992年   2篇
  1987年   1篇
  1985年   2篇
  1982年   1篇
排序方式: 共有173条查询结果,搜索用时 15 毫秒
121.
Lateral confined epitaxy (LCE) is an epitaxial growth method on substrates patterned to form uniform mesas separated by trenches for laterally restricting growth area. In this work, plan view and cross-sectional transmission electron microscopy (TEM) were used in order to characterize the microstructure of GaN films grown by metal-organic chemical vapor deposition on patterned Si (111) using the LCE method. Two kinds of propagation modes of the dislocations were observed. The dislocations in the center of the mesa mainly propagate vertically to the surface. On the other hand, dislocations close (1–2 μm) to the mesa edges tend to bend laterally, allowing dislocation reactions that result in a lower dislocation density. This suggests that the overall material quality improves with decreasing mesa size, which is consistent with the observed increase in photoluminescence band edge peak intensity.  相似文献   
122.
Maintaining Authenticated Communication in the Presence of Break-Ins   总被引:5,自引:0,他引:5  
We study the problem of maintaining authenticated communication over untrusted communication channels, in a scenario where the communicating parties may be occasionally and repeatedly broken into for transient periods of time. Once a party is broken into, its cryptographic keys are exposed and perhaps modified. Yet, when aided by other parties it should be able to regain its ability to communicate in an authenticated way. We present a mathematical model for this highly adversarial setting, exhibiting salient properties and parameters, and then describe a practically appealing protocol for solving this problem. A key element in our solution is devising a proactive distributed signature (PDS) scheme in our model. The PDS schemes known in the literature are designed for a model where authenticated communication is available. We therefore show how these schemes can be modified to work in our model, where no such primitives are available a priori. In the process of devising these schemes, we also present a new definition of PDS schemes (and of distributed signature schemes in general). This definition may be of independent interest. Received 22 April 1998 and revised 2 April 1999  相似文献   
123.
Boosting algorithms build highly accurate prediction mechanisms from a collection of low-accuracy predictors. To do so, they employ the notion of weak-learnability. The starting point of this paper is a proof which shows that weak learnability is equivalent to linear separability with ? 1 margin. The equivalence is a direct consequence of von Neumann’s minimax theorem. Nonetheless, we derive the equivalence directly using Fenchel duality. We then use our derivation to describe a family of relaxations to the weak-learnability assumption that readily translates to a family of relaxations of linear separability with margin. This alternative perspective sheds new light on known soft-margin boosting algorithms and also enables us to derive several new relaxations of the notion of linear separability. Last, we describe and analyze an efficient boosting framework that can be used for minimizing the loss functions derived from our family of relaxations. In particular, we obtain efficient boosting algorithms for maximizing hard and soft versions of the ? 1 margin.  相似文献   
124.
The global meat industry has seen significant changes in the methods used to harvest and process fresh meat over the past century. Increased use of automation has led to significant increases in line speed for beef, pork, sheep, poultry and fish operations. For example, currently the fastest line observed has been broilers at 13,500/h. Such developments have required in-depth understanding of the pre and post rigor processes to prevent defects. Procedures such as maturation chilling and electrical stimulation are now common in red meat and poultry processing; allowing shorter time to deboning, while harvesting high quality meat. Robots designed to cut meat are also appearing on the market, and replacing traditional manual operations. This is a challenge, because high speed equipment is not necessarily sensitive to variations in size/quality issues, and requires development of unique sensors and control systems. Also, progress in breeding and genetics is contributing to greater product uniformity and quality; helping in operating automated equipment.  相似文献   
125.
Dynamical systems with asymptotically stable periodic orbits are generic models for rhythmic processes in dissipative physical systems. This paper presents a method for reconstructing the dynamics near a periodic orbit from multivariate time-series data. It is used to test theories about the control of legged locomotion, a context in which time series are short when compared with previous work in nonlinear time-series analysis. The method presented here identifies appropriate dimensions of reduced order models for the deterministic portion of the dynamics. The paper also addresses challenges inherent in identifying dynamical models with data from different individuals.  相似文献   
126.
Infused design. II. Practice   总被引:1,自引:1,他引:0  
Infused design, introduced in the preceding paper, is a new methodology for design that opens up new channels of cooperation between designers from different engineering fields. The methodology enables an engineer from one engineering field to infuse his designs with the knowledge and experience of an engineer from some other field. During the infusion, the knowledge of the designers ascends to a common mathematical meta-level, consisting of discrete mathematical models—called combinatorial representations, and then descends to other disciplinary domains. All the domains that can be reached in this fashion are candidates to export knowledge for infusion. This sequel paper is aimed at unfolding the practice of the theory from part I by demonstrating four scenarios dealing with various design activities. The design scenarios studied in this paper expose novel cooperation channels between mechanical and civil engineers, and between mechanical and electrical engineers. Further applications of the proposed approach, including the pedagogical advantages it offers, are thoroughly discussed.
Y. ReichEmail: Fax: +972-3640-7617
  相似文献   
127.
Centralized and Distributed Multi-view Correspondence   总被引:2,自引:0,他引:2  
A probabilistic algorithm is presented for finding correspondences across multiple images in systems with large numbers of cameras and considerable overlap. The algorithm employs the theory of random graphs to provide an efficient probabilistic algorithm that performs Wide-baseline Stereo (WBS) comparisons on a small number of image pairs, and then propagates correspondence information among the cameras. A concrete mathematical analysis of its performance is given. The algorithm is extended to handle false-positive and false-negative failures of the WBS computations. We characterize the detectability of the existence of such failures, and propose an efficient method for this detection. Based on this, we propose a heuristic method for discarding false matches, and demonstrate its effectiveness in reducing errors. Since in many multi-camera applications cameras are attached to processors that handle local processing and communication, it is natural to consider distributed solutions that make use of the local processors and do not use a central computer. Our algorithm is especially suited to run in a distributed setting. If the local processors are sufficiently powerful, this allows an order of magnitude increase in computational efficiency. More importantly, a distributed implementation provides strong robustness guarantees, and eliminates the existence of a single point of failure that is inherent when the application is coordinated by a central computer. We show how to efficiently overcome processor crashes and communication failures with a minimal reduction in the quality of the algorithm’s results. This paper is an extension of Avidan et al. (2004), which appeared in ECCV-04.  相似文献   
128.
The mechanism of the spontaneous decomposition of 3-bromo-2,2-bis(bromomethyl)propanol (TBNPA) and the kinetics of the reaction of the parent compound and two subsequent products were determined in aqueous solution at temperatures from 30 to 70 degrees C and pH from 7.0 to 9.5. TBNPA is decomposed by a sequence of reactions that form 3,3-bis(bromomethyl)oxetane (BBMO), 3-bromomethyl-3-hydroxymethyloxetane (BMHMO), and 2,6-dioxaspiro[3.3]-heptane (DOH), releasing one bromide ion at each stage. The pseudo-first-order rate constant of the decomposition of TBNPA increases linearlywith the pH. The apparent activation energy of this transformation (98+/-2 KJ/mol) was calculated from the change of the effective second-order rate constant with temperature. The pseudoactivation energies of BBMO and BMHMO were estimated to be 109 and 151 KJ/mol, respectively. Good agreement was found between the rate coefficients derived from changes in the organic molecules concentrations and those determined from the changes in the Br- concentrations. TBNPA is the most abundant semivolatile organic pollutant in the aquitard studied, and together with its byproducts they posess an environmental hazard. TBNPA half-life is estimated to be about 100 years. This implies that high concentrations of TBNPA will persist in the aquifer long after the elimination of all its sources.  相似文献   
129.
Bottles and containers made of PET are not suitable for hot filling since the limiting upper‐use temperature of this polymer is about 85°C. In the present study the properties and performance of bottles made from copolymers and blends of PET containing NDC groups and manufactured by the Injection Stretch Blow Molding (ISBM) process were investigated. These compositions possess advanced properties and can be used up to 95°C. The properties of these bottles were found to depend on their composition and microstructure. The glass transition temperature, the degree of crystallinity and the induced strains that were measured by differential scanning calorimetry and differential mechanical thermal analysis are reported. It was concluded that NDC‐containing PET based copolymers and blends could be processed by a one‐stage ISBM process into containers of improved properties and hot‐filling capabilities. Polym. Eng. Sci. 44:1670–1675, 2004. © 2004 Society of Plastics Engineers.  相似文献   
130.
Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号