首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   217篇
  免费   26篇
  国内免费   1篇
电工技术   3篇
化学工业   50篇
金属工艺   1篇
机械仪表   4篇
建筑科学   16篇
矿业工程   1篇
能源动力   4篇
轻工业   9篇
水利工程   1篇
石油天然气   2篇
无线电   28篇
一般工业技术   52篇
冶金工业   12篇
原子能技术   4篇
自动化技术   57篇
  2023年   7篇
  2022年   3篇
  2021年   9篇
  2020年   9篇
  2019年   7篇
  2018年   7篇
  2017年   7篇
  2016年   9篇
  2015年   9篇
  2014年   14篇
  2013年   22篇
  2012年   12篇
  2011年   12篇
  2010年   14篇
  2009年   11篇
  2008年   13篇
  2007年   13篇
  2006年   3篇
  2005年   4篇
  2004年   9篇
  2003年   3篇
  2002年   7篇
  2001年   3篇
  2000年   6篇
  1998年   2篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   6篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1986年   1篇
  1985年   3篇
  1984年   3篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
排序方式: 共有244条查询结果,搜索用时 484 毫秒
161.
Martin  Keye  Feng  Johnny 《Natural computing》2019,18(4):901-905
Natural Computing - We generalize the standard fixed point theorem in domain theory: a dcpo has the fixed point property iff the image of its least deflation has the fixed point property, provided...  相似文献   
162.
Dormant pruning of fruit trees is one of the most costly and labor‐intensive activities in specialty crop production. We present a system that solves the first step in the process of automated pruning: accurately measuring and modeling the fruit trees. Our system employs a laser sensor to collect observations of fruit trees from multiple perspectives, and it uses these observations to measure parameters needed for pruning. A split‐and‐merge clustering algorithm divides the collected data into three sets of points: trunk candidates, junction point candidates, and branches. The trunk candidates and junction point candidates are then further refined by a robust fitting algorithm that models as cylinders each segment of the trunk and primary branches. In this work, we focus on measuring the diameters of the primary branches and the trunk, which are important factors in dormant pruning and can be obtained directly from the cylindrical models. We show that the results are qualitatively satisfactory using synthetic and real data. Our experiments with three synthetic and three real apple trees of two different varieties showed that the system is able to identify the primary branches with an average accuracy of 98% and estimate their diameters with an average error of 0.6 cm. Although the current implementation of the system is too slow for large‐scale practical applications (it can measure approximately two trees per hour), our study shows that the proposed approach may serve as a fundamental building block of robotic pruners in the near future.  相似文献   
163.
164.
This paper tentatively discusses the necessity and the requirements to better educate joint UB1-HIT master students from an engineering and engineer's perspective.The author argues that the students should have a broader engineering culture.After having given the context and basic definitions,the paper presents the author's view on how to better develop the engineering capabilities from a knowledge acquisition and learning point of view.Requirements for engineering education are addressed,based,among others,on the professional experience the first author built up while serving as senior manager in information technology and business transformation,at Capgemini Consulting(Belgium).A series of conclusions are given at the end of the paper.  相似文献   
165.
We address the problem of predicting category labels for unlabeled videos in a large video dataset by using a ground-truth set of objectively labeled videos that we have created. Large video databases like YouTube require that a user uploading a new video assign to it a category label from a prescribed set of labels. Such category labeling is likely to be corrupted by the subjective biases of the uploader. Despite their noisy nature, these subjective labels are frequently used as gold standard in algorithms for multimedia classification and retrieval. Our goal in this paper is NOT to propose yet another algorithm that predicts labels for unseen videos based on the subjective ground-truth. On the other hand, our goal is to demonstrate that the video classification performance can be improved if instead of using subjective labels, we first create an objectively labeled ground-truth set of videos and then train a classifier based on such a ground-truth so as to predict objective labels for the set of unlabeled videos.  相似文献   
166.
In many organizations, it is desirable to distribute workload as equally as possible among a group of employees or machines. This paper proposes a performance measure, that we call the Normalized Sum of Square for Workload Deviations (NSSWD), and studies the problem of how to schedule a set of n jobs on m parallel identical processors in order to minimize the NSSWD. The NSSWD criterion is relevant where uniformity of wear to machines or of workload to employees is desirable. An algorithm, called Workload Balancing (WB), is proposed for solving this problem. Moreover, we perform a simulation experiment to evaluate WB against several well-known heuristics in the literature. Lastly, we discuss the computational results obtained from the simulation experiment.  相似文献   
167.
We numerically verify that the non-symmetric interior penalty Galerkin method and the Oden-Babus?ka-Baumann method have sub-optimal convergence properties when measured in the L 2-norm for odd polynomial approximations. We provide numerical examples that use piece-wise linear and cubic polynomials to approximate a second-order elliptic problem in one and two dimensions.  相似文献   
168.
In this paper, we introduce and analyze a new discontinuous Galerkin method for solving the biharmonic problem Δ2 u=f. The method has two main, distinctive features, namely, it is amenable to an efficient implementation, and it displays new superconvergence properties. Indeed, although the method uses as separate unknowns u,? uu and ?Δu, the only globally coupled degrees of freedom are those of the approximations to u and Δu on the faces of the elements. This is why we say it can be efficiently implemented. We also prove that, when polynomials of degree at most k≥1 are used on all the variables, approximations of optimal convergence rates are obtained for both u and ? u; the approximations to Δu and ?Δu converge with order k+1/2 and k?1/2, respectively. Moreover, both the approximation of u as well as its numerical trace superconverge in L 2-like norms, to suitably chosen projections of u with order k+2 for k≥2. This allows the element-by-element construction of another approximation to u converging with order k+2 for k≥2. For k=0, we show that the approximation to u converges with order one, up to a logarithmic factor. Numerical experiments are provided which confirm the sharpness of our theoretical estimates.  相似文献   
169.
The dynamic response of magnetic order to optical excitation at sub-picosecond scale has offered an intriguing alternative for magnetism manipulation. Such ultrafast optical manipulation of magnetism has become a fundamental challenging topic with high implications for future spintronics. Here, this study demonstrates such manipulation in Co2FeSi films grown on flexible polyimide substrate, and demonstrates how the magneto-optical interaction can be modified by using strain engineering which in turn triggers the excitation of both dipolar and exchange spin waves modes. Furthermore, Gilbert damping and spin-orbit coupling in Co2FeSi can both be tuned significantly by altering the magnitude and type of applied strain, suggesting an appealing way to manipulate spin wave propagation. These results develop the optical manipulation magnetism into the field of spin wave dynamics, and open a new direction in the application of spin orbitronics and magnonics devices using strain engineering.  相似文献   
170.
This paper presents the design, implementation, and performance evaluation of a novel file uploading system. The system automatically uploads multimedia files to a centralized server given a client machine’s hard deadline—the time when a client machine will exhaust its available storage space due to on-going recording of media files. If existing files have not been uploaded and removed from the client machine’s hard disk by the deadlines, existing files may be overwritten or new files may not get created. Our uploading system was designed to provide a practical solution for emerging business needs. For instance, our system can be used in medical practice to gather videos generated from medical devices located in various procedure rooms for post-procedure analysis, and in law enforcement to collect video recordings from police cars during routine patrolling. Here we investigate two upload scheduling algorithms that determine which client machine should upload its file(s) first. We introduce two emergency control algorithms to handle situations when a client machine is about to exhaust its hard disk space. We evaluate the proposed algorithms via simulations and analysis. Our performance studies show that the upload scheduling algorithms and the emergency control algorithms have a significant impact on overall system performance.
Wallapak TavanapongEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号