全文获取类型
收费全文 | 120篇 |
免费 | 12篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 13篇 |
综合类 | 5篇 |
化学工业 | 1篇 |
机械仪表 | 2篇 |
建筑科学 | 3篇 |
能源动力 | 2篇 |
水利工程 | 4篇 |
武器工业 | 2篇 |
无线电 | 31篇 |
一般工业技术 | 10篇 |
冶金工业 | 7篇 |
自动化技术 | 72篇 |
出版年
2024年 | 1篇 |
2021年 | 3篇 |
2020年 | 2篇 |
2019年 | 5篇 |
2018年 | 6篇 |
2017年 | 2篇 |
2016年 | 4篇 |
2015年 | 3篇 |
2014年 | 11篇 |
2013年 | 5篇 |
2012年 | 8篇 |
2011年 | 13篇 |
2010年 | 6篇 |
2009年 | 7篇 |
2008年 | 15篇 |
2007年 | 14篇 |
2006年 | 12篇 |
2005年 | 8篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1987年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有152条查询结果,搜索用时 78 毫秒
51.
Massimo Alioto Elio Consoli Gaetano Palumbo 《International Journal of Circuit Theory and Applications》2012,40(8):815-834
In this paper, the adoption of general metrics of the energy‐delay tradeoff is investigated to achieve energy‐efficient design of digital CMOS very large‐scale integrated circuits. Indeed, as shown in a preliminary analysis on the performance of various commercial microprocessors, a wide range of EiDj metrics is typically adopted. Physical interpretation and interesting properties for the designs minimizing EiDj metrics are provided together with the adoption of the Logical Effort theory to define practical design constraints. Two design examples in a 65‐nm CMOS technology are also reported to exemplify the theoretical results. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
52.
53.
A MIMO multi‐way relay channel with full data exchange in which K users exchange messages with each other via the help of a single relay is considered. For the case in which each link is quasi‐static Rayleigh fading and the relay is full‐duplex, the fundamental diversity‐multiplexing tradeoff (DMT) is investigated, and we show that a compress‐and‐forward relay protocol can achieve the optimal DMT. 相似文献
54.
T. Burr M. S. Hamada T. L. Graves S. Myers 《Quality and Reliability Engineering International》2009,25(8):899-911
The performance of Radio‐Isotope IDentification (RIID) algorithms using gamma spectroscopy is increasingly becoming important. For example, sensors at locations that screen for illicit nuclear material rely on isotope identification to resolve innocent nuisance alarms arising from naturally occurring radioactive material. Recent data collections for RIID testing consist of repeat measurements for each of several scenarios to test RIID algorithms. Efficient allocation of measurement resources requires an appropriate number of repeats for each scenario. To help allocate measurement resources in such data collections for RIID algorithm testing, we consider using only a few real repeats per scenario. In order to reduce uncertainty in the estimated RIID algorithm performance for each scenario, the potential merit of augmenting these real repeats with realistic synthetic repeats is also considered. Our results suggest that for the scenarios and algorithms considered, approximately 10 real repeats augmented with simulated repeats will result in an estimate having comparable uncertainty to the estimate based on using 60 real repeats. Published in 2009 by John Wiley & Sons, Ltd. 相似文献
55.
Qinling Zhong Hongliang Hu Baofang Fan Cheng Zhu Zhixiang Chen 《International journal of molecular sciences》2021,22(21)
Salicylic acid (SA) is an important plant hormone with a critical role in plant defense against pathogen infection. Despite extensive research over the past 30 year or so, SA biosynthesis and its complex roles in plant defense are still not fully understood. Even though earlier biochemical studies suggested that plants synthesize SA from cinnamate produced by phenylalanine ammonia lyase (PAL), genetic analysis has indicated that in Arabidopsis, the bulk of SA is synthesized from isochorismate (IC) produced by IC synthase (ICS). Recent studies have further established the enzymes responsible for the conversion of IC to SA in Arabidopsis. However, it remains unclear whether other plants also rely on the ICS pathway for SA biosynthesis. SA induces defense genes against biotrophic pathogens, but represses genes involved in growth for balancing defense and growth to a great extent through crosstalk with the growth-promoting plant hormone auxin. Important progress has been made recently in understanding how SA attenuates plant growth by regulating the biosynthesis, transport, and signaling of auxin. In this review, we summarize recent progress in the biosynthesis and the broad roles of SA in regulating plant growth during defense responses. Further understanding of SA production and its regulation of both defense and growth will be critical for developing better knowledge to improve the disease resistance and fitness of crops. 相似文献
56.
57.
基于场景的软件体系结构评估方法通过场景将系统的质量需求转换为风险承担者与系统的交互活动 ,通过低代价的事前评估活动降低软件的质量风险。 SAAM及 ATAM两种方法在具体的实际评估活动中,它们在场景的生成、风险承担者的商业动机的表述、软件体系结构的描述等方面存在着很大的不同,两种评估方法各有特长 ,其评估方法在具体的场景执行环节上具有不确定性 ,将定量的度量方法与定性场景结合是提高评估的有效途径。 相似文献
58.
背包问题无存储冲突的并行三表算法 总被引:4,自引:0,他引:4
背包问题属于经典的NP难问题,在信息密码学和数论等研究中具有极重要的应用,将求解背包问题著名的二表算法的设计思想应用于三表搜索中,利用分治策略和无存储冲突的最优归并算法,提出一种基于EREW-SIMD共享存储模型的并行三表算法,算法使用O(2^n/4)个处理机单元和O(2^3n/8)的共享存储空间,在O(2^3n/8)时间内求解n维背包问题.将提出的算法与已有文献结论进行的对比分析表明:文中算法明显改进了现有文献的研究结果,是一种可在小于O(2^n/2)的硬件资源上,以小于O(2n/2)的计算时问求解背包问题的无存储冲突并行算法。 相似文献
59.
Algorithms based on upper confidence bounds for balancing exploration and exploitation are gaining popularity since they are easy to implement, efficient and effective. This paper considers a variant of the basic algorithm for the stochastic, multi-armed bandit problem that takes into account the empirical variance of the different arms. In earlier experimental works, such algorithms were found to outperform the competing algorithms. We provide the first analysis of the expected regret for such algorithms. As expected, our results show that the algorithm that uses the variance estimates has a major advantage over its alternatives that do not use such estimates provided that the variances of the payoffs of the suboptimal arms are low. We also prove that the regret concentrates only at a polynomial rate. This holds for all the upper confidence bound based algorithms and for all bandit problems except those special ones where with probability one the payoff obtained by pulling the optimal arm is larger than the expected payoff for the second best arm. Hence, although upper confidence bound bandit algorithms achieve logarithmic expected regret rates, they might not be suitable for a risk-averse decision maker. We illustrate some of the results by computer simulations. 相似文献
60.
In this paper, a Multitree Genetic Programming-based method is developed to learn an INTerpretable and ACcurate Takagi-Sugeno-Kang (TSK) fuzzy rule based sYstem (MGP-INTACTSKY) for dynamic portfolio trading. The MGP-INTACTSKY utilizes a TSK model with a new structure to develop a more interpretable and accurate system for dynamic portfolio trading. In the new structure of TSK, disjunctive normal form rules with variable structured consequent parts are developed in which the absence of some input variables is allowed. Input variables are the most influential technical indices which are selected by stepwise regression analysis. The technical indices are computed using wavelet transformed stock price series to eliminate the noise. The proposed system directly induces the preferred portfolio weights from the stock's technical indices through time. Here, genetic programming with the multitree structure is applied to learn the TSK fuzzy rule bases with the Pittsburgh approach. With this approach, the correlation of different stocks is properly considered during the evolutionary process. To evaluate the performance of the MGP-INTACTSKY for portfolio trading, the proposed model is implemented on the Tehran Stock Exchange as an emerging market as well as Toronto and Frankfurt Stock Exchanges as two mature markets. The experimental results show that the proposed model outperforms other methods such as the momentum strategy, the multitree genetic programming-based crisp system, the genetic algorithm-based first order TSK system, the buy and hold approach and the market's main index in terms of accuracy and interpretability. 相似文献