全文获取类型
收费全文 | 128篇 |
免费 | 5篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 42篇 |
金属工艺 | 1篇 |
机械仪表 | 2篇 |
建筑科学 | 1篇 |
矿业工程 | 1篇 |
能源动力 | 2篇 |
轻工业 | 10篇 |
水利工程 | 3篇 |
无线电 | 16篇 |
一般工业技术 | 14篇 |
冶金工业 | 4篇 |
原子能技术 | 6篇 |
自动化技术 | 28篇 |
出版年
2023年 | 4篇 |
2022年 | 7篇 |
2021年 | 10篇 |
2020年 | 4篇 |
2019年 | 1篇 |
2018年 | 6篇 |
2017年 | 7篇 |
2016年 | 7篇 |
2015年 | 4篇 |
2014年 | 4篇 |
2013年 | 14篇 |
2012年 | 6篇 |
2011年 | 6篇 |
2010年 | 5篇 |
2009年 | 8篇 |
2008年 | 4篇 |
2007年 | 3篇 |
2006年 | 4篇 |
2005年 | 2篇 |
2004年 | 1篇 |
2002年 | 1篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1998年 | 1篇 |
1997年 | 6篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
排序方式: 共有133条查询结果,搜索用时 15 毫秒
1.
In this paper, we discuss a loop transformation framework that is based on integer non-singular matrices. The transformations
included in this framework are called Λ-transformations and include permutation, skewing and reversal, as well as a transformation
calledloop scaling. This framework is more general than existing ones; however, it is also more difficult to generate code in our framework.
This paper shows how integer lattice theory can be used to generate efficient code. An added advantage of our framework over
existing ones is that there is a simple completion algorithm which, given a partial transformation matrix, produces a full
transformation matrix that satisfies all dependences. This completion procedure has applications in parallelization and in
the generation of code for NUMA machines.
This work was supported by the Cornell Theory Center, NSF Presidential Young Investigator award #CCR-8958543. by NSF Grant
#CCR-9008526, and by a grant from the Hewlett-Packard Company. 相似文献
2.
Epilepsy is a neurological disorder which is characterized by transient and unexpected electrical disturbance of the brain. The electroencephalogram (EEG) is a commonly used signal for detection of epileptic seizures. This paper presents a new method for classification of ictal and seizure-free EEG signals. The proposed method is based on the empirical mode decomposition (EMD) and the second-order difference plot (SODP). The EMD method decomposes an EEG signal into a set of symmetric and band-limited signals termed as intrinsic mode functions (IMFs). The SODP of IMFs provides elliptical structure. The 95% confidence ellipse area measured from the SODP of IMFs has been used as a feature in order to discriminate seizure-free EEG signals from the epileptic seizure EEG signals. The feature space obtained from the ellipse area parameters of two IMFs has been used for classification of ictal and seizure-free EEG signals using the artificial neural network (ANN) classifier. It has been shown that the feature space formed using ellipse area parameters of first and second IMFs has given good classification performance. Experimental results on EEG database available by the University of Bonn, Germany, are included to illustrate the effectiveness of the proposed method. 相似文献
3.
The alkali hydrolysis of poly(ethylene terephthalate), anionic copolymer of poly(ethylene terephthalate), and block copolymer of poly(ethylene terephthalate)–poly(ethylene glycol) is investigated under a variety of conditions of alkali concentration in aqueous bath, additives, time, and temperature. Measurements of loss in weight, linear density, breaking load, tenacity, elongation to break apart from intrinsic viscosity, fiber density, COOH-end group content, diameter of filaments, and scanning electron micrographs have been analyzed to identify the differences in the action of alkali on these polymer materials. 相似文献
4.
We study dynamic routing in store-and-forward packet networks where each network link has bounded buffer capacity for receiving
incoming packets and is capable of transmitting a fixed number of packets per unit of time. At any moment in time, packets
are injected at various network nodes with each packet specifying its destination node. The goal is to maximize the throughput, defined as the number of packets delivered to their destinations.
In this paper, we make some progress on throughput maximization in various network topologies. Let n and m denote the number of nodes and links in the network, respectively. For line networks, we show that Nearest-to-Go (NTG), a
natural distributed greedy algorithm, is
-competitive, essentially matching a known
lower bound on the performance of any greedy algorithm. We also show that if we allow the online routing algorithm to make centralized decisions, there is a randomized
polylog(n)-competitive algorithm for line networks as well as for rooted tree networks, where each packet is destined for the root
of the tree. For grid graphs, we show that NTG has a competitive ratio of
while no greedy algorithm can achieve a ratio better than
. Finally, for arbitrary network topologies, we show that NTG is
-competitive, improving upon an earlier bound of O(mn).
An extended abstract appeared in the Proceedings of the 8th Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2005, Berkeley, CA, USA, pp. 1–13, Lecture Notes in Computer Science, vol. 1741, Springer, Berlin.
S. Angelov is supported in part by NSF Career Award CCR-0093117, NSF Award ITR 0205456 and NIGMS Award 1-P20-GM-6912-1.
S. Khanna is supported in part by an NSF Career Award CCR-0093117, NSF Award CCF-0429836, and a US-Israel Binational Science
Foundation Grant.
K. Kunal is supported in part by an NSF Career Award CCR-0093117 and NSF Award CCF-0429836. 相似文献
5.
Many mal-practices in stock market trading—e.g., circular trading and price manipulation—use the modus operandi of collusion. Informally, a set of traders is a candidate collusion set when they have “heavy trading” among themselves, as compared to their trading with others. We formalize the problem of detection of collusion sets, if any, in the given trading database. We show that naïve approaches are inefficient for real-life situations. We adapt and apply two well-known graph clustering algorithms for this problem. We also propose a new graph clustering algorithm, specifically tailored for detecting collusion sets. A novel feature of our approach is the use of Dempster–Schafer theory of evidence to combine the candidate collusion sets detected by individual algorithms. Treating individual experiments as evidence, this approach allows us to quantify the confidence (or belief) in the candidate collusion sets. We present detailed simulation experiments to demonstrate effectiveness of the proposed algorithms. 相似文献
6.
D. Patidar R. Sharma N. Jain T. P. Sharma N. S. Saxena 《Bulletin of Materials Science》2006,29(1):21-24
Chemical method has been used to prepare cadmium sulphide by using cadmium, hydrochloric acid and H2S. The reflection spectra of covered and uncovered sintered films of CdS have been recorded by ‘Hitachi spectrophotometer’
over the wavelength range 300–700 nm. The energy band gaps of these films have been calculated from reflection spectra. It
is found that the energy band gap of both films is same as 2.41 eV. It is indicated that energy band gap of these films does
not change. This value of band gap is in good agreement with the value reported by other workers. The measurement of photocurrent
has also been carried out using Keithley High Resistance meter/ Electrometer. This film shows the high photosensitivity and
high photocurrent decay. Thus so obtained films are suitable for fabrication of photo detectors and solar cells. 相似文献
7.
Fractal symbolic analysis is a symbolic analysis technique for verifying the legality of program transformations. It is strictly more powerful than dependence analysis; for example, it can be used to verify the legality of blocking LU factorization with pivoting, a task for which dependence analysis is inadequate. In this paper, we show how fractal symbolic analysis can be used to convert between left- and right-looking versions of three kernels of central importance in computational science: triangular solve, Cholesky factorization, and LU factorization with pivoting. 相似文献
8.
9.
Roy Partha Pratim Kumar Pradeep Patidar Shweta Saini Rajkumar 《Multimedia Tools and Applications》2021,80(8):11671-11689
Multimedia Tools and Applications - Leap motion sensor provides a new way of interaction with computers or mobile devices. With this sensor, users can write in air by moving palm or finger, thus,... 相似文献
10.
Kailas L. Wasewar Diwakar Shende Amit Keshav 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》2011,86(2):319-323
Itaconic acid finds a place in various industrial applications. It can be produced by biocultivation in a clean and environment friendly route but recovery of the acid from the dilute stream of the bioreactor is an economic problem. Reactive extraction is a promising method to recover carboxylic acid but suffers from toxicity problems of the diluent and extractant employed. So there is need for a non‐toxic extractant and diluent or a combination of less toxic extractants in a non‐toxic diluent that can recover acid efficiently. Effect of different extractants: tri‐n‐butylphosphate (TBP) (an organophosporous compound) and Aliquat 336 (a quaternary amine) in sunflower oil was studied to find the best extractant–sunflower oil combination. Equilibrium complexation constant, KE, values of 1.789 and 2.385 m3 kmol?1, respectively, were obtained for itaconic acid extraction using TBP and Aliquat 336 in sunflower oil. The problem of toxicity in reactive extraction can be reduced by using a natural non‐toxic diluent (sunflower oil) with the extractant. Copyright © 2010 Society of Chemical Industry 相似文献