首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   76篇
  免费   1篇
电工技术   1篇
化学工业   22篇
金属工艺   3篇
机械仪表   1篇
轻工业   8篇
水利工程   2篇
无线电   6篇
一般工业技术   11篇
自动化技术   23篇
  2021年   1篇
  2018年   2篇
  2017年   1篇
  2016年   2篇
  2014年   1篇
  2013年   3篇
  2012年   5篇
  2011年   3篇
  2010年   4篇
  2009年   3篇
  2008年   7篇
  2007年   1篇
  2006年   4篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   3篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1986年   2篇
  1985年   6篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1978年   1篇
  1976年   3篇
  1973年   1篇
排序方式: 共有77条查询结果,搜索用时 15 毫秒
1.
2.
Amitabha Ghosh 《Lipids》1985,20(1):56-56
  相似文献   
3.
Two unusual lipid classes were detected by thin-layer chromatography in the neutral lipids derived from goat cauda-epididymal sperm plasma membrane. The lipids were identified as wax esters and 1-O-alkyl-2,3-diacylglycerols based on chromatographic properties, identity of their hydrolysis products, and infrared/1H nuclear magnetic resonance spectral evidence. The membrane containedca. 3 and 5 μg/mg protein of wax esters and alkyldiacylglycerols, respectively. The relative proportions of wax esters and alkyldiacylglycerols in the total neutral lipids were 1.5% and 2.4%, respectively. The lipids contained fatty acids with chain lengths of C14 to C22. The major fatty acids of the wax esters were 14∶0, 16∶0, 16∶1ω7, 18∶0 and 18∶1ω9. The fatty acids in alkyldiacylglycerol were 16∶0, 18∶0, 22∶5ω3 and 22∶6ω3. Alkyldiacylglycerol was particularly rich in docosahexaenoic acid 22∶6ω3) representing 30% of the total fatty acids. The alcohols of wax ester were all saturated with C20–C29 carbon chains. The deacylated products derived from alkyldiacylglycerols were identified as hexadecyl, octadecyl and octadec-9′-enyl glycerol ethers.  相似文献   
4.
In human designer usage, symbols have a rich semantics, grounded on experience, which permits flexible usage — e.g. design ideation is improved by meanings triggered by contrastive words. In computational usage however, symbols are syntactic tokens whose semantics is mostly left to the implementation, resulting in brittle failures in many knowledge-based systems. Here we ask if one may define symbols in computational design as {label,meaning} pairs, as opposed to merely the label. We consider three questions that must be answered to bootstrap a symbol learning process: (a) which concepts are most relevant in a given domain, (b) how to define the semantics of such symbols, and (c) how to learn labels for these so as to form a grounded symbol. We propose that relevant symbols may be discovered by learning patterns of functional viability. The stable patterns are information-conserving codes, also called chunks in cognitive science, which relate to the process of acquiring expertise in humans. Regions of a design space that contain functionally superior designs can be mapped to a lower-dimensional manifold; the inter-relations of the design variables discovered thus constitute the chunks. Using these as the initial semantics for symbols, we show how the system can acquire labels for them by communicating with human designers. We demonstrate the first steps in this process in our baby designer approach, by learning two early grounded symbols, tight and loose.  相似文献   
5.
Coverage and connectivity issues in wireless sensor networks: A survey   总被引:7,自引:0,他引:7  
Sensing coverage and network connectivity are two of the most fundamental problems in wireless sensor networks. Finding an optimal node deployment strategy that would minimize cost, reduce computation and communication overhead, be resilient to node failures, and provide a high degree of coverage with network connectivity is extremely challenging. Coverage and connectivity together can be treated as a measure of quality of service in a sensor network; it tells us how well each point in the region is covered and how accurate is the information gathered by the nodes. Therefore, maximizing coverage as well as maintaining network connectivity using the resource constrained nodes is a non-trivial problem. In this survey article, we present and compare several state-of-the-art algorithms and techniques that aim to address this coverage–connectivity issue.  相似文献   
6.
Catalytic isomerization of safflower oil with rhodium complexes   总被引:1,自引:0,他引:1  
Cationic rhodium (I) complexes of the type [(NBD)RhL2]+ ClO4 (NBD, norbornadiene; L, triphenyl phosphine or diphenyl phosphino ethane) have been studied as catalysts for the isomerization of methyl linoleate and safflower oil. The catalysts gave very good yields of conjugated products with both oil and methyl linoleate. Isomerization could be carried out under very mild conditions (55–65 C, 1 atm N2). Although the catalyst undergoes transformation in the course of the reaction, it maintains its catalytic activity. In fact, the catalysts isolated from the reaction with safflower oil were recycled with practically no loss of activity.  相似文献   
7.
A compiler optimization is sound if the optimized program that it produces is semantically equivalent to the input program. The proofs of semantic equivalence are usually tedious. To reduce the efforts required, we identify a set of common transformation primitives that can be composed sequentially to obtain specifications of optimizing transformations. We also identify the conditions under which the transformation primitives preserve semantics and prove their sufficiency. Consequently, proving the soundness of an optimization reduces to showing that the soundness conditions of the underlying transformation primitives are satisfied.The program analysis required for optimization is defined over the input program whereas the soundness conditions of a transformation primitive need to be shown on the version of the program on which it is applied. We express both in a temporal logic. We also develop a logic called temporal transformation logic to correlate temporal properties over a program (seen as a Kripke structure) and its transformation.An interesting possibility created by this approach is a novel scheme for validating optimizer implementations. An optimizer can be instrumented to generate a trace of its transformations in terms of the transformation primitives. Conformance of the trace with the optimizer can be checked through simulation. If soundness conditions of the underlying primitives are satisfied by the trace then it preserves semantics.  相似文献   
8.
In this work we characterize the session-level behavior of users on an Indian mobile phone comparison shopping website. We also correlate the popularity of handset on various news sources to its popularity on the shopping website. There are three aspects to our study: data analysis, correlation between news sources of product information and popularity of a handset, and behavior prediction. We have used KL divergence to show that a time-homogeneous Markov chain is observed when the number of clicks varies from 5 to 30. Our results depict that Markov chain model does not hold in entirety for comparison shopping setting but tells us how far the Markov chain model holds for this setting. Our analysis corroborates intuition that increasing price leads to decrease in popularity. After the strong correlation between various variables and user behavior was found, we predict the users macro (the overall sales of handset) and micro behavior (whether a user will convert or exit the site) using Markov logic networks. Our predictive model validates the intuition that past browsing behavior is an important predictor for future behavior. Methodology of combining data analysis with machine learning is, in our opinion, a new approach to the empirical study of such data sets.  相似文献   
9.
Usable groundwater resources have strategic significance, given the arid climate of Kuwait. Assessment of groundwater resources through modelling is considered of paramount importance for sustained long‐term development of this resource. A conceptual model of the regional hydrogeology of the area has been developed based on the available data. Three aquifers were recognized within the Dammam Formation‐Kuwait Group sequence. VTDN software was used for numerical simulation of the groundwater flow in this aquifer system under steady‐state conditions. Calibration runs made to date suggest that the model is sensitive to the vertical coefficient of permeability of the aquitards and the horizontal transmissi‐vities of the aquifers. The water balance achieved shows that the contribution from the natural recharge from precipitation is insignificant.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号