首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   296篇
  免费   8篇
电工技术   1篇
化学工业   50篇
金属工艺   1篇
机械仪表   4篇
能源动力   1篇
轻工业   5篇
石油天然气   2篇
无线电   56篇
一般工业技术   36篇
冶金工业   21篇
自动化技术   127篇
  2021年   7篇
  2020年   6篇
  2018年   2篇
  2017年   7篇
  2016年   6篇
  2015年   8篇
  2014年   5篇
  2013年   16篇
  2012年   2篇
  2011年   5篇
  2010年   17篇
  2009年   17篇
  2008年   17篇
  2007年   10篇
  2006年   13篇
  2005年   9篇
  2004年   3篇
  2003年   8篇
  2002年   7篇
  2001年   6篇
  2000年   5篇
  1999年   7篇
  1998年   10篇
  1997年   6篇
  1996年   9篇
  1995年   8篇
  1994年   7篇
  1993年   6篇
  1992年   7篇
  1991年   6篇
  1990年   6篇
  1989年   4篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1984年   6篇
  1983年   3篇
  1982年   2篇
  1981年   6篇
  1980年   3篇
  1979年   1篇
  1978年   3篇
  1977年   3篇
  1976年   7篇
  1975年   3篇
  1974年   2篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有304条查询结果,搜索用时 31 毫秒
1.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
2.
We show how to construct pseudo-random permutations that satisfy a certain cycle restriction, for example that the permutation be cyclic (consisting of one cycle containing all the elements) or an involution (a self-inverse permutation) with no fixed points. The construction can be based on any (unrestricted) pseudo-random permutation. The resulting permutations are defined succinctly and their evaluation at a given point is efficient. Furthermore, they enjoy a fast forward property, i.e. it is possible to iterate them at a very small cost. Received 10 August 2000 and revised 30 September 2000 Online publication 9 April 2001  相似文献   
3.
History is bunk, declared Henry Ford; he wanted to sell new cars every year. For psychoanalysis history is not bunk; it is its very heart and guts. Like an individual or a nation, psychoanalysis lives its history and rediscovers it in every generation. Psychoanalytic pioneers, authors of new rallying cries and new theories, seem to think otherwise: History of psychoanalysis begins with them. The author suggests a different approach: to see the new as a historical continuity of the old. The advocates of the relational approach in psychoanalysis will be surprised to hear that Freud was a Sullivanian, even though--like the proverbial M. Jourdain who never heard the word prose--he never heard of the word interpersonal. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
The active component of the sex pheromone ofMatsucoccus josephi is (2E,6E,8E)-5,7-dimethyl-2,6,8-decatrien-4-one; the chemical is also a powerful kairomone of adult males and females of the bugElatophilus hebraicus the principal predator ofM. josephi. The presence of theZ isomer (2E,6Z,8E)-5,7-dimethyl-2,6,8-decatrien-4-one does not interfere with the attractancy of the activeE component forM. josephi males or the bug. Our results show a clear dose-response between trap catch ofM. josephi males andE. hebraicus. Conversely, increasing amounts of theZ isomer in the mixture did not affect the attraction of the scale insect males or the bug. The catch ofM. josephi males did not differ significantly among traps of different color, and was significantly higher with traps attached to the tree trunk than those suspended between trees. Comparison of the catch ofM. josephi among the three forests and between pine species suggests that the level of infestation ofPinus halepepsis andPinus brutia ssp.brutia is similar, despite the fact that the latter pine is resistant to the scale insect. Both sexes ofE. hebraicus were trapped in much lower numbers at the more infested sites. This may be related to interference with the activity ofE. hebraicus due to deterioration and drying of parts of the tree crowns and heavy colonization by generalist predators in injured trees.  相似文献   
5.
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle, without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the verifier. In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature. In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just simple playing cards. The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols are meant to be understood by “lay-people” and implementable without the use of computers. Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246. Research of M. Naor was supported in part by a grant from the Israel Science Foundation. Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06). Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297.  相似文献   
6.
Detecting computer worms is a highly challenging task. We present a new approach that uses artificial neural networks (ANN) to detect the presence of computer worms based on measurements of computer behavior. We compare ANN to three other classification methods and show the advantages of ANN for detection of known worms. We then proceed to evaluate ANN’s ability to detect the presence of an unknown worm. As the measurement of a large number of system features may require significant computational resources, we evaluate three feature selection techniques. We show that, using only five features, one can detect an unknown worm with an average accuracy of 90%. We use a causal index analysis of our trained ANN to identify rules that explain the relationships between the selected features and the identity of each worm. Finally, we discuss the possible application of our approach to host-based intrusion detection systems.  相似文献   
7.
Computational modeling and its application in ligand screening and ligand receptor interaction studies play important roles in structure-based drug design. A series of sphingosine 1-phosphate (S1P) receptor ligands with varying potencies and receptor selectivities were docked into homology models of the S1P(1-5) receptors. These studies provided molecular insights into pharmacological trends both across the receptor family as well as at single receptors. This study identifies ligand recognition features that generalize across the S1P receptor family, features unique to the S1P(4) and S1P(5) receptors, and suggests significant structural differences of the S1P(2) receptor. Docking results reveal a previously unknown sulfur-aromatic interaction between the S1P(4) C5.44 sulfur atom and the phenyl ring of benzimidazole as well as pi-pi interaction between F3.33 of S1P(1,4,5) and aromatic ligands. The findings not only confirm the importance of a cation-pi interaction between W4.64 and the ammonium of S1P at S1P(4) but also predict the same interaction at S1P(5). S1P receptor models are validated for pharmacophore development including database mining and new ligand discovery and serve as tools for ligand optimization to improve potency and selectivity.  相似文献   
8.
The influence of swirl on the shape of the Burke-Schumann reaction sheet in a straight cylindrical pipe is investigated by asymptotic and numerical means. Attention is confined to swirl levels that are near the critical value at which vortex breakdown occurs. A high-Reynolds-number, laminar, isothermal, low-Mach-number reacting flow is considered. An asymptotic analysis is developed to study the nonlinear interaction between near-critical swirl and mixture fraction distribution within the flow. It is first shown that leading-order perturbation of the velocity field from the columnar state, generated by the interaction of near-critical swirl and low viscosity, can be described by a nonlinear reduced-order model. This flow perturbation is computed, and then employed to determine the correction to the classical Burke-Schumann solution. Under lean conditions of reaction the reaction sheet becomes shorter and more compact as swirl is increased. For rich conditions of reaction, increasing swirl first causes the reaction-sheet length to decrease, and then increase after vortex breakdown has appeared. Numerical simulations of the flow and reaction-zone shape are substantiated by, and supplement, the asymptotic results.  相似文献   
9.
A differential improvement modification to Hybrid Genetic Algorithms is proposed. The general idea is to perform more extensive improvement algorithms on higher quality solutions. Our proposed Differential Improvement (DI) approach is of rather general character. It can be implemented in many different ways. The paradigm remains invariant and can be easily applied to a wider class of optimization problems. Moreover, the DI framework can also be used within other Hybrid metaheuristics like Hybrid Scatter Search algorithms, Particle Swarm Optimization, or Bee Colony Optimization techniques.  相似文献   
10.
The fabrication of cellulose-spider silk bio-nanocomposites comprised of cellulose nanocrystals (CNCs) and recombinant spider silk protein fused to a cellulose binding domain (CBD) is described. Silk-CBD successfully binds cellulose, and unlike recombinant silk alone, silk-CBD self-assembles into microfibrils even in the absence of CNCs. Silk-CBD-CNC composite sponges and films show changes in internal structure and CNC alignment related to the addition of silk-CBD. The silk-CBD sponges exhibit improved thermal and structural characteristics in comparison to control recombinant spider silk sponges. The glass transition temperature (Tg) of the silk-CBD sponge was higher than the control silk sponge and similar to native dragline spider silk fibers. Gel filtration analysis, dynamic light scattering (DLS), small angle X-ray scattering (SAXS) and cryo-transmission electron microscopy (TEM) indicated that silk-CBD, but not the recombinant silk control, formed a nematic liquid crystalline phase similar to that observed in native spider silk during the silk spinning process. Silk-CBD microfibrils spontaneously formed in solution upon ultrasonication. We suggest a model for silk-CBD assembly that implicates CBD in the central role of driving the dimerization of spider silk monomers, a process essential to the molecular assembly of spider-silk nanofibers and silk-CNC composites.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号