全文获取类型
收费全文 | 272篇 |
免费 | 9篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 48篇 |
金属工艺 | 7篇 |
机械仪表 | 7篇 |
建筑科学 | 10篇 |
能源动力 | 21篇 |
轻工业 | 13篇 |
水利工程 | 6篇 |
无线电 | 40篇 |
一般工业技术 | 65篇 |
冶金工业 | 8篇 |
原子能技术 | 4篇 |
自动化技术 | 50篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 17篇 |
2021年 | 17篇 |
2020年 | 13篇 |
2019年 | 12篇 |
2018年 | 14篇 |
2017年 | 16篇 |
2016年 | 7篇 |
2015年 | 10篇 |
2014年 | 11篇 |
2013年 | 19篇 |
2012年 | 18篇 |
2011年 | 18篇 |
2010年 | 15篇 |
2009年 | 21篇 |
2008年 | 7篇 |
2007年 | 15篇 |
2006年 | 9篇 |
2005年 | 8篇 |
2004年 | 6篇 |
2003年 | 6篇 |
2002年 | 1篇 |
2001年 | 3篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
排序方式: 共有282条查询结果,搜索用时 15 毫秒
1.
We consider a system comprising a finite number of nodes, with infinite packet buffers, that use unslotted ALOHA with Code
Division Multiple Access (CDMA) to share a channel for transmitting packetised data. We propose a simple model for packet
transmission and retransmission at each node, and show that saturation throughput in this model yields a sufficient condition
for the stability of the packet buffers; we interpret this as the capacity of the access method. We calculate and compare
the capacities of CDMA‐ALOHA (with and without code sharing) and TDMA‐ALOHA; we also consider carrier sensing and collision
detection versions of these protocols. In each case, saturation throughput can be obtained via analysis of a continuous time
Markov chain. Our results show how saturation throughput degrades with code‐sharing. Finally, we also present some simulation
results for mean packet delay. Our work is motivated by optical CDMA in which “chips” can be optically generated, and hence
the achievable chip rate can exceed the achievable TDMA bit rate which is limited by electronics. Code sharing may be useful
in the optical CDMA context as it reduces the number of optical correlators at the receivers. Our throughput results help
to quantify by how much the CDMA chip rate should exceed the TDMA bit rate so that CDMA‐ALOHA yields better capacity than
TDMA‐ALOHA.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
2.
A role for isothiocyanates in plant resistance against the specialist herbivore Pieris rapae 总被引:8,自引:1,他引:8
We experimentally reanalyzed the classic interaction between Pieris rapae, a specialist lepidopteran herbivore, and isothiocyanates (mustard oils) that are characteristic phytochemicals of the Brassicaceae. Previous investigations have suggested that P. rapae is unaffected by isothiocyanates. Using whole plants, root extracts, and a microencapsulated formulation of allyl isothiocyanate, we now show that isothiocyanates reduce herbivore survival and growth, and increase development time, each in a dose-dependent manner. Neither the substrate allyl glucosinolate, nor myrosinase, the enzyme that results in the breakdown of glucosinolates, negatively affected P. rapae. Thus, we present strong evidence for a role for isothiocyanates in plant resistance against the specialist herbivore P. rapae. 相似文献
3.
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP-controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is well known that because of packet losses due to finite buffers at the AP, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno. The models are validated in comparison with NS2 simulations. 相似文献
4.
Robert Jay Milewski Venu Govindaraju Anurag Bhardwaj 《International Journal on Document Analysis and Recognition》2009,11(4):203-218
A new paradigm, which models the relationships between handwriting and topic categories, in the context of medical forms,
is presented. The ultimate goals are: (1) a robust method which categorizes medical forms into specified categories, and (2)
the use of such information for practical applications such as an improved recognition of medical handwriting or retrieval
of medical forms as in a search engine. Medical forms have diverse, complex and large lexicons consisting of English, Medical
and Pharmacology corpus. Our technique shows that a few recognized characters, returned by handwriting recognition, can be
used to construct a linguistic model capable of representing a medical topic category. This allows (1) a reduced lexicon to
be constructed, thereby improving handwriting recognition performance, and (2) PCR (Pre-Hospital Care Report) forms to be
tagged with a topic category and subsequently searched by information retrieval systems. We present an improvement of over
7% in raw recognition rate and a mean average precision of 0.28 over a set of 1,175 queries on a data set of unconstrained
handwritten medical forms filled in emergency environments.
This work was supported by the National Science Foundation. 相似文献
5.
Huaigu Cao Venu Govindaraju Anurag Bhardwaj 《International Journal on Document Analysis and Recognition》2011,14(2):145-157
With the ever-increasing growth of the World Wide Web, there is an urgent need for an efficient information retrieval system
that can search and retrieve handwritten documents when presented with user queries. However, unconstrained handwriting recognition
remains a challenging task with inadequate performance thus proving to be a major hurdle in providing robust search experience
in handwritten documents. In this paper, we describe our recent research with focus on information retrieval from noisy text
derived from imperfect handwriting recognizers. First, we describe a novel term frequency estimation technique incorporating
the word segmentation information inside the retrieval framework to improve the overall system performance. Second, we outline
a taxonomy of different techniques used for addressing the noisy text retrieval task. The first method uses a novel bootstrapping
mechanism to refine the OCR’ed text and uses the cleaned text for retrieval. The second method uses the uncorrected or raw
OCR’ed text but modifies the standard vector space model for handling noisy text issues. The third method employs robust image
features to index the documents instead of using noisy OCR’ed text. We describe these techniques in detail and also discuss
their performance measures using standard IR evaluation metrics. 相似文献
6.
Research on fine tuning stabilization properties has received attention for more than a decade. This paper presents probabilistic algorithms for fault containment. We demonstrate two exercises in fault containment in a weakly stabilizing system, which expedite recovery from single failures, and confine the effect of any single fault to the constant-distance neighborhood of the faulty process. The most significant aspect of the algorithms is that the fault gap, defined as the smallest interval after which the system is ready to handle the next single fault with the same efficiency, is independent of the network size. We argue that a small fault gap increases the availability of the fault-free system. 相似文献
7.
Most existing solutions to group security in Mobile Ad Hoc Networks (MANETs) rely on a multicast Core Based Tree (CBT) for key distribution. Such solutions, although suitable for systems with low mobility and static characteristics, are unsuitable for dynamic and sparse groups with changing neighborhoods. In this paper, we propose an entirely decentralized key generation mechanism, employing a central trusted entity only during initialization. Using our approach, keys can be established between group members with absolutely no prior communication. The solution relies on threshold cryptography and introduces a novel concept of Node-Group-Key (NGK) mapping. We have provided an extensive analytical model for the computations involved and communication costs and have also provided a lie detection mechanism. Simulation results show appreciable performance improvement and enhanced robustness. 相似文献
8.
M2Tracker: A Multi-View Approach to Segmenting and Tracking People in a Cluttered Scene 总被引:1,自引:0,他引:1
When occlusion is minimal, a single camera is generally sufficient to detect and track objects. However, when the density of objects is high, the resulting occlusion and lack of visibility suggests the use of multiple cameras and collaboration between them so that an object is detected using information available from all the cameras in the scene.In this paper, we present a system that is capable of segmenting, detecting and tracking multiple people in a cluttered scene using multiple synchronized surveillance cameras located far from each other. The system is fully automatic, and takes decisions about object detection and tracking using evidence collected from many pairs of cameras. Innovations that help us tackle the problem include a region-based stereo algorithm capable of finding 3D points inside an object knowing only the projections of the object (as a whole) in two views, a segmentation algorithm using bayesian classification and the use of occlusion analysis to combine evidence from different camera pairs.The system has been tested using different densities of people in the scene. This helps us determine the number of cameras required for a particular density of people. Experiments have also been conducted to verify and quantify the efficacy of the occlusion analysis scheme. 相似文献
9.
Shukla R Banerjee P Sharma SK Das R Deb P Prabaharan T Das B Adhikary B Verma R Shyam A 《The Review of scientific instruments》2011,82(10):106103
The experimental results of an air-core pulse transformer are presented, which is very compact (<10 Kg in weight) and is primed by a capacitor bank that is fabricated in such a way that the capacitor bank with its switch takes the shape of single-turn rectangular shaped primary of the transformer. A high voltage capacitor assembly (pulse-forming-line capacitor, PFL) of 5.1 nF is connected with the secondary of transformer. The transformer output voltage is 160 kV in its second peak appearing in less than 2 μS from the beginning of the capacitor discharge. The primary capacitor bank can be charged up to a maximum of 18 kV, with the voltage delivery of 360 kV in similar capacitive loads. 相似文献
10.
Anurag Gupta Bruce C. Kim Eugene Edwards Christina Brantley Paul Ruffin 《Materials Science and Engineering: B》2012,177(18):1583-1588
High-quality zinc oxide (ZnO) nanowires were synthesized using the atmospheric chemical vapor deposition technique and were appropriately characterized. Subsequently, the nanowire surface was covalently grafted with 1-pyrenebutyric acid (PBA) fluorophore, and surface-sensitive X-ray photoelectron spectroscopy and Fourier transform infrared-attenuated total reflectance spectroscopy were utilized to confirm the functionalization of 1-pyrenebutyric acid on the nanowire surface. Additionally, photoluminescence (PL) measurements were used to evaluate the optical behavior of pristine nanowires. Through fluorescence quenching of 1-pyrenebutyric acid by p-nitrophenol, a detection limit of 28 ppb was estimated. Based on these findings, ZnO nanowires functionalized with 1-pyrenebutyric acid are envisaged as extremely sensitive platforms for the ultra-trace detection of p-nitrophenol in biological systems. 相似文献