全文获取类型
收费全文 | 101篇 |
免费 | 3篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 15篇 |
建筑科学 | 1篇 |
矿业工程 | 1篇 |
轻工业 | 8篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 11篇 |
一般工业技术 | 19篇 |
冶金工业 | 27篇 |
自动化技术 | 18篇 |
出版年
2021年 | 1篇 |
2020年 | 1篇 |
2018年 | 2篇 |
2016年 | 3篇 |
2015年 | 1篇 |
2014年 | 4篇 |
2013年 | 6篇 |
2012年 | 3篇 |
2011年 | 7篇 |
2010年 | 4篇 |
2009年 | 1篇 |
2008年 | 2篇 |
2007年 | 1篇 |
2006年 | 4篇 |
2005年 | 3篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 3篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 13篇 |
1997年 | 5篇 |
1996年 | 13篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1980年 | 2篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1960年 | 1篇 |
排序方式: 共有104条查询结果,搜索用时 31 毫秒
1.
Pan J.S. McInnes F.R. Jack M.A. 《Vision, Image and Signal Processing, IEE Proceedings -》1996,143(1):67-71
A bound for a Minkowski metric based on Lp distortion measure is proposed and evaluated as a means to reduce the computation in vector quantisation. This bound provides a better criterion than the absolute error inequality (AEI) elimination rule on the Euclidean distortion measure. For the Minkowski metric of order n, this bound contributes the elimination criterion from the L1 metric to L n metric. This bound can also be an extended quadratic metric which can be a hidden Markov model (HMM) with a Gaussian mixture probability density function (PDF). In speech recognition, the HMM with the Gaussian mixture VQ codebook PDF has been shown to be a promising method 相似文献
2.
3.
4.
Andrews MJ Kontopidis G McInnes C Plater A Innes L Cowan A Jewsbury P Fischer PM 《Chembiochem : a European journal of chemical biology》2006,7(12):1909-1915
We describe a drug-design strategy termed REPLACE (REplacement with Partial Ligand Alternatives through Computational Enrichment) in which nonpeptidic surrogates for specific determinants of known peptide ligands are identified in silico by using a core peptide-bound protein structure as a design anchor. In the REPLACE application example, we present the effective replacement of two critical binding motifs in a lead protein-protein interaction inhibitor pentapeptide with more druglike phenyltriazole and diphenyl ether groups. These were identified through docking of fragment libraries into the volume of the cyclin-binding groove of CDK2/cyclin A vacated through truncation of the inhibitor peptide-binding determinants. Proof of concept for this strategy was obtained through the generation of potent peptide-small-molecule hybrids and by the confirmation of inhibitor-binding modes in X-ray crystal structures. This method therefore allows nonpeptide fragments to be identified without the requirement for a high-sensitivity binding assay and should be generally applicable in replacing amino acids as individual residues or groups in peptide inhibitors to generate pharmaceutically acceptable lead molecules. 相似文献
5.
The issues of constructing a discrete-time model for Hamiltonian systems are in general different from those for dissipative systems. We propose an algorithm for constructing an approximate discrete-time model, which guarantees Hamiltonian conservation. We show that the algorithm also preserves, in a weaker sense, the losslessness property of a class of port-controlled Hamiltonian systems. An application of the algorithm to port-controlled Hamiltonian systems with quadratic Hamiltonian is presented, and we use this to solve the stabilization problem for this class of systems based on the approximate discrete-time model constructed using the proposed algorithm. We illustrate the usefulness of the algorithm in designing a discrete-time controller to stabilize the angular velocity of the dynamics of a rigid body. 相似文献
6.
Bennett J. Anderson A. McInnes P. Whitaker A. 《Antennas and Propagation, IEEE Transactions on》1976,24(3):295-303
A microwave holographic technique for the determination of amplitude and phase of the principal and cross-polarized aperture fields of large reflector antennas is described. The hologram formation process utilizes the elevation over azimuth scanning system normally associated with these antennas, and, in this respect, appears to be unique among other proposed methods of field probing. The present work describes the means used to obtain vital information on the antenna structure such asE - andH -plane phase centers of the feed, and rms values of the reflector surface profile errors. Accurate prediction ofE - andH -plane radiation patterns in the near- and far-field is also demonstrated. 相似文献
7.
The distributed control of multi-robot systems has been shown to have advantages over that of conventional single-robot systems. These include scalability, flexibility and robustness to failures. This paper considers pattern formation and reconfigurability in a multi-robot system using a new control algorithm developed through bifurcating potential fields. It is shown how various patterns can be achieved autonomously through a simple free parameter change, with the stability of the system proven to ensure that desired behaviours always occur. 相似文献
8.
Hazel Morton Nancie Gunson Diarmid Marshall Fergus McInnes Andrea Ayres Mervyn Jack 《Computer Speech and Language》2011,25(2):341-362
This paper describes a comprehensive usability evaluation of an automated telephone banking system which employs text-to-speech (TTS) synthesis in offering additional detail on customers’ account transactions. The paper describes a series of four experiments in which TTS was employed to offer an extra level of detail to recent transactions listings within an established banking service which otherwise uses recorded speech from a professional recording artist. Results from the experiments show that participants welcome the added value of TTS in being able to provide additional detail on their account transactions, but that TTS should be used minimally in the service. 相似文献
9.
Jason Cory Brunson Steve Fassino Antonio McInnes Monisha Narayan Brianna Richardson Christopher Franck Patrick Ion Reinhard Laubenbacher 《Scientometrics》2014,99(3):973-998
This study examines long-term trends and shifting behavior in the collaboration network of mathematics literature, using a subset of data from Mathematical Reviews spanning 1985–2009. Rather than modeling the network cumulatively, this study traces the evolution of the “here and now” using fixed-duration sliding windows. The analysis uses a suite of common network diagnostics, including the distributions of degrees, distances, and clustering, to track network structure. Several random models that call these diagnostics as parameters help tease them apart as factors from the values of others. Some behaviors are consistent over the entire interval, but most diagnostics indicate that the network’s structural evolution is dominated by occasional dramatic shifts in otherwise steady trends. These behaviors are not distributed evenly across the network; stark differences in evolution can be observed between two major subnetworks, loosely thought of as “pure” and “applied”, which approximately partition the aggregate. The paper characterizes two major events along the mathematics network trajectory and discusses possible explanatory factors. 相似文献
10.
Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks.
The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat
is usually portrayed by the media as being the work of a hacker however little is known about hacker subgroups, their rationale
and ethical views. This paper focuses upon hacker subgroups and their activities and in particular the new hacker subgroup
identified as ‘Hacker Taggers’. 相似文献