首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   101篇
  免费   3篇
电工技术   1篇
化学工业   15篇
建筑科学   1篇
矿业工程   1篇
轻工业   8篇
水利工程   2篇
石油天然气   1篇
无线电   11篇
一般工业技术   19篇
冶金工业   27篇
自动化技术   18篇
  2021年   1篇
  2020年   1篇
  2018年   2篇
  2016年   3篇
  2015年   1篇
  2014年   4篇
  2013年   6篇
  2012年   3篇
  2011年   7篇
  2010年   4篇
  2009年   1篇
  2008年   2篇
  2007年   1篇
  2006年   4篇
  2005年   3篇
  2004年   4篇
  2003年   2篇
  2002年   3篇
  2000年   2篇
  1999年   2篇
  1998年   13篇
  1997年   5篇
  1996年   13篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1989年   1篇
  1988年   1篇
  1980年   2篇
  1977年   1篇
  1976年   3篇
  1975年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1960年   1篇
排序方式: 共有104条查询结果,搜索用时 31 毫秒
1.
A bound for a Minkowski metric based on Lp distortion measure is proposed and evaluated as a means to reduce the computation in vector quantisation. This bound provides a better criterion than the absolute error inequality (AEI) elimination rule on the Euclidean distortion measure. For the Minkowski metric of order n, this bound contributes the elimination criterion from the L1 metric to L n metric. This bound can also be an extended quadratic metric which can be a hidden Markov model (HMM) with a Gaussian mixture probability density function (PDF). In speech recognition, the HMM with the Gaussian mixture VQ codebook PDF has been shown to be a promising method  相似文献   
2.
3.
4.
We describe a drug-design strategy termed REPLACE (REplacement with Partial Ligand Alternatives through Computational Enrichment) in which nonpeptidic surrogates for specific determinants of known peptide ligands are identified in silico by using a core peptide-bound protein structure as a design anchor. In the REPLACE application example, we present the effective replacement of two critical binding motifs in a lead protein-protein interaction inhibitor pentapeptide with more druglike phenyltriazole and diphenyl ether groups. These were identified through docking of fragment libraries into the volume of the cyclin-binding groove of CDK2/cyclin A vacated through truncation of the inhibitor peptide-binding determinants. Proof of concept for this strategy was obtained through the generation of potent peptide-small-molecule hybrids and by the confirmation of inhibitor-binding modes in X-ray crystal structures. This method therefore allows nonpeptide fragments to be identified without the requirement for a high-sensitivity binding assay and should be generally applicable in replacing amino acids as individual residues or groups in peptide inhibitors to generate pharmaceutically acceptable lead molecules.  相似文献   
5.
The issues of constructing a discrete-time model for Hamiltonian systems are in general different from those for dissipative systems. We propose an algorithm for constructing an approximate discrete-time model, which guarantees Hamiltonian conservation. We show that the algorithm also preserves, in a weaker sense, the losslessness property of a class of port-controlled Hamiltonian systems. An application of the algorithm to port-controlled Hamiltonian systems with quadratic Hamiltonian is presented, and we use this to solve the stabilization problem for this class of systems based on the approximate discrete-time model constructed using the proposed algorithm. We illustrate the usefulness of the algorithm in designing a discrete-time controller to stabilize the angular velocity of the dynamics of a rigid body.  相似文献   
6.
A microwave holographic technique for the determination of amplitude and phase of the principal and cross-polarized aperture fields of large reflector antennas is described. The hologram formation process utilizes the elevation over azimuth scanning system normally associated with these antennas, and, in this respect, appears to be unique among other proposed methods of field probing. The present work describes the means used to obtain vital information on the antenna structure such asE- andH-plane phase centers of the feed, and rms values of the reflector surface profile errors. Accurate prediction ofE- andH-plane radiation patterns in the near- and far-field is also demonstrated.  相似文献   
7.
The distributed control of multi-robot systems has been shown to have advantages over that of conventional single-robot systems. These include scalability, flexibility and robustness to failures. This paper considers pattern formation and reconfigurability in a multi-robot system using a new control algorithm developed through bifurcating potential fields. It is shown how various patterns can be achieved autonomously through a simple free parameter change, with the stability of the system proven to ensure that desired behaviours always occur.  相似文献   
8.
This paper describes a comprehensive usability evaluation of an automated telephone banking system which employs text-to-speech (TTS) synthesis in offering additional detail on customers’ account transactions. The paper describes a series of four experiments in which TTS was employed to offer an extra level of detail to recent transactions listings within an established banking service which otherwise uses recorded speech from a professional recording artist. Results from the experiments show that participants welcome the added value of TTS in being able to provide additional detail on their account transactions, but that TTS should be used minimally in the service.  相似文献   
9.
This study examines long-term trends and shifting behavior in the collaboration network of mathematics literature, using a subset of data from Mathematical Reviews spanning 1985–2009. Rather than modeling the network cumulatively, this study traces the evolution of the “here and now” using fixed-duration sliding windows. The analysis uses a suite of common network diagnostics, including the distributions of degrees, distances, and clustering, to track network structure. Several random models that call these diagnostics as parameters help tease them apart as factors from the values of others. Some behaviors are consistent over the entire interval, but most diagnostics indicate that the network’s structural evolution is dominated by occasional dramatic shifts in otherwise steady trends. These behaviors are not distributed evenly across the network; stark differences in evolution can be observed between two major subnetworks, loosely thought of as “pure” and “applied”, which approximately partition the aggregate. The paper characterizes two major events along the mathematics network trajectory and discusses possible explanatory factors.  相似文献   
10.
Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker subgroups, their rationale and ethical views. This paper focuses upon hacker subgroups and their activities and in particular the new hacker subgroup identified as ‘Hacker Taggers’.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号