首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   300篇
  免费   9篇
电工技术   2篇
化学工业   37篇
金属工艺   4篇
机械仪表   7篇
建筑科学   26篇
能源动力   16篇
轻工业   34篇
水利工程   1篇
无线电   31篇
一般工业技术   25篇
冶金工业   12篇
自动化技术   114篇
  2023年   3篇
  2022年   3篇
  2021年   1篇
  2020年   2篇
  2019年   4篇
  2018年   12篇
  2017年   6篇
  2016年   9篇
  2015年   8篇
  2014年   9篇
  2013年   21篇
  2012年   12篇
  2011年   27篇
  2010年   8篇
  2009年   20篇
  2008年   14篇
  2007年   20篇
  2006年   17篇
  2005年   11篇
  2004年   10篇
  2003年   7篇
  2002年   12篇
  2001年   8篇
  2000年   9篇
  1999年   4篇
  1998年   5篇
  1997年   3篇
  1996年   6篇
  1995年   5篇
  1994年   4篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1990年   7篇
  1989年   3篇
  1988年   2篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1976年   1篇
  1960年   2篇
  1926年   2篇
  1924年   3篇
排序方式: 共有309条查询结果,搜索用时 16 毫秒
1.
The main result of the paper is the use of orthogonal Hermite polynomials as the basis functions of feedforward neural networks. The proposed neural networks have some interesting properties: (i) the basis functions are invariant under the Fourier transform, subject only to a change of scale, (ii) the basis functions are the eigenstates of the quantum harmonic oscillator, and stem from the solution of Schrödinger's diffusion equation. The proposed feed-forward neural networks demonstrate the particle-wave nature of information and can be used in nonparametric estimation. Possible applications of the proposed neural networks include function approximation, image processing and system modelling.  相似文献   
2.
3.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
4.
An effective way to in situ monitor the metalorganic chemical vapor deposition (MOCVD) of HgCdTe/CdTe/ZnTe on GaAs or GaAs/Si substrates is presented. Specular He-Ne laser reflectance was used to in situ monitor the growth rates, layer thickness, and morphology for each layer in the grown multilayer structure. In situ monitoring has enabled precise measurements of ZnTe nucleation and CdTe buffer layer thicknesses. Monitoring the constancy of reflectance during the thicker CdTe buffer growth where absorption in the CdTe reduces reflectance to just the surface component has led to optimum buffer growth ensuring good quality of subsequently grown HgCdTe. During the interdiffused multilayer process (IMP) HgCdTe growth, because multiple interfaces are present within the absorption length, a periodic reflectance signal is maintained throughout this growth cycle. A theoretical model was developed to extract IMP layer thicknesses from in situ recorded experimental data. For structures that required the growth of a larger band gap HgCdTe cap layer on top of a smaller band gap active layer, in situ monitored reflectance data allowed determination of alloy composition in the cap layer as well. Continuous monitoring of IMP parameters established the stability of growth conditions, translating into depth uniformity of the grown material, and allowed diagnosis of growth rate instabilities in terms of changes in the HgTe and CdTe parts of the IMP cycle. A unique advantage of in situ laser monitoring is the opportunity to perform “interactive” crystal growth, a development that is a key to real time MOCVD HgCdTe feedback growth control.  相似文献   
5.
Linear Feedback Shift Registers (LFSRs) constitute a very efficient mechanism for generating pseudoexhaustive or pseudo-random test sets for the built-in self-testing of digital circuits. However, a well-known problem with the use of LFSRs is the occurrence of linear dependencies in the generated patterns. In this paper, we show for the first time that the amount of linear dependencies can be controlled by selecting appropriate characteristic polynomials and reordering the LFSR cells. We identify two classes of such polynomials which, by appropriate LFSR cell ordering, guarantee that a large ratio of linear dependencies cannot occur. Experimental results show significant enhancements on the fault coverage for pseudo-random testing and support the theoretical relation between minimization of linear dependencies and effective fault coverage.This work was partially supported by NSF grant MIP-9409905, a 1993–94 ACM/IEEE Design Automation Scholarship and a grant from Nissan Corporation. A preliminary version of this work appeared in A Class of Good Characteristic Polynomials for LFSR Test Pattern Generators, in Proc. of IEEE International Conference on Computer Design, Oct. 1994, pp. 292–295, where it received the ICCD'94 Best Paper Award.  相似文献   
6.
Borodin, Nielsen and Rackoff [13] introduced the class of priority algorithms as a framework for modeling deterministic greedy-like algorithms. In this paper we address the effect of randomization in greedy-like algorithms. More specifically, we consider approximation ratios within the context of randomized priority algorithms. As case studies, we prove inapproximation results for two well-studied optimization problems, namely facility location and makespan scheduling.  相似文献   
7.
The sophisticated method for mathematical modeling of humanoid robots formulated in Part 1 of this paper is applied here to the dynamic task of keeping a posture under disturbance, which is equally important to humans and humanoid robots. The idea of this work is to develop and realize a simulator tool for dynamic analysis of human-or-humanoid behavior under disturbances. To show the potentials and verify this tool, we comparatively analyze the robustness of some postures to external disturbance. At this stage of research we do not conduct real experiments with humans/humanoids but try to verify our simulation tool by relying on available experience. Therefore, the postures for comparison are taken from everyday life and from sports: upright standing, squat posture, and three karate postures. As the external disturbance we choose an impulse and a permanent force, both with variable direction and magnitude.  相似文献   
8.
9.
Efficient PAC Learning for Episodic Tasks with Acyclic State Spaces   总被引:1,自引:1,他引:0  
This paper considers the problem of computing an optimal policy for a Markov decision process, under lack of complete a priori knowledge of (1) the branching probability distributions determining the evolution of the process state upon the execution of the different actions, and (2) the probability distributions characterizing the immediate rewards returned by the environment as a result of the execution of these actions at different states of the process. In addition, it is assumed that the underlying process evolves in a repetitive, episodic manner, with each episode starting from a well-defined initial state and evolving over an acyclic state space. A novel efficient algorithm for this problem is proposed, and its convergence properties and computational complexity are rigorously characterized in the formal framework of computational learning theory. Furthermore, in the process of deriving the aforementioned results, the presented work generalizes Bechhofer’s “indifference-zone” approach for the ranking & selection problem, that arises in statistical inference theory, so that it applies to populations with bounded general distributions.
Theologos BountourelisEmail:
  相似文献   
10.
This paper revisits the problem of selecting an optimal deadlock resolution strategy, when the selection criterion is the maximization of the system throughput, and the system is Markovian in terms of its timing and routing characteristics. This problem was recently addressed in some of our previous work, that (i) provided an analytical formulation for it, (ii) introduced the notion of randomized deadlock avoidance as a generalization of the more traditional approaches of deadlock prevention/avoidance, and detection and recovery, and (iii) provided a methodology for selecting the optimal randomized deadlock avoidance policy for a given resource allocation system (RAS) configuration. An issue that remained open in the problem treatment of that past work, was whether the proposed policy randomization is essential, i.e., whether there exist any RAS configurations for which a randomized deadlock avoidance policy is superior to any other policy that does not employ randomization. The work presented in this paper establishes that for the basic problem formulation where the only concern is the (unconstrained) maximization of the system throughput—or the other typical performance objectives of minimizing the system work-in-process and mean sojourn time—randomization of the deadlock resolution strategy is not essential. However, it is also shown that, sometimes, it can offer an effective mechanism for accommodating additional operational constraints, like the requirement for production according to a specified product mix. Furthermore, the undertaken analysis provides an analytical characterization of the dependence of the aforementioned performance measures on the transition rates relating to the various events of the underlying state space, which can be useful for the broader problem of synthesizing efficient scheduling policies for the considered class of resource allocation systems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号