首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   7篇
  国内免费   3篇
电工技术   12篇
化学工业   28篇
金属工艺   7篇
机械仪表   7篇
建筑科学   2篇
能源动力   1篇
轻工业   6篇
无线电   33篇
一般工业技术   25篇
冶金工业   5篇
自动化技术   27篇
  2023年   5篇
  2022年   4篇
  2021年   6篇
  2020年   7篇
  2019年   8篇
  2018年   9篇
  2017年   7篇
  2016年   8篇
  2015年   6篇
  2014年   5篇
  2013年   12篇
  2012年   9篇
  2011年   13篇
  2010年   6篇
  2009年   4篇
  2008年   6篇
  2007年   4篇
  2006年   5篇
  2005年   5篇
  2003年   3篇
  2002年   1篇
  1999年   1篇
  1997年   3篇
  1996年   4篇
  1995年   1篇
  1994年   2篇
  1992年   2篇
  1986年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1979年   2篇
  1973年   1篇
排序方式: 共有153条查询结果,搜索用时 0 毫秒
1.
Silicon - Quadruple gate FinFET is a promising candidate among other multi-gate MOS devices due to it’s better scalability and higher short channel effect suppression capability in advanced...  相似文献   
2.
Neural Computing and Applications - The identification of water stress is a major challenge for timely and effective irrigation to ensure global food security and sustainable agriculture. Several...  相似文献   
3.
Recognizing a subject given a set of biometrics is a fundamental pattern recognition problem. This paper builds novel statistical models for multibiometric systems using geometric and multinomial distributions. These models are generic as they are only based on the similarity scores produced by a recognition system. They predict the bounds on the range of indices within which a test subject is likely to be present in a sorted set of similarity scores. These bounds are then used in the multibiometric recognition system to predict a smaller subset of subjects from the database as probable candidates for a given test subject. Experimental results show that the proposed models enhance the recognition rate beyond the underlying matching algorithms for multiple face views, fingerprints, palm prints, irises and their combinations.  相似文献   
4.
The initial rate of colloid deposition onto semi‐permeable membranes is largely controlled by the coupled influence of permeation drag and particle‐membrane colloidal interactions. Recent studies show that the particle‐membrane interactions are subject to immense local variations due to the inherent morphological heterogeneity (roughness) of reverse osmosis (RO) and nanofiltration (NF) membranes. This experimental investigation reports the effect of membrane roughness on the initial deposition of polystyrene latex particles on a rough NF membrane during cross flow membrane filtration under different operating pressures and solution chemistries. Atomic force microscopy was used to characterize the roughness of the membrane and observe the structure of particle deposits. At the initial stages of fouling, the AFM images show that more particles preferentially accumulate near the “peaks” than in the “valleys” of the rough NF membrane surface.  相似文献   
5.
A polygonP is said to be apalm polygon if there exists a pointxP such that the Euclidean shortest path fromx to any pointyP makes only left turns or only right turns. The set of all such pointsx is called thepalm kernel. In this paper we propose an O(E) time algorithm for recognizing a palm polygonP, whereE is the size of the visibility graph ofP. The algorithm recognizes the given polygonP as a palm polygon by computing the palm kernel ofP. If the palm kernel is not empty,P is a palm polygon.The extended abstract of this paper was reported at the Second Canadian Conference in Computational Geometry, pp. 246–251, 1990  相似文献   
6.
This paper presents a modeling framework for characterizing the feasibility and impacts of multi-hop packet routing in sensor networks with mobile sinks. Data collection in sensor networks using mobile sinks has recently been investigated to improve energy performance at the cost of collection delay. Although the data collection can be accomplished with varying degrees of multi-hop routing, for a given data generation rate, as the extent of multi-hop routing increases, the round traversal time of the sink decreases. At the same time, the interference experienced by the mobile sink-to-sensor links and the consequent upload time go up. This paper characterizes these competing effects and develops a methodology for determining the extent of multi-hop routing that is feasible for given network and application parameters such as sensor data generation rate, wireless link capacity between sensors and mobile sink, the speed of the mobile sink and node density.  相似文献   
7.
Let s be a point source of light inside a polygon P of n vertices. A polygonal path from s to some point t inside P is called a diffuse reflection path if the turning points of the path lie on edges of?P. A?diffuse reflection path is said to be optimal if it has the minimum number of reflections on the path. The problem of computing a diffuse reflection path from s to t inside P has not been considered explicitly in the past. We present three different algorithms for this problem which produce suboptimal paths. For constructing such a path, the first algorithm uses a greedy method, the second algorithm uses a transformation of a minimum link path, and the third algorithm uses the edge–edge visibility graph of?P. The first two algorithms are for polygons without holes, and they run in O(n+klogn) time, where k denotes the number of reflections in the constructed path. The third algorithm is for polygons with or without holes, and it runs in O(n 2) time. The number of reflections in the path produced by this third algorithm can be at most three times that of an optimal diffuse reflection path. Though the combinatorial approach used in the third algorithm gives a better bound on the number of reflections on the path, the first and the second algorithms stand on the merit of their elegant geometric approaches based on local geometric information.  相似文献   
8.
An important problem in WDM network design is to construct a logical topology and determine an optimal routing over that topology. Mixed Integer Linear Program (MILP) formulations to generate optimal solutions for this problem have been presented. Such formulations are computationally intractable, even for moderate sized networks. A standard approach is to decouple the problem of logical topology design and the problem of routing the traffic on this logical topology. Heuristics for finding the logical topology exist and a straight-forward linear program (LP), based on the node-arc formulation can be used to solve the routing problem over a given logical topology. We have found that such LP formulations become computationally infeasible for large networks. In this paper, we present a new formulation, based on the arc-chain representation, for optimally routing the specified traffic over a given logical topology to minimize the congestion of the network. We have used the revised simplex method incorporating an implicit column generation technique, and exploited the special Generalized Upper Bounding structure as well as the possibility of eta-factorization for efficiently updating the dual variables and finding the solution. Experimental results on a number of networks demonstrate the suitability of this approach.  相似文献   
9.
Cooperative caching can be an effective mechanism for reducing electronic content provisioning cost in Social Wireless Networks (SWNETs). These networks are formed by a collection of mobile data enabled devices physically gathering in settings such as university campus, malls, airport and other public places. In this paper, we first propose an optimal collaborative object caching policy in order to minimize the object provisioning cost in SWNETs with homogenous user requests and a peer-rebate model for promoting collaboration. Then using an analytical model we study the impacts of user selfishness on the provisioning cost and the earned rebate when certain nodes in an SWNET selfishly deviate from the optimal policy. User selfishness is motivated in order to either increase individually earned rebate or to reduce content provisioning cost. The analytical model is validated by experimental results from simulated SWNETs using the network simulator ns2.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号