首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   474篇
  免费   9篇
电工技术   8篇
化学工业   50篇
金属工艺   1篇
机械仪表   2篇
建筑科学   29篇
能源动力   61篇
轻工业   36篇
水利工程   2篇
无线电   30篇
一般工业技术   58篇
冶金工业   39篇
原子能技术   4篇
自动化技术   163篇
  2023年   3篇
  2022年   4篇
  2021年   7篇
  2020年   10篇
  2019年   7篇
  2017年   6篇
  2016年   4篇
  2015年   4篇
  2014年   6篇
  2013年   17篇
  2012年   15篇
  2011年   22篇
  2010年   20篇
  2009年   13篇
  2008年   25篇
  2007年   12篇
  2006年   18篇
  2005年   13篇
  2004年   12篇
  2003年   11篇
  2002年   15篇
  2001年   12篇
  2000年   4篇
  1999年   3篇
  1998年   10篇
  1997年   15篇
  1996年   15篇
  1995年   12篇
  1994年   8篇
  1993年   13篇
  1992年   4篇
  1991年   9篇
  1990年   10篇
  1989年   9篇
  1987年   4篇
  1986年   4篇
  1985年   13篇
  1984年   8篇
  1983年   5篇
  1982年   7篇
  1981年   14篇
  1980年   10篇
  1979年   12篇
  1978年   11篇
  1977年   6篇
  1976年   4篇
  1975年   5篇
  1974年   2篇
  1973年   2篇
  1971年   2篇
排序方式: 共有483条查询结果,搜索用时 31 毫秒
1.
Gamut mapping deals with the need to adjust a color image to fit into the constrained color gamut of a given rendering medium. A typical use for this tool is the reproduction of a color image prior to its printing, such that it exploits best the given printer/medium color gamut, namely the colors the printer can produce on the given medium. Most of the classical gamut mapping methods involve a pixel-by-pixel mapping and ignore the spatial color configuration. Recently proposed spatial-dependent approaches for gamut mapping are either based on heuristic assumptions or involve a high computational cost. In this paper, we present a new variational approach for space-dependent gamut mapping. Our treatment starts with the presentation of a new measure for the problem, closely related to a recent measure proposed for Retinex. We also link our method to recent measures that attempt to couple spectral and spatial perceptual measures. It is shown that the gamut mapping problem leads to a quadratic programming formulation, guaranteed to have a unique solution if the gamut of the target device is convex. An efficient numerical solution is proposed with promising results.  相似文献   
2.
The structure of the nonlinear H-filter in the neighborhood of the estimated trajectory is investigated and a bound on the size of the neighborhood that allows this structure is determined, both for finite and infinite horizons. Riccati inequalities that depend on the estimated trajectory are derived for finding the filter gain matrix and an algorithm for calculating the bound on the size of the above neighborhood is presented. Explicit formulas are obtained in the infinite horizon case for the minimum achievable disturbance attenuation level, the size of the neighborhood, and the corresponding filter gain.  相似文献   
3.
Alternative measures of pesticide use   总被引:2,自引:0,他引:2  
tRNA (m5U54)-methyltransferase (RUMT) catalyzes the S-adenosylmethionine-dependent methylation of uridine-54 in the T psi C-loop of all transfer RNAs in E. coli to form the 54-ribosylthymine residue. However, in all tRNA structures, residue 54 is completely buried and the question arises as to how RUMT gains access to the methylation site. A 17-mer RNA hairpin consisting of nucleotides 49-65 of the T psi-loop is a substrate for RUMT. Homonuclear NMR methods in conjunction with restrained molecular dynamics (MD) methods were used to determine the solution structure of the 17-mer T-arm fragment. The loop of the hairpin exhibits enhanced flexibility which renders the conventional NMR average structure less useful compared to the more commonly found situation where a molecule exists in predominantly one major conformation. However, when resorting to softer refinement methods such as MD with time-averaged restraints, the conflicting restraints in the loop can be satisfied much better. The dynamic structure of the T-arm is represented as an ensemble of 10 time-clusters. In all of these, U54 is completely exposed. The flexibility of the T psi-loop in solution in conjunction with extensive binding studies of RUMT with the T psi C-loop and tRNA suggest that the specificity of the RUMT/ tRNA recognition is associated with tRNA tertiary structure elements. For the methylation, RUMT would simply have to break the tertiary interactions between the D- and T-loops, leading to a melting of the T-arm structure and making U54 available for methylation.  相似文献   
4.
Noel D. Uri 《Applied Energy》1996,54(4):355-373
This study begins by asking whether fluctuations in the price of crude oil have affected agricultural employment in the USA. After reviewing previous assessments of the issue, the existence of an empirical relationship between agricultural employment and crude-oil price volatility is established using Granger causality. Subsequently, the nature of the relationship is estimated with the results suggesting that at least three full years are required before the measurable impacts of a percentage change in the real price of crude oil on the change in agricultural employment are exhausted. Finally, the structural stability of the functional relationship between the change in agricultural employment and the volatility of the price of crude oil, the percentage changes in expected net farm income, realized technological innovation, and the wage rate are examined.  相似文献   
5.
6.
We consider two multicriteria versions of the global minimum cut problem in undirected graphs. In the k-criteria setting, each edge of the input graph has k non-negative costs associated with it. These costs are measured in separate, non-interchangeable, units. In the AND-version of the problem, purchasing an edge requires the payment of all the k costs associated with it. In the OR-version, an edge can be purchased by paying any one of the k costs associated with it. Given k bounds b1,b2,. . . ,bk, the basic multicriteria decision problem is whether there exists a cut C of the graph that can be purchased using a budget of bi units of the ith criterion, for 1 ≤ i ≤ k. We show that the AND-version of the multicriteria global minimum cut problem is polynomial for any fixed number k of criteria. The OR-version of the problem, on the other hand, is NP-hard even for k = 2, but can be solved in pseudo-polynomial time for any fixed number k of criteria. It also admits an FPTAS. Further extensions, some applications, and multicriteria versions of two other optimization problems are also discussed.  相似文献   
7.
A simplified adaptive scheme is suggested for the estimation of the state vector of linear systems driven by white process noise that is added to an unknown deterministic signal. The design approach is based on embedding the Kalman filter (KF) within a simplified adaptive control loop that is driven by the innovation process. The simplified adaptive loop is idle during steady-state phases that involve white driving noise only. However, when the deterministic signal is added to the driving noise signal, the simplified adaptive control loop enhances the KF gains and helps in reducing the resulting transients. The stability of the overall estimation scheme is established under strictly passive conditions of a related system. The suggested method is applied to the target acceleration estimation problem in a Theater Missile Defence scenario.  相似文献   
8.
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average).  相似文献   
9.
Uri Zwick 《Algorithmica》2006,46(2):181-192
We present an -time algorithm for the All Pairs Shortest Paths (APSP) problem for directed graphs with real edge lengths. This slightly improves previous algorithms for the problem obtained by Fredman, Dobosiewicz, Han, and Takaoka.  相似文献   
10.
A theory is developed for the construction of carry-save networks with minimal delay, using a given collection of carry-save adders each of which may receive inputs and produce outputs using several different representation standards.The construction of some new carry-save adders is described. Using these carry-save adders optimally, as prescribed by the above theory, we get {, , }-circuits of depth 3.48 log2 n and {, , }-circuits of depth 4.95 log2 n for the carry-save addition ofn numbers of arbitrary length. As a consequence we get multiplication circuits of the same depth. These circuits put out two numbers whose sum is the result of the multiplication. If a single output number is required then the depth of the multiplication circuits increases respectively to 4.48 log2 n and 5.95 log2 n.We also get {, , }-formulae of sizeO (n 3.13) and {, }-formulae of sizeO (n 4.57) for all the output bits of a carry-save addition ofn numbers. As a consequence we get formulae of the same size for the majority function and many other symmetric Boolean functions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号