首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44篇
  免费   0篇
化学工业   6篇
建筑科学   1篇
轻工业   2篇
无线电   10篇
一般工业技术   4篇
自动化技术   21篇
  2021年   3篇
  2020年   1篇
  2018年   1篇
  2012年   4篇
  2011年   5篇
  2010年   5篇
  2009年   2篇
  2008年   3篇
  2006年   3篇
  2005年   3篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1995年   1篇
  1994年   1篇
  1988年   2篇
  1986年   1篇
  1982年   1篇
排序方式: 共有44条查询结果,搜索用时 15 毫秒
1.
We present a computational approach to high-order matching of data sets in IR(d). Those are matchings based on data affinity measures that score the matching of more than two pairs of points at a time. High-order affinities are represented by tensors and the matching is then given by a rank-one approximation of the affinity tensor and a corresponding discretization. Our approach is rigorously justified by extending Zass and Shashua's hypergraph matching to high-order spectral matching. This paves the way for a computationally efficient dual-marginalization spectral matching scheme. We also show that, based on the spectral properties of random matrices, affinity tensors can be randomly sparsified while retaining the matching accuracy. Our contributions are experimentally validated by applying them to synthetic as well as real data sets.  相似文献   
2.
We report remote detections of physically buried specularly reflecting objects using microwave radar at two sites: Ashalim and Tseelim in the northern region of the Negev Desert, Israel. These detections provide confirmation that microwave subsurface remote sensing is a genuine phenomenon. At Ashalim, a scatterometer operating in the P-band (441 MHz, 68 cm) was mounted on a cherry picker truck at a height of 8 m and used to detect two triangular aluminum mesh reflectors (forming a 1-m square area reflector) buried down to a depth of 8 cm in dry sand. At Tseelim, the same scatterometer was mounted on an airplane flying at an altitude of 70 m and used to detect 1-m square aluminum reflectors (each one submerged at a different location along the airplane flight path) buried down to a depth of 20 cm. The experimental results compare favorably with a theoretical model that incorporates radar absorption effects arising in the sandy subsurface layer and radar interference effects arising from phase differences between reflections from the surface and buried reflector. The theoretical modeling also predicts the detection of a subsurface reflector down to a depth of about 4.4 m. This experiment and the associated modeling approach is the first of a series of planned experiments, which we outline for the detection and the theoretical evaluation of buried reflectors using remote microwave and VHF radar. We identify potential subject areas for environmental research.  相似文献   
3.
We consider a simple restriction of the PRAM model (called PPRAM), where the input is arbitrarily partitioned between a fixed set of p processors and the shared memory is restricted to m cells. This model allows for investigation of the tradeoffs/ bottlenecks with respect to the communication bandwidth (modeled by the shared memory size m ) and the number of processors p . The model is quite simple and allows the design of optimal algorithms without losing the effect of communication bottlenecks. We have focused on the PPRAM complexity of problems that have $\tilde{O}$ (n) sequential solutions (where n is the input size), and where m ≤ p ≤ n . We show essentially tight time bounds (up to logarithmic factors) for several problems in this model such as summing, Boolean threshold, routing, integer sorting, list reversal and k -selection. We get typically two sorts of complexity behaviors for these problems: One type is $\tilde{O}$ (n/p + p/m) , which means that the time scales with the number of processors and with memory size (in appropriate ranges) but not with both. The other is $\tilde{O}$ (n/m) , which means that the running time does not scale with p and reflects a communication bottleneck (as long as m < p ). We are not aware of any problem whose complexity scales with both p and m (e.g. $O(n/\sqrt{m \cdot p})$ ). This might explain why in actual implementations one often fails to get p -scalability for p close to n .  相似文献   
4.
The diffusivity of boron in silicon dioxide may be increased by the introduction of hydrogen into the annealing atmosphere. In this paper we report on the diffusion characteristics of boron ion-implanted into thermally grown SiO2. A sensitive technique was used in which the boron atoms redistributed into the substrate are characterized by electrical methods. The diffusivity of boron in thermal SiO2 was measured over the temperature range of 950-1150°C with hydrogen partial pressure from 0 to 0.2 atm. It was found that the diffusion coefficient of boron in oxide at 1150° C increases as the square root of the hydrogen partial pressure. At fixed pressure the temperature dependence of the diffusion coefficient obeys a single-activation-energy exponential rule. At 0.1 atm partial pressure of H2 the activation energy is 3.0 eV and the preexponential factor is 6 x 105 [cm2/sec.].  相似文献   
5.
The diffusivity of ion-implanted As in SiO2 is investigated as a function of the implanted dose, oxide type and ambient in the 1000–1200° C temperature range. The As diffusivity in oxide is extracted, using electrical methods, from the profiles of As diffused into the substrate. Secondary-ion-mass-spectroscopy depth profiles of some of the samples are in agreement with the results of the electrical methods. Two types of oxide are investigated: Dry oxide grown in O2 and wet oxide grown in steam. The diffusivity is characterized as a function of the temperature for dry oxide annealed in N2, and for wet oxide annealed both in N2 and in N2/H2 (10%). The measured As diffusivity vs temperature is fitted to a single activation energy exponential model. For the wet-grown oxide, the extracted activation energy for the N2/H2 (10%) annealed sample is 4.4 ± 0.5 eV and for the N2 annealed oxide it is found to be 5.5 ± 0.5 eV. For oxide grown in dry oxygen the As diffusivity is characterized also as a function of the implant dose. It is found to be independent of the implanted dose, for ion energy of 40 keV and dose in the 1012–1015 cm-2 range, and its activation energy equals 4.7 ± 0.5 eV. The extracted parameters were installed in the SUPREM-III process simulation program and correctly predict ion-implanted As diffusion behavior in SiO2.  相似文献   
6.
The use of nanomedicine for targeted drug delivery, though well established, is still a growing and developing field of research with potential benefits to many biomedical problems. There is a plethora of nano-carriers with myriads of designs of shapes, sizes and composition that involves complex, trial and error based preparation protocols. The digital age brought an information revolution with automated data analysis, machine learning and data mining applied to almost every field of research including drug delivery. Indeed, nanomedicine has benefitted from the use of data science and information science to optimize, standardize, and understand the synthesis, characterization, and biological effects of nanomaterials. This short review will describe several concepts and a few examples of nanoinformatics, including Nano-Quantitative Structure-Activity Relationship (Nano-QSAR), the use of computational methods for predicting different properties of nanomedicine in drug delivery and propose an outlook for the future.  相似文献   
7.
In High-Level Synthesis, Binary Synthesis is a method for synthesizing compiled applications for which the source code is not available. One of the advantages of FPGAs over processors is the availability of multiple internal and external memory banks. Binary synthesis tools use multiple memory banks if they are able to recover data-structures from the binary. In this work we improve the recovery of data-structures by introducing dynamic memory analysis and combining it with improved static memory analysis. We show that many applications can only be synthesized using dynamic memory analysis. We present two FPGA based architectures for implementing the bound-checking and recovery for the synthesized code. Our experiments show that the proposed technique accelerates the execution of applications which use multiple memory banks concurrently. We demonstrate that many binary applications indeed benefit from this technique.  相似文献   
8.
Barrier layers for Cu ULSI metallization   总被引:1,自引:0,他引:1  
Barrier layers are integral parts of many metal interconnect systems. In this paper we review the current status of barrier layers for copper metallization for ultra-large-scale-integration (ULSI) technology for integrated circuits (ICs) manufacturing. The role of barrier layers is reviewed and the criteria that determine the process window, i.e. the optimum barrier thickness and the deposition processes, for their manufacturing are discussed. Various deposition methods are presented: physical vapor deposition (PVD), chemical vapor deposition (CVD), electrochemical deposition (ECD), electroless deposition (ELD), and atomic layer CVD (ALCVD) for barrier layers implementation. The barrier integration methods and the interaction between the barrier and the copper metallization are presented and discussed. Finally, the common inspection and metrology for barrier layer are critically reviewed.  相似文献   
9.
10.
We present an algorithm that detects rotational and reflectional symmetries of two-dimensional objects. Both symmetry types are effectively detected and analyzed using the angular correlation (AC), which measures the correlation between images in the angular direction. The AC is accurately computed using the pseudopolar Fourier transform, which rapidly computes the Fourier transform of an image on a near-polar grid. We prove that the AC of symmetric images is a periodic signal whose frequency is related to the order of the symmetry. This frequency is recovered via spectrum estimation, which is a proven technique in signal processing with a variety of efficient solutions. We also provide a novel approach for finding the center of symmetry and demonstrate the applicability of our scheme to the analysis of real images.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号