首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   109篇
  免费   7篇
工业技术   116篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2019年   1篇
  2018年   4篇
  2017年   6篇
  2016年   5篇
  2015年   7篇
  2014年   4篇
  2013年   8篇
  2012年   7篇
  2011年   7篇
  2010年   5篇
  2009年   6篇
  2008年   5篇
  2007年   5篇
  2006年   2篇
  2005年   3篇
  2004年   1篇
  2002年   2篇
  2001年   1篇
  2000年   4篇
  1999年   4篇
  1998年   5篇
  1996年   1篇
  1995年   2篇
  1994年   4篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1985年   2篇
  1984年   3篇
  1981年   1篇
  1976年   1篇
排序方式: 共有116条查询结果,搜索用时 5 毫秒
91.
In the desert country of Oman, available water resources are scarce and scattered. In most locations where water can be accessed, this resource is harnessed by oases planted to date palm (Phoenix dactylifera L.) and other crops. So far, little is known about the site-specific conditions determining the existence, size and type of these oases. Remote sensing and image processing techniques were used to locate oases, to characterize the sites according to their topographic, hydrologic and geologic characteristics and to develop a typology of oases in northern Oman.To derive oasis positions, we calculated the Normalized Difference Vegetation Index (NDVI) of Landsat images covering all of northern Oman, subtracted a regional average NDVI, averaged the resulting grid over 3 × 3 pixels and extracted the brightest of five classes determined by a natural breaks algorithm. A buffer of six pixels was added to the oases and the vegetated area as determined by the NDVI was summarized for these polygons. The oasis detection procedure was validated using Google Earth Pro®. Topographic information was derived from data of the Shuttle Radar Topography Mission (SRTM), complemented by digitized Russian military maps, from which mean elevations and elevation range above the oases within a buffer of 2 km were extracted.Water contributing upslope area and distance to streams with catchments of 10 km2 and 100 km2 were derived from the same elevation model. All geologic formations of northern Oman were assigned to one of 7 groups and tested for influence on vegetation surrounding them. Four such geologic settings were identified and described by categorical variables. All input parameters were used to define oasis types based on cluster analysis.Our algorithm detected 2663 oases in northern Oman, of which 2428 had vegetated areas of more than 0.4 ha, the minimum size for reliable detection. The oases were subdivided into six groups. ‘Plain Oases’ (49% of all oases) lie mostly in the plains east and west of the mountains, and are fed by groundwater flow in Quaternary sediments. ‘Foothill Oases’ (46%) are scattered over the foothills, where they draw their water from groundwater flow that is channeled by rock formations. ‘Mountain Oases’ (3%) and ‘Kawr Oases’ (0.5%) lie in the mountains, close to an unconform boundary between limestones and confining rocks. ‘Drainage Oases’ (0.3%) are the largest oases in northern Oman. They lie close to a drainage channel, which drains the entire area west of the mountains. Finally, ‘Urban Oases’ (1.7%) consist of parks and sporting facilities, which do not lie in conclusive hydrologic settings.  相似文献   
92.
The rise of sound‐bite news is one of the most widely bemoaned findings in political communication research. Yet, the detrimental effects of this trend have been more assumed than demonstrated. This study examines one consequence of sound‐bite journalism: the creation of incomplete argument, in which speakers presenting their political position in the news do not also justify it. Drawing on data about television news in Germany, Russia, and the United States, it shows that shrinking sound bites consistently reduce the probability of opinion justification across widely differing national contexts. Sound‐bite journalism emerges as harmful to television news' ability to produce public justification.  相似文献   
93.
Many problems in geophysical and atmospheric modelling require the fast solution of elliptic partial differential equations (PDEs) in “flat” three dimensional geometries. In particular, an anisotropic elliptic PDE for the pressure correction has to be solved at every time step in the dynamical core of many numerical weather prediction (NWP) models, and equations of a very similar structure arise in global ocean models, subsurface flow simulations and gas and oil reservoir modelling. The elliptic solve is often the bottleneck of the forecast, and to meet operational requirements an algorithmically optimal method has to be used and implemented efficiently. Graphics Processing Units (GPUs) have been shown to be highly efficient (both in terms of absolute performance and power consumption) for a wide range of applications in scientific computing, and recently iterative solvers have been parallelised on these architectures. In this article we describe the GPU implementation and optimisation of a Preconditioned Conjugate Gradient (PCG) algorithm for the solution of a three dimensional anisotropic elliptic PDE for the pressure correction in NWP. Our implementation exploits the strong vertical anisotropy of the elliptic operator in the construction of a suitable preconditioner. As the algorithm is memory bound, performance can be improved significantly by reducing the amount of global memory access. We achieve this by using a matrix-free implementation which does not require explicit storage of the matrix and instead recalculates the local stencil. Global memory access can also be reduced by rewriting the PCG algorithm using loop fusion and we show that this further reduces the runtime on the GPU. We demonstrate the performance of our matrix-free GPU code by comparing it both to a sequential CPU implementation and to a matrix-explicit GPU code which uses existing CUDA libraries. The absolute performance of the algorithm for different problem sizes is quantified in terms of floating point throughput and global memory bandwidth.  相似文献   
94.
The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the window lift, warning light and airbag control system as well as the central gateway. These results are supplemented in this article by a classification of these four attack scenarios using the established CERT taxonomy and an analysis of underlying security vulnerabilities, and especially, potential safety implications.With respect to the results of these tests, in this article we further discuss two selected countermeasures to address basic weaknesses exploited in our tests. These are adaptations of intrusion detection (discussing three exemplary detection patterns) and IT-forensic measures (proposing proactive measures based on a forensic model). This article discusses both looking at the four attack scenarios introduced before, covering their capabilities and restrictions. While these reactive approaches are short-term measures, which could already be added to today’s automotive IT architecture, long-term concepts also are shortly introduced, which are mainly preventive but will require a major redesign. Beneath a short overview on respective research approaches, we discuss their individual requirements, potential and restrictions.  相似文献   
95.
Herein we report the photocatalytic degradation of natural organic matter from a bog lake (Lake Hohloh, Black Forest, Germany) in the presence of 0, 5, and 10 μmol L−1 of added Cu2+, Mn2+, Zn2+ and Fe3+. The reactions were followed by size exclusion chromatography with organic carbon detection (SEC-DOC) and by measurements of low molecular weight organic acids. Addition of Cu2+ had the largest effect of all four studied metals, leading to a retardation in the molecular size changes in NOM: degradation of the larger molecular weight fraction was inhibited leading to reduced production of smaller molecular weight metabolites. Similarly, addition of Cu2+ reduced the production of formic and oxalic acids, and reduced the bioavailability of the partially degraded NOM.  相似文献   
96.
Following the mobile computing trend, business logics of distributed, cooperative applications started to move into the mobile client applications. With this shift, the cooperation aspect may also exploit the user??s location and situation context and integrate it into the actual collaboration. In this article, we present an approach for a Collaborative Map that exploits the spatial context of the members of a distributed group as a means to visualize and provide collaboration functionality. Then, a number of location-related cooperation methods become feasible such as getting an overview of the spatial distribution of team members, identify an ad-hoc meeting place nearby, or chat with a group member who has a certain expertise in his profile. With CoMa, we move from standard collaboration tools that marginally consider spatial information towards context-aware mobile collaborative systems that can support a wide range of applications where human resources have to be coordinated in a spatial context and tasks need to be assigned dynamically depending on capabilities and situation context.  相似文献   
97.
We have evaluated the use of deconvolution using an exponential approximation basis for the quantification of myocardial blood flow from perfusion cardiovascular magnetic resonance. Our experiments, based on simulated signal intensity curves, phantom acquisitions, and clinical image data, indicate that exponential deconvolution allows for accurate quantification of myocardial blood flow. Together with automated respiratory motion correction myocardial contour delineation, the exponential deconvolution enables efficient and reproducible quantification of myocardial blood flow in clinical routine.  相似文献   
98.
We introduce a new combinatorial primitive called programmable hash functions (PHFs). PHFs can be used to program the output of a hash function such that it contains solved or unsolved discrete logarithm instances with a certain probability. This is a technique originally used for security proofs in the random oracle model. We give a variety of standard model realizations of PHFs (with different parameters).  相似文献   
99.
We propose a practical public-key encryption scheme whose security against chosen-ciphertext attacks can be reduced in the standard model to the assumption that factoring is intractable.  相似文献   
100.
The specification of workloads is required in order to evaluate performance characteristics of application systems using load testing and model-based performance prediction. Defining workload specifications that represent the real workload as accurately as possible is one of the biggest challenges in both areas. To overcome this challenge, this paper presents an approach that aims to automate the extraction and transformation of workload specifications for load testing and model-based performance prediction of session-based application systems. The approach (WESSBAS) comprises three main components. First, a system- and tool-agnostic domain-specific language (DSL) allows the layered modeling of workload specifications of session-based systems. Second, instances of this DSL are automatically extracted from recorded session logs of production systems. Third, these instances are transformed into executable workload specifications of load generation tools and model-based performance evaluation tools. We present transformations to the common load testing tool Apache JMeter and to the Palladio Component Model. Our approach is evaluated using the industry-standard benchmark SPECjEnterprise2010 and the World Cup 1998 access logs. Workload-specific characteristics (e.g., session lengths and arrival rates) and performance characteristics (e.g., response times and CPU utilizations) show that the extracted workloads match the measured workloads with high accuracy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号