首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   352篇
  免费   22篇
  国内免费   2篇
工业技术   376篇
  2023年   10篇
  2022年   21篇
  2021年   32篇
  2020年   25篇
  2019年   33篇
  2018年   20篇
  2017年   14篇
  2016年   14篇
  2015年   13篇
  2014年   21篇
  2013年   25篇
  2012年   16篇
  2011年   13篇
  2010年   10篇
  2009年   13篇
  2008年   5篇
  2007年   9篇
  2006年   7篇
  2005年   2篇
  2004年   3篇
  2003年   8篇
  2002年   1篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   10篇
  1997年   7篇
  1996年   3篇
  1995年   5篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1984年   2篇
  1983年   1篇
  1976年   1篇
  1968年   1篇
排序方式: 共有376条查询结果,搜索用时 15 毫秒
1.
From theory to practice: an overview of MIMO space-time coded wireless systems   总被引:39,自引:0,他引:39  
This paper presents an overview of progress in the area of multiple input multiple output (MIMO) space-time coded wireless systems. After some background on the research leading to the discovery of the enormous potential of MIMO wireless links, we highlight the different classes of techniques and algorithms proposed which attempt to realize the various benefits of MIMO including spatial multiplexing and space-time coding schemes. These algorithms are often derived and analyzed under ideal independent fading conditions. We present the state of the art in channel modeling and measurements, leading to a better understanding of actual MIMO gains. Finally, the paper addresses current questions regarding the integration of MIMO links in practical wireless systems and standards.  相似文献   
2.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
3.
Neural Computing and Applications - Preserving red-chili quality is of utmost importance in which the authorities demand quality techniques to detect, classify, and prevent it from impurities. For...  相似文献   
4.
The dynamics of superparamagnetic particles subject to competing magnetic and viscous drag forces have been examined with a uniform, stationary, external magnetic field. In this approach, competing drag and magnetic forces were created in a fluid suspension of superparamagnetic particles that was confined in a capillary tube; competing viscous drag and magnetic forces were established by rotating the tube. A critical Mason number was determined for conditions under which the rotation of the capillary prevents the formation of chains from individual particles. The statistics of chain length was investigated by image analysis while varying parameters such as the rotation speed and the viscosity of the liquid. The measurements showed that the rate of particle chain formation was decreased with increased viscosity and rotation speed; the particle dynamics could be quantified by the same dimensionless Mason number that has been demonstrated for rotating magnetic fields. The potential for enhancement of mixing in a bioassay was assessed using a fast chemical reaction that was diffusion-limited. Reducing the Mason number below the critical value, so that chains were formed in the fluid, gave rise to a modest improvement in the time to completion of the reaction.  相似文献   
5.
An adaptive genetic-based signature learning system for intrusion detection   总被引:1,自引:0,他引:1  
Rule-based intrusion detection systems generally rely on hand crafted signatures developed by domain experts. This could lead to a delay in updating the signature bases and potentially compromising the security of protected systems. In this paper, we present a biologically-inspired computational approach to dynamically and adaptively learn signatures for network intrusion detection using a supervised learning classifier system. The classifier is an online and incremental parallel production rule-based system.A signature extraction system is developed that adaptively extracts signatures to the knowledge base as they are discovered by the classifier. The signature extraction algorithm is augmented by introducing new generalisation operators that minimise overlap and conflict between signatures. Mechanisms are provided to adapt main algorithm parameters to deal with online noisy and imbalanced class data. Our approach is hybrid in that signatures for both intrusive and normal behaviours are learnt.The performance of the developed systems is evaluated with a publicly available intrusion detection dataset and results are presented that show the effectiveness of the proposed system.  相似文献   
6.
7.
8.
9.
We develop analytical and numerical conditions to determine whether limit cycle oscillations synchronize in diffusively coupled systems. We examine two classes of systems: reaction–diffusion PDEs with Neumann boundary conditions, and compartmental ODEs, where compartments are interconnected through diffusion terms with adjacent compartments. In both cases the uncoupled dynamics are governed by a nonlinear system that admits an asymptotically stable limit cycle. We provide two-time scale averaging methods for certifying stability of spatially homogeneous time-periodic trajectories in the presence of sufficiently small or large diffusion and develop methods using the structured singular value for the case of intermediate diffusion. We highlight cases where diffusion stabilizes or destabilizes such trajectories.  相似文献   
10.
The control chart based on the compound Poisson distribution (the negative binomial exponentially weighted moving average (EWMA) chart) has been shown to be more effective than the c‐chart to monitor the wafer nonconformities in semiconductor production process. The performance of the negative binomial EWMA chart is generally evaluated with the assumption that the process parameters are known. However, in many control chart applications, the process parameters are usually unknown and are required to be estimated. For an accurate parameter estimate, a very large sample size may be required, which is seldom available in the applications. This article investigates the effect of parameter estimation on the run length properties of the negative binomial EWMA charts. Using a Markov chain approach, we show that the performance of the negative binomial EWMA chart is affected when parameters are estimated compared with the known‐parameter case. We also provide recommendations regarding phase I sample sizes, smoothing constant and clustering parameter. The sample size must be quite large for the in‐control chart performance to be close to that for the known‐parameter case. Finally, a wafer process example has been used to highlight the practical implications of estimation error and to offer advice to practitioners when constructing/analysing a phase I sample. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号