首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   142篇
  免费   5篇
工业技术   147篇
  2022年   8篇
  2021年   2篇
  2020年   1篇
  2019年   8篇
  2018年   4篇
  2017年   3篇
  2016年   1篇
  2015年   4篇
  2014年   6篇
  2013年   5篇
  2012年   9篇
  2011年   10篇
  2010年   17篇
  2009年   9篇
  2008年   7篇
  2007年   6篇
  2006年   5篇
  2005年   4篇
  2004年   6篇
  2003年   2篇
  2002年   4篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1982年   2篇
  1969年   1篇
  1966年   1篇
排序方式: 共有147条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
In the robotics community, there exist implicit assumptions concerning the computational capabilities of robots. Two computational classes of robots emerge as focal points of recent research: robot ants and robot elephants. Ants have poor memory and communication capabilities, but are able to communicate using pheromones, in effect, turning their work area into a shared memory. By comparison, elephants are computationally stronger, have large memory, and are equipped with strong sensing and communication capabilities. Unfortunately, not much is known about the relation between the capabilities of these models in terms of the tasks they can address. In this paper, we present formal models of both ants and elephants, and investigate if one dominates the other. We present two algorithms: AntEater, which allows elephant robots to execute ant algorithms and ElephantGun, which converts elephant algorithms-specified as Turing machines-into ant algorithms. By exploring the computational capabilities of these algorithms, we reach interesting conclusions regarding the computational power of both models.  相似文献   
5.
Let $G=(V,E)$ be an undirected multigraph with a special vertex ${\it root} \in V$, and where each edge $e \in E$ is endowed with a length $l(e) \geq 0$ and a capacity $c(e) > 0$. For a path $P$ that connects $u$ and $v$, the {\it transmission time} of $P$ is defined as $t(P)=\mbox{\large$\Sigma$}_{e \in P} l(e) + \max_{e \in P}\!{(1 / c(e))}$. For a spanning tree $T$, let $P_{u,v}^T$ be the unique $u$--$v$ path in $T$. The {\sc quickest radius spanning tree problem} is to find a spanning tree $T$ of $G$ such that $\max _{v \in V} t(P^T_{root,v})$ is minimized. In this paper we present a 2-approximation algorithm for this problem, and show that unless $P =NP$, there is no approximation algorithm with a performance guarantee of $2 - \epsilon$ for any $\epsilon >0$. The {\sc quickest diameter spanning tree problem} is to find a spanning tree $T$ of $G$ such that $\max_{u,v \in V} t(P^T_{u,v})$ is minimized. We present a ${3 \over 2}$-approximation to this problem, and prove that unless $P=NP$ there is no approximation algorithm with a performance guarantee of ${3 \over 2}-\epsilon$ for any $\epsilon >0$.  相似文献   
6.
C-reactive protein (CRP) is considered a biomarker of infection/inflammation. It is a commonly used tool for early detection of infection in the emergency room or as a point-of-care test and especially for differentiating between bacterial and viral infections, affecting decisions of admission and initiation of antibiotic treatments. As C-reactive protein is part of a dynamic and continuous inflammatory process, a single CRP measurement, especially at low concentrations, may erroneously lead to a wrong classification of an infection as viral over bacterial and delay appropriate antibiotic treatment. In the present review, we introduce the concept of C-reactive protein dynamics, measuring the velocity of C-reactive protein elevation, as a tool to increase this biomarker’s diagnostic ability. We review the studies that helped define new metrics such as estimated C-reactive protein velocity (velocity of C-reactive protein elevation from symptoms’ onset to first C-reactive protein measurement) and the measured C-reactive protein velocity (velocity between sequential C-reactive protein measurements) and the use of these metrics in different clinical scenarios. We also discuss future research directions for this novel metric.  相似文献   
7.
8.
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average).  相似文献   
9.
10.
The mechanism and course of Triticum plastome evolution is currently unknown; thus, it remains unclear how Triticum plastomes evolved during recent polyploidization. Here, we report the complete plastomes of two polyploid wheat species, Triticum sphaerococcum (AABBDD) and Triticum turgidum subsp. durum (AABB), and compare them with 19 available and complete Triticum plastomes to create the first map of genomic structural variation. Both T. sphaerococcum and T. turgidum subsp. durum plastomes were found to have a quadripartite structure, with plastome lengths of 134,531 bp and 134,015 bp, respectively. Furthermore, diploid (AA), tetraploid (AB, AG) and hexaploid (ABD, AGAm) Triticum species plastomes displayed a conserved gene content and commonly harbored an identical set of annotated unique genes. Overall, there was a positive correlation between the number of repeats and plastome size. In all plastomes, the number of tandem repeats was higher than the number of palindromic and forward repeats. We constructed a Triticum phylogeny based on the complete plastomes and 42 shared genes from 71 plastomes. We estimated the divergence of Hordeum vulgare from wheat around 11.04–11.9 million years ago (mya) using a well-resolved plastome tree. Similarly, Sitopsis species diverged 2.8–2.9 mya before Triticum urartu (AA) and Triticum monococcum (AA). Aegilops speltoides was shown to be the maternal donor of polyploid wheat genomes and diverged ~0.2–0.9 mya. The phylogeny and divergence time estimates presented here can act as a reference framework for future studies of Triticum evolution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号