首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   109篇
  国内免费   24篇
  2024年   3篇
  2023年   3篇
  2022年   7篇
  2021年   6篇
  2020年   9篇
  2019年   4篇
  2018年   14篇
  2017年   16篇
  2016年   33篇
  2015年   15篇
  2014年   33篇
  2013年   27篇
  2012年   30篇
  2011年   30篇
  2010年   15篇
  2009年   17篇
  2008年   21篇
  2007年   18篇
  2006年   14篇
  2005年   16篇
  2004年   9篇
  2003年   4篇
  2002年   4篇
  2001年   2篇
  2000年   7篇
  1999年   6篇
  1998年   10篇
  1997年   6篇
  1996年   5篇
  1995年   3篇
  1994年   1篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
排序方式: 共有394条查询结果,搜索用时 15 毫秒
351.
本文介绍了一个在NETBIOS支持下用Ada的任务机制实现的网络上任意两节点间的文件全双工传输系统。传输时,文件以数据报的分组形式发送,由Ada 的任务特性来管理收、发进程,实现后台全双工操作。本文还简要地介绍了实现中的一些技巧。  相似文献   
352.
容错能力是计算机(传统计算机或神经计算机)能力的一个极重要的方面。本文从研究传统计算机容错技术和人脑容错特性出发,着重研究了神经计算机的容错能力,并得出了对神经计算机设计极有价值的结论。  相似文献   
353.
视觉细胞之间存在的侧抑制机制能够对接收到的视觉信息进行选择性的提取。运用数学方法模拟视觉细胞之间存在的这种生理机制,提出了一种具有分流型抑制机制的视网膜细胞神经网络模型(SIRCNN),分析了该模型的稳定性,给出了等价电路图,并且基于此模型提出了一种边缘检测算法。将该算法应用于图像边缘检测中,试验结果表明,这种以生物视觉感知机理为基础的神经计算方法可有效地增强图像反差,检测图像边缘。由于细胞神经网络具有高速并行运算、便于硬件实现等特点,因此这种方法在图像实时处理中也具有很大的潜力和应用前景。  相似文献   
354.
归因理论对英语教学的启示   总被引:1,自引:0,他引:1  
本文通过对归因理论的阐述和对学生学业状况的归因倾向分析,提出了归因理论对英语教学的启示:一要关注学生的归因反应;二要研究学生的归因倾向,引导学生正确归因;三要重视培养学生的情感智力和认知技能;四要对教师自身的教学工作进行正确的归因。  相似文献   
355.
无线自组织网络中的跨层攻击具有比单层攻击更强的隐蔽性、更好的攻击效果或更低的攻击成本.为了检测无线自组织网络中的跨层攻击,提出了一种基于博弈论的攻击检测模型.由于攻击不可避免地会对各协议层的参数造成影响,因此模型从协议层攻防博弈的角度,建立起相应的策略矩阵和支付矩阵,并通过均衡分析得到该模型的混合策略纳什均衡解.仿真结...  相似文献   
356.
We study the problem of recovering a production plan after a disruption, where the disruption may be caused by incidents such as power failure, market change, machine breakdown, supply shortage, worker no‐show, and others. The new recovery plan we seek after has to not only suit the changed environment brought about by the disruption, but also be close to the initial plan so as not to cause too much customer unsatisfaction or inconvenience for current‐stage and downstream operations. For the general‐cost case, we propose a dynamic programming method for the problem. For the convex‐cost case, a general problem which involves both cost and demand disruptions can be solved by considering the cost disruption first and then the demand disruption. We find that a pure demand disruption is easy to handle; and for a pure cost disruption, we propose a greedy method which is provably efficient. Our computational studies also reveal insights that will be helpful to managing disruptions in production planning. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
357.
During the last decade telecommunication operators have been deploying WDM (Wavelength Division Multiplexing) technology to satisfy the exponential growth in global communication. While facilitating the advanced information society of today, this has also led to a higher dependency on the networks, and furthermore the high capacity utilization of optical fibers means that a single link failure will influence many users and enterprises. For these reasons, protection of network connections has become a major competitive parameter for the operators. Currently, the most popular protection method is ring protection, due to its simplicity, requiring only basic management functionality and operating with local restoration control. While many optical rings have been deployed, little work has been published on exactly what the cost of ring networks are, compared to general mesh networks. In this article we perform a quantitative comparison between ring protection and mesh protection, using real world network data and realistic prices for network components. Extending classic LP flow models to take rings and node costs into account, and using a link‐path based mesh network LP model, we are able to perform a total cost comparison of the two architectures, and of manual ring network design. The results suggest that the price of mesh network components must be reduced significantly to be competitive with ring based networks, and also that manual network design does not necessarily lead to the most cost‐efficient designs. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
358.
We develop an approximate planning model for a distributed computing network in which a control system oversees the assignment of information flows and tasks to a pool of shared computers, and describe several optimization applications using the model. We assume that the computers are multithreaded, and have differing architectures leading to varying and inconsistent processing rates. The model is based on a discrete‐time, continuous flow model developed by Graves [Oper Res 34 (1986), 522–533] which provides the steady‐state moments of production and work‐in‐queue quantities. We make several extensions to Graves' model to represent distributed computing networks. First, we approximately model control rules that are nonlinear functions of the work‐in‐queue at multiple stations through a linearization approach. Second, we introduce an additional noise term on production and show its use in modeling the discretization of jobs. Third, we model groups of heterogeneous computers as aggregate, “virtual computing cells” that process multiple tasks simultaneously, using a judiciously selected control rule. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
359.
由于现行的车内通话器均采用有线连接和传统的降噪方式,导致了乘员活动范围受限以及降噪能力不强等问题.提出了一套综合应用蓝牙技术和骨传导技术的无线语音通信系统,并将其应用到装甲车辆上,最后提出了一些在实际设计中需要解决的问题,为今后进一步研究提供参考.  相似文献   
360.
配氧控制是闭式循环柴油机(CCD)系统的关键技术之一,为改善其动态特性,在 PID反馈控制的基础上,设计了基于模糊神经网络(FNNs)模型的前馈控制器,并采用 PID反馈控制输出信号作为网络训练的误差信号,使模糊神经网络逐步具有前馈补偿能力,从而能够有效对负荷扰动进行及时补偿.仿真结果表明,采用FNNs前馈控制器后,可以有效改善氧气控制的动态特性,并且具有快速的学习速度和很强的适应能力.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号