全文获取类型
收费全文 | 261篇 |
免费 | 109篇 |
国内免费 | 24篇 |
出版年
2024年 | 3篇 |
2023年 | 3篇 |
2022年 | 7篇 |
2021年 | 6篇 |
2020年 | 9篇 |
2019年 | 4篇 |
2018年 | 14篇 |
2017年 | 16篇 |
2016年 | 33篇 |
2015年 | 15篇 |
2014年 | 33篇 |
2013年 | 27篇 |
2012年 | 30篇 |
2011年 | 30篇 |
2010年 | 15篇 |
2009年 | 17篇 |
2008年 | 21篇 |
2007年 | 18篇 |
2006年 | 14篇 |
2005年 | 16篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 10篇 |
1997年 | 6篇 |
1996年 | 5篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
排序方式: 共有394条查询结果,搜索用时 15 毫秒
351.
本文介绍了一个在NETBIOS支持下用Ada的任务机制实现的网络上任意两节点间的文件全双工传输系统。传输时,文件以数据报的分组形式发送,由Ada 的任务特性来管理收、发进程,实现后台全双工操作。本文还简要地介绍了实现中的一些技巧。 相似文献
352.
容错能力是计算机(传统计算机或神经计算机)能力的一个极重要的方面。本文从研究传统计算机容错技术和人脑容错特性出发,着重研究了神经计算机的容错能力,并得出了对神经计算机设计极有价值的结论。 相似文献
353.
视觉细胞之间存在的侧抑制机制能够对接收到的视觉信息进行选择性的提取。运用数学方法模拟视觉细胞之间存在的这种生理机制,提出了一种具有分流型抑制机制的视网膜细胞神经网络模型(SIRCNN),分析了该模型的稳定性,给出了等价电路图,并且基于此模型提出了一种边缘检测算法。将该算法应用于图像边缘检测中,试验结果表明,这种以生物视觉感知机理为基础的神经计算方法可有效地增强图像反差,检测图像边缘。由于细胞神经网络具有高速并行运算、便于硬件实现等特点,因此这种方法在图像实时处理中也具有很大的潜力和应用前景。 相似文献
354.
归因理论对英语教学的启示 总被引:1,自引:0,他引:1
林岚 《兵团教育学院学报》2004,14(3):65-68
本文通过对归因理论的阐述和对学生学业状况的归因倾向分析,提出了归因理论对英语教学的启示:一要关注学生的归因反应;二要研究学生的归因倾向,引导学生正确归因;三要重视培养学生的情感智力和认知技能;四要对教师自身的教学工作进行正确的归因。 相似文献
355.
无线自组织网络中的跨层攻击具有比单层攻击更强的隐蔽性、更好的攻击效果或更低的攻击成本.为了检测无线自组织网络中的跨层攻击,提出了一种基于博弈论的攻击检测模型.由于攻击不可避免地会对各协议层的参数造成影响,因此模型从协议层攻防博弈的角度,建立起相应的策略矩阵和支付矩阵,并通过均衡分析得到该模型的混合策略纳什均衡解.仿真结... 相似文献
356.
We study the problem of recovering a production plan after a disruption, where the disruption may be caused by incidents such as power failure, market change, machine breakdown, supply shortage, worker no‐show, and others. The new recovery plan we seek after has to not only suit the changed environment brought about by the disruption, but also be close to the initial plan so as not to cause too much customer unsatisfaction or inconvenience for current‐stage and downstream operations. For the general‐cost case, we propose a dynamic programming method for the problem. For the convex‐cost case, a general problem which involves both cost and demand disruptions can be solved by considering the cost disruption first and then the demand disruption. We find that a pure demand disruption is easy to handle; and for a pure cost disruption, we propose a greedy method which is provably efficient. Our computational studies also reveal insights that will be helpful to managing disruptions in production planning. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
357.
During the last decade telecommunication operators have been deploying WDM (Wavelength Division Multiplexing) technology to satisfy the exponential growth in global communication. While facilitating the advanced information society of today, this has also led to a higher dependency on the networks, and furthermore the high capacity utilization of optical fibers means that a single link failure will influence many users and enterprises. For these reasons, protection of network connections has become a major competitive parameter for the operators. Currently, the most popular protection method is ring protection, due to its simplicity, requiring only basic management functionality and operating with local restoration control. While many optical rings have been deployed, little work has been published on exactly what the cost of ring networks are, compared to general mesh networks. In this article we perform a quantitative comparison between ring protection and mesh protection, using real world network data and realistic prices for network components. Extending classic LP flow models to take rings and node costs into account, and using a link‐path based mesh network LP model, we are able to perform a total cost comparison of the two architectures, and of manual ring network design. The results suggest that the price of mesh network components must be reduced significantly to be competitive with ring based networks, and also that manual network design does not necessarily lead to the most cost‐efficient designs. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
358.
John S. Hollywood 《海军后勤学研究》2005,52(6):590-605
We develop an approximate planning model for a distributed computing network in which a control system oversees the assignment of information flows and tasks to a pool of shared computers, and describe several optimization applications using the model. We assume that the computers are multithreaded, and have differing architectures leading to varying and inconsistent processing rates. The model is based on a discrete‐time, continuous flow model developed by Graves [Oper Res 34 (1986), 522–533] which provides the steady‐state moments of production and work‐in‐queue quantities. We make several extensions to Graves' model to represent distributed computing networks. First, we approximately model control rules that are nonlinear functions of the work‐in‐queue at multiple stations through a linearization approach. Second, we introduce an additional noise term on production and show its use in modeling the discretization of jobs. Third, we model groups of heterogeneous computers as aggregate, “virtual computing cells” that process multiple tasks simultaneously, using a judiciously selected control rule. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
359.
由于现行的车内通话器均采用有线连接和传统的降噪方式,导致了乘员活动范围受限以及降噪能力不强等问题.提出了一套综合应用蓝牙技术和骨传导技术的无线语音通信系统,并将其应用到装甲车辆上,最后提出了一些在实际设计中需要解决的问题,为今后进一步研究提供参考. 相似文献
360.
配氧控制是闭式循环柴油机(CCD)系统的关键技术之一,为改善其动态特性,在 PID反馈控制的基础上,设计了基于模糊神经网络(FNNs)模型的前馈控制器,并采用 PID反馈控制输出信号作为网络训练的误差信号,使模糊神经网络逐步具有前馈补偿能力,从而能够有效对负荷扰动进行及时补偿.仿真结果表明,采用FNNs前馈控制器后,可以有效改善氧气控制的动态特性,并且具有快速的学习速度和很强的适应能力. 相似文献