首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   45篇
  免费   0篇
化学工业   14篇
机械仪表   1篇
能源动力   2篇
轻工业   4篇
水利工程   1篇
无线电   3篇
一般工业技术   12篇
冶金工业   2篇
自动化技术   6篇
  2023年   2篇
  2022年   2篇
  2021年   6篇
  2018年   1篇
  2016年   1篇
  2015年   1篇
  2013年   2篇
  2012年   4篇
  2011年   4篇
  2010年   3篇
  2009年   2篇
  2007年   3篇
  2006年   3篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  1999年   1篇
  1995年   1篇
  1994年   1篇
排序方式: 共有45条查询结果,搜索用时 11 毫秒
41.
The goal of this study was to optimize the coagulation-flocculation process in wastewater generated from the paper and pulp industry using a grey relational analysis (GRA)-based Taguchi method. Process parameters included types and doses of natural coagulants and coagulant aid, and pH. To track the efficiency of the treatment process, the following responses were chosen for optimization: chemical oxygen demand (COD), total dissolved solids (TDS) and turbidity of wastewater, alone or in combination or all together. Analysis of variance showed that the type and dose of the coagulant aid were the most significant parameters, followed by pH and the dose of the coagulant; the type of coagulant used was found to be insignificant in the coagulation-flocculation process. Optimization of process parameters to achieve lower turbidity and greater removal of COD and TDS was verified in a separate confirmatory experiment, which showed improvements in COD and TDS removal and a decrease in turbidity of 8.2, 6.35 and 26.17%, respectively, with the application of the Taguchi method and GRA.  相似文献   
42.
From scrolling and clicking to dragging, flipping, sliding, hovering, and zooming, the wide array of interaction techniques has vastly expanded the range of user actions on an interface. Each of these interaction techniques affords a distinct action. But do these techniques differ in their ability to engage users and contribute to their user experience? Furthermore, do they affect how users view the content and how much they learn from it? We address these questions via two between-subjects laboratory experiments. Study 1 (N = 128) investigated the relative effects of six on-screen interaction techniques (click-to-download, drag, mouseover, slide, zoom, and 3D carousel) on users' assessment of—as well as their engagement with—an informational website. The site for each condition was identical in content and design, except for the interaction technique used, so that we could isolate the effects of each technique on various cognitive, attitudinal and behavioral outcomes. Study 2 (N = 127) examined the relative effects of four combinations of interaction techniques (slide+click, slide+mouseover, drag+mouseover, and drag+zoom) on the same dependent variables. Data from Study 1 suggest that although the 3D carousel generates more user action, the slide is better at aiding memory. The zoom-in/out tool was the least favored, whereas the mouseover feature fostered greater engagement among power users. Findings from Study 2, which was conducted with a different content domain, replicated the positive effects of slide and negative effects of drag in influencing user experience. Path analyses, using structural equation modeling, revealed the importance of users' assessment of the interface (perceived levels of natural mapping, intuitiveness, and ease of use), which can have significant consequences for user engagement as well as resulting attitudes and behavioral outcomes. Design insights, theories, and techniques to test and capture user experience are discussed.  相似文献   
43.
The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing (ISIMSDS) to hold the DS of big data in CCEs. The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs. An access control Encryption Method (EM) is used to improve the encryption. The Complexity is measured to increase the authentication standard. The active attack is protected using this ISIMSDS methodology. Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing rapidly. The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText (PT) attack and provides more efficient computation and storage space than the related methods. The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption, decryption, and retrieval of the data.  相似文献   
44.
Nowadays, review systems have been developed with social media Recommendation systems (RS). Although research on RS social media is increasing year by year, the comprehensive literature review and classification of this RS research is limited and needs to be improved. The previous method did not find any user reviews within a time, so it gets poor accuracy and doesn’t filter the irrelevant comments efficiently. The Recursive Neural Network-based Trust Recommender System (RNN-TRS) is proposed to overcome this method’s problem. So it is efficient to analyse the trust comment and remove the irrelevant sentence appropriately. The first step is to collect the data based on the transactional reviews of social media. The second step is pre-processing using Imbalanced Collaborative Filtering (ICF) to remove the null values from the dataset. Extract the features from the pre-processing step using the Maximum Support Grade Scale (MSGS) to extract the maximum number of scaling features in the dataset and grade the weights (length, count, etc.). In the Extracting features for Training and testing method before that in the feature weights evaluating the softmax activation function for calculating the average weights of the features. Finally, In the classification method, the Recursive Neural Network-based Trust Recommender System (RNN-TRS) for User reviews based on the Positive and negative scores is analysed by the system. The simulation results improve the predicting accuracy and reduce time complexity better than previous methods.  相似文献   
45.
The exponential advancement in telecommunication embeds the Internet in every aspect of communication. Interconnections of networks all over the world impose monumental risks on the Internet. A Flooding Attack (FA) is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services. Irrespective of the protective measures incorporated in the communication infrastructure, FA still persists due to the lack of global cooperation. Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point. Providing mitigation at one or the other end may not be a complete solution. To insist on better protection against flooding attacks, this work proposes a cooperative multilevel defense mechanism. The proposed cooperative multilevel defense mechanism consists of two-level of mitigation. In the first level, it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag (TSRT), as a source end countermeasure for High-Rate Flooding Attacks (HRFA) and spoofing attacks. In the second level, the accent is to discriminate normal traffic after Distributed Denial of Service (DDoS) traffic and drop the DDoS traffic at the destination end. Flow Congruence-based Selective Pushback (FCSP), as a destination-initiated countermeasure for the Low Rate Flooding Attack (LRFA). The source and the destination cooperate to identify and block the attack. A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the attack. The presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in NS-2. The investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号