首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   157篇
  免费   8篇
  国内免费   1篇
电工技术   1篇
综合类   2篇
化学工业   25篇
金属工艺   4篇
机械仪表   10篇
建筑科学   4篇
能源动力   6篇
轻工业   4篇
石油天然气   1篇
无线电   10篇
一般工业技术   29篇
冶金工业   14篇
原子能技术   6篇
自动化技术   50篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   4篇
  2019年   6篇
  2018年   5篇
  2017年   11篇
  2016年   10篇
  2015年   7篇
  2014年   10篇
  2013年   22篇
  2012年   11篇
  2011年   13篇
  2010年   14篇
  2009年   5篇
  2008年   5篇
  2007年   4篇
  2006年   2篇
  2005年   5篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   4篇
  1994年   1篇
  1993年   4篇
  1992年   3篇
  1991年   1篇
  1985年   1篇
排序方式: 共有166条查询结果,搜索用时 109 毫秒
1.
Anatomic snapshot memory object in shared memory systems enables a set of processes, calledscanners, to obtain a consistent picture of the shared memory while other processes, calledupdaters, keep updating memory locations concurrently. In this paper we present two conversion methods of snapshot implementations. Using the first conversion method we obtain a new snapshot implementation in which the scan operation has linear time complexity and the time complexity of the update operation becomes the sum of the time complexities of the original implementation. Applying the second conversion method yields similar results, where in this case the time complexity of the update protocol becomes linear. Although our conversion methods use unbounded space, their space complexity can be bounded using known techniques. One of the most intriguing open problems in distributed wait-free computing is the existence of a linear-time implementation of this object. Using our conversion methods and known constructions we obtain the following results:
  • ?Consider a system ofn processes, each an updater and a scanner. We present an implementation in which the time complexity of either the update or the scan operation is linear, while the time complexity of the second operation isO(n logn).
  • ?We present an implementation with linear time complexity when the number of either updaters or scanners isO(n/logn), wheren is the total number of processes.
  • ?We present an implementation with amortized linear time complexity when one of the protocols (either upate or scan) is executed significantly more often than the other protocol.
  •   相似文献   
    2.
    The main purpose of this paper is to provide a methodology for discussing the fuzzy. Bayesian system reliability from the fuzzy component reliabilities, actually we discuss on the Fuzzy Bayesian system reliability assessment based on Pascal distribution, because the data sometimes cannot be measured and recorded precisely. In order to apply the Bayesian approach, the fuzzy parameters are assumed as fuzzy random variables with fuzzy prior distributions. The (conventional) Bayes estimation method will be used to create the fuzzy Bayes point estimator of system reliability by invoking the well-known theorem called ‘Resolution Identity’ in fuzzy sets theory. On the other hand, we also provide the computational procedures to evaluate the membership degree of any given Bayes point estimate of system reliability. In order to achieve this purpose, we transform the original problem into a nonlinear programming problem. This nonlinear programming problem is then divided into four sub-problems for the purpose of simplifying computation. Finally, the sub problems can be solved by using any commercial optimizers, e.g. GAMS or LINGO.  相似文献   
    3.
    Bridges are the most useful part in the transportation network. Any disruption of the bridge structures may hamper the whole transportation system. In the last recent tsunamis, numerous number of bridges were structurally damaged by the tsunami waves. Lack of proper provisions of tsunami forces in the design guidelines also contributes to the augmentations of the damage level. Therefore, proper evaluation of the tsunami forces on the bridge girder should be introduced in the design promptly. In this study, laboratory experiments were carried out to reveal the damage mechanism of the bridge girder by assessing the exerted tsunami forces. Both broken and unbroken waves were considered for the analysis. The results showed that measured forces were larger for broken waves than those of unbroken waves. Maximum force of the broken waves was 4.59 times as large as the hydrostatic pressure. Also, waves reached the peak value more rapidly for larger wave heights than those of smaller ones. Additionally, a girder that is placed at a higher position is much vulnerable to tsunami hazard.  相似文献   
    4.
    A flat rigid elliptical anchorage located in a damage‐susceptible fluid‐saturated poroelastic medium is subjected to an in‐plane load, which induces a pure translation in the plane of the anchor. This paper develops computational estimates for the time‐dependent displacement of the disc anchor for the classical problem that involves Biot consolidation and compares the results with situations where the porous skeleton can experience micro‐mechanical damage that leads to an alteration in both its elasticity and fluid transport characteristics. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
    5.
    6.
    In this article, an internal-reforming solid oxide fuel cell–gas turbine (IRSOFC–GT) hybrid system is modeled and analyzed from thermal (energy and exergy), economic, and environmental points of view. The model is validated using available data in the literature. Utilizing the genetic algorithm optimization technique, multi-objective optimization of modeled system is carried out and the optimal values of system design parameters are obtained. In the multi-objective optimization procedure, the exergy efficiency and the total cost rate of the system (including the capital and maintenance costs, operational cost (fuel cost), and social cost of air pollution for CO, NOx, and CO2) are considered as objective functions. A sensitivity analysis is also performed in order to study the effect of variations of the fuel unit cost on the Pareto optimal solutions and their corresponding design parameters. The optimization results indicate that the final optimum design chosen from the Pareto front results in exergy efficiency of 65.60% while it leads to total cost of 3.28 million US$ year−1. It is also demonstrated that the payback time of the chosen design is 6.14 years.  相似文献   
    7.

    A novel method for grain refinement of martensite structures was proposed, in which transformation strain is accumulated by cyclic displacive forward and reverse transformations. This method can refine martensite structures in an Fe-18Ni alloy because a high density of austenite dislocations is introduced by a displacive reverse transformation in addition to an inheritance of dislocations in body-centered cubic martensite into austenite during cyclic transformation. The addition of a small amount of carbon accelerates structure refinement significantly, which results in the formation of ultra-fine-grained structures after ten cycles.

      相似文献   
    8.
    Neural Computing and Applications - Nowadays, one of the problems in current authentication, authorization and accounting (AAA) model is lack of accurate roadmap of access management in integrated...  相似文献   
    9.
    In this study, the effects of material thickness and processing method on the degradation rate and the changes in the mechanical properties of poly(lactic-co-glycolic acid) material during simulated physiological degradation were investigated. Two types of poly(lactic-co-glycolic acid) materials were considered: 0.12?mm solvent-cast films and 1?mm compression-moulded plates. The experimental results presented in this study were compared to the experimental results of Shirazi et al. (Acta Biomaterialia 10(11):4695–703, 2014) for 0.25?mm solvent-cast films. These experimental observations were used to validate the computational modelling predictions of Shirazi et al. (J Mech Behav Biomed Mater 54: 48–59, 2016) on critical diffusion length scale and also to refine the model parameters. The specific material processing methods considered here did not have a significant effect on the degradation rate and the changes in mechanical properties during degradation; however, they influenced the initial molecular weight and they determined the stiffness and hardness of the poly(lactic-co-glycolic acid) material. The experimental observations strongly supported the computational modelling predictions that showed no significant difference in the degradation rate and the changes in the elastic modulus of poly(lactic-co-glycolic acid) films for thicknesses larger than 100?μm.  相似文献   
    10.
    This study critically investigates the main characteristics and features of anti-filtering packages provided by Free and Open Source Software (FOSS). For over a decade, the digital communities around the globe have used FOSS packages not only as an inexpensive way to access to information available on Internet, but also to disseminate thoughts, opinions and concerns about various socio-political and economic matters. Proxy servers and FOSS played a vital role in helping citizens in repressed countries to bypass the state imposed Internet content filtering and censorship practices. On the one hand, proxy servers act as redirectors to websites, and on the other hand, many of these servers are the main source for downloading FOSS anti-filtering software packages. These packages can provide secure web surfing via anonymous web access, data encryption, IP address masking, location concealment, browser history and cookie clean-ups but they also provide proxy software updates as well as domain name updates.The main objectives of this study are to investigate the role of FOSS packages in combating Internet content filtering and censorship and empowering citizens to effectively participate in communication discourse. By evaluating some of the well known FOSS anti-filtering packages used by Iran's digital community, this study found that despite the success of FOSS in combating filtering and state censorship, the majority of these software packages were not designed to meet the needs of Internet users. In particular, they are poorly adapted to the slow Internet connections in many developing countries such as Iran. In addition, these software packages do not meet the level of sophistication used by authorities to filter the content of the Net. Therefore, this study offers a new model that takes into account not only the existing level of the Internet infrastructure but also the growing number of Internet users demanding more effective FOSS packages for faster access to uncensored information while maintaining anonymity.  相似文献   
    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号