首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   106篇
  免费   6篇
电工技术   1篇
化学工业   34篇
机械仪表   1篇
建筑科学   4篇
能源动力   4篇
轻工业   12篇
水利工程   1篇
无线电   2篇
一般工业技术   20篇
冶金工业   8篇
自动化技术   25篇
  2023年   7篇
  2022年   3篇
  2021年   5篇
  2020年   11篇
  2019年   3篇
  2018年   2篇
  2017年   5篇
  2016年   5篇
  2015年   4篇
  2014年   7篇
  2013年   5篇
  2012年   5篇
  2011年   7篇
  2010年   7篇
  2009年   3篇
  2008年   6篇
  2007年   3篇
  2006年   2篇
  2004年   4篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   4篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1991年   1篇
  1987年   1篇
  1978年   1篇
  1977年   1篇
  1976年   2篇
排序方式: 共有112条查询结果,搜索用时 709 毫秒
1.
The Internet Archive’s (IA) Wayback Machine is the largest and oldest public Web archive and has become a significant repository of our recent history and cultural heritage. Despite its importance, there has been little research about how it is discovered and used. Based on Web access logs, we analyze what users are looking for, why they come to IA, where they come from, and how pages link to IA. We find that users request English pages the most, followed by the European languages. Most human users come to Web archives because they do not find the requested pages on the live Web. About 65 % of the requested archived pages no longer exist on the live Web. We find that more than 82 % of human sessions connect to the Wayback Machine via referrals from other Web sites, while only 15 % of robots have referrers. Most of the links (86 %) from Websites are to individual archived pages at specific points in time, and of those 83 % no longer exist on the live Web. Finally, we find that users who come from search engines browse more pages than users who come from external Web sites.  相似文献   
2.
Designing efficient as well as secure cryptographic protocols for resource-constrained applications is a challenging task. In this paper, we formally analyze the security of an efficient one-pass authenticated key establishment protocol, the 1P-AKE protocol, which is primarily proposed for resource-constrained sensor nodes devices in wireless sensor networks (WSNs). In contrast to the existing identity-based one-pass key establishment protocols, the 1P-AKE protocol does not require any bilinear pairing computation in order to establish a key. This feature makes it really attractive for resource-constrained application environments, such as WSNs, where pairing computations are too expensive. We show that in the random oracle model, the 1P-AKE protocol is a secure authenticated one-pass key establishment protocol under the computational Diffie–Hellman assumption. The performance of the 1P-AKE protocol is also discussed and compared with the existing relevant protocols.  相似文献   
3.
Web archives have become a significant repository of our recent history and cultural heritage. Archival integrity and accuracy is a precondition for future cultural research. Currently, there are no quantitative or content-based tools that allow archivists to judge the quality of the Web archive captures. In this paper, we address the problems of detecting when a particular page in a Web archive collection has gone off-topic relative to its first archived copy. We do not delete off-topic pages (they remain part of the collection), but they are flagged as off-topic so they can be excluded for consideration for downstream services, such as collection summarization and thumbnail generation. We propose different methods (cosine similarity, Jaccard similarity, intersection of the 20 most frequent terms, Web-based kernel function, and the change in size using the number of words and content length) to detect when a page has gone off-topic. Those predicted off-topic pages will be presented to the collection’s curator for possible elimination from the collection or cessation of crawling. We created a gold standard data set from three Archive-It collections to evaluate the proposed methods at different thresholds. We found that combining cosine similarity at threshold 0.10 and change in size using word count at threshold ?0.85 performs the best with accuracy = 0.987, \(F_{1}\) score = 0.906, and AUC \(=\) 0.968. We evaluated the performance of the proposed method on several Archive-It collections. The average precision of detecting off-topic pages in the collections is 0.89.  相似文献   
4.
5.
There is a pressing need to develop more effective therapeutics to fight cancer. An idyllic chemotherapeutic is expected to overcome drug resistance of tumors and minimize harmful side effects to healthy tissues. Antibody‐functionalized porous silicon nanoparticles loaded with a combination of chemotherapy drug and gold nanoclusters (AuNCs) are developed. These nanocarriers are observed to selectively deliver both payloads, the chemotherapy drug and AuNCs, to human B cells. The accumulation of AuNCs to target cells and subsequent exposure to an external electromagnetic field in the microwave region render them more susceptible to the codelivered drug. This approach represents a targeted two‐stage delivery nanocarrier that benefits from a dual therapeutic action that results in enhanced cytotoxicity.  相似文献   
6.
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   
7.
Hollow poly (vinylpyrrolidone) (PVP) + TiO2 and polypyrrole (core)/PVP (sheath) nanofibers were successfully electrospun using hydrodynamic fluid focusing. Utilizing a two-dimensional fluid focusing technique previously applied to aqueous solutions, intersecting microchannels cast in (poly)dimethylsiloxane were utilized to dynamically center core fluids in immiscible sheath fluids prior to electrospinning at the channel outlet. Advantages of using microfluidic channel networks for the electrospinning of composite nanofibers include spatiotemporal control over input reagents, ease of fabrication and the ability to focus the core stream into sheath layer without the need of complex co-annular nozzles.  相似文献   
8.
On the SPH tensile instability in forming viscous liquid drops   总被引:1,自引:0,他引:1  
Smoothed Particle Hydrodynamics (SPH) simulations of elastic solids and viscous fluids may suffer from unphysical clustering of particles due to the tensile instability. Recent work has shown that in simulations of elastic or brittle solids the instability can be removed by an artificial stress whose form is derived from a linear perturbation analysis of the full set of governing SPH equations. While a linear analysis cannot be used to derive the corresponding form of the artificial stress for a viscous fluid, here we show that the same construction which applies to elastic solids may also work for viscous fluids provided that the constant parameter ? entering in the definition of the artificial stress is properly chosen. As a suitable test case, we model the formation of a circular van der Waals liquid drop and show that the tensile instability is removed when an artificial viscous force and energy generation term are added to the standard SPH equations of motion and energy, respectively. The optimal value of the constant ? is constrained by the ability of the model simulation to reproduce both a sufficiently smoothed density profile and the van der Waals phase diagram.  相似文献   
9.
This paper focuses on the relevance of alternate discrete outcome frameworks for modeling driver injury severity. The study empirically compares the ordered response and unordered response models in the context of driver injury severity in traffic crashes. The alternative modeling approaches considered for the comparison exercise include: for the ordered response framework-ordered logit (OL), generalized ordered logit (GOL), mixed generalized ordered logit (MGOL) and for the unordered response framework-multinomial logit (MNL), nested logit (NL), ordered generalized extreme value logit (OGEV) and mixed multinomial logit (MMNL) model. A host of comparison metrics are computed to evaluate the performance of these alternative models. The study provides a comprehensive comparison exercise of the performance of ordered and unordered response models for examining the impact of exogenous factors on driver injury severity. The research also explores the effect of potential underreporting on alternative frameworks by artificially creating an underreported data sample from the driver injury severity sample. The empirical analysis is based on the 2010 General Estimates System (GES) data base—a nationally representative sample of road crashes collected and compiled from about 60 jurisdictions across the United States. The performance of the alternative frameworks are examined in the context of model estimation and validation (at the aggregate and disaggregate level). Further, the performance of the model frameworks in the presence of underreporting is explored, with and without corrections to the estimates. The results from these extensive analyses point toward the emergence of the GOL framework (MGOL) as a strong competitor to the MMNL model in modeling driver injury severity.  相似文献   
10.
We conducted an exploratory study that examines the use of shared mobile displays such as mobile projectors and tablets to support group activities. We compare how a small group of visitors use either a shared display or personal individual devices in a museum visit context, in both a navigation task and a media viewing task. Group proximity, decision making, leadership patterns, and interaction between group members as well as attitudes are analyzed. We report on various usage patterns observed with group use of shared displays and discuss user preferences in comparison with the non-shared handheld alternative. Results show how mobile shared displays can support and enhance the group experience, by providing a shared mobile environment. Mobile shared displays increase group cohesiveness as was shown by increased proximity and amount of discussion by participants. Users perceive the use of shared displays as both useful and enjoyable, with the caveat that many users still want to retain individual control. We discuss this trade-off between groupness and individual control, as well as provide an analysis of the relative advantages of each shared display option.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号