全文获取类型
收费全文 | 97篇 |
免费 | 3篇 |
专业分类
化学工业 | 10篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 5篇 |
能源动力 | 3篇 |
轻工业 | 4篇 |
无线电 | 2篇 |
一般工业技术 | 12篇 |
冶金工业 | 16篇 |
原子能技术 | 16篇 |
自动化技术 | 29篇 |
出版年
2021年 | 3篇 |
2020年 | 2篇 |
2018年 | 2篇 |
2017年 | 3篇 |
2016年 | 1篇 |
2015年 | 2篇 |
2014年 | 3篇 |
2013年 | 6篇 |
2012年 | 3篇 |
2011年 | 12篇 |
2010年 | 2篇 |
2009年 | 9篇 |
2008年 | 15篇 |
2007年 | 3篇 |
2006年 | 3篇 |
2005年 | 7篇 |
2003年 | 2篇 |
2002年 | 3篇 |
2001年 | 1篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1987年 | 1篇 |
1983年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1968年 | 1篇 |
1967年 | 2篇 |
排序方式: 共有100条查询结果,搜索用时 0 毫秒
1.
Noise filtering is most frequently used in data preprocessing to improve the accuracy of induced classifiers. The focus of this work is different: we aim at detecting noisy instances for improved data understanding, data cleaning and outlier identification. The paper is composed of three parts. The first part presents an ensemble-based noise ranking methodology for explicit noise and outlier identification, named Noise- Rank, which was successfully applied to a real-life medical problem as proven in domain expert evaluation. The second part is concerned with quantitative performance evaluation of noise detection algorithms on data with randomly injected noise. A methodology for visual performance evaluation of noise detection algorithms in the precision-recall space, named Viper, is presented and compared to standard evaluation practice. The third part presents the implementation of the NoiseRank and Viper methodologies in a web-based platform for composition and execution of data mining workflows. This implementation allows public accessibility of the developed approaches, repeatability and sharing of the presented experiments as well as the inclusion of web services enabling to incorporate new noise detection algorithms into the proposed noise detection and performance evaluation workflows. 相似文献
2.
3.
Leon Cizelj Matja? Leskovar Marko ?epin Borut Mavko 《Nuclear Engineering and Design》2009,239(9):1641-1646
The blast loads have in most cases not been assumed as design basis loads of nuclear power plant buildings and structures. Recent developments however stimulated a number of analyses quantifying the potential effects of such loads.An effort was therefore made by the authors to revisit simple and robust structural analysis methods and to propose their use in the vulnerability assessment of blast-loaded structures. The leading idea is to break the structure into a set of typical structural elements, for which the response is estimated by the use of slightly modified handbook formulas. The proposed method includes provisions to predict the inelastic response and failure. Simplicity and versatility of the method facilitate its use in structural reliability calculations.The most important aspects of the proposed method are presented along with illustrative sample applications demonstrating:
- •
- results comparable to full scale dynamic simulations using explicit finite element codes and
- •
- the performance of the method in screening the existing structures and providing the structural reliability information for the vulnerability analysis.
4.
Information represents one of the most important factors in the success of any enterprise today. Moreover, confidential information is becoming increasingly integrated into complex info-innovation solutions and is accordingly exposed to novel means of manipulation and theft. The legal requirements concerning information security (IS) policies in organizations are mainly based on reactive approaches that follow the standards applied in this area and are regularly updated every few years. However, a complementary approach that takes into account a fast-changing information/innovation security threats landscape and that is of proactive nature is required. Such an approach is presented in this article by linking the information security field with the field of innovation management. 相似文献
5.
A new model for upward vertical subcooled flow boiling at low pressure has been proposed. The model considers the most relevant closure relationships of one-dimensional thermal-hydraulic codes that are important for accurate prediction of vapour contents in the channel: wall evaporation model, condensation model, flow regime transition criterion and drift-flux model. The new model was incorporated in the current version of the RELAP5 code, MOD3.2.2 Gamma. The modified code was validated against a number of published low-pressure subcooled boiling experiments, and in contrast to the current code, shows good agreement with experimental data. The presented analysis also leads to a better understanding of the basic mechanisms of subcooled flow boiling at low pressure. 相似文献
6.
Cluster validity indices are used to validate results of clustering and to find a set of clusters that best fits natural partitions for given data set. Most of the previous validity indices have been considerably dependent on the number of data objects in clusters, on cluster centroids and on average values. They have a tendency to ignore small clusters and clusters with low density. Two cluster validity indices are proposed for efficient validation of partitions containing clusters that widely differ in sizes and densities. The first proposed index exploits a compactness measure and a separation measure, and the second index is based an overlap measure and a separation measure. The compactness and the overlap measures are calculated from few data objects of a cluster while the separation measure uses all data objects. The compactness measure is calculated only from data objects of a cluster that are far enough away from the cluster centroids, while the overlap measure is calculated from data objects that are enough near to one or more other clusters. A good partition is expected to have low degree of overlap and a larger separation distance and compactness. The maximum value of the ratio of compactness to separation and the minimum value of the ratio of overlap to separation indicate the optimal partition. Testing of both proposed indices on some artificial and three well-known real data sets showed the effectiveness and reliability of the proposed indices. 相似文献
7.
Rade Injac Borut Strukelj Vukosava Djordjevic‐Milic Katarina Karljikovic‐Rajic Henk Lingeman 《Journal of the science of food and agriculture》2008,88(9):1576-1581
BACKGROUND: The European Union has forbidden the use of antibiotics as additives in animal feed. Zn‐bacitracin (Zn‐BC) and nystatin (NYS) were frequently used for their growth‐promoting effects and for feed conversion in poultry, pigs and cattle. An HPTLC method has been developed for separating Zn‐BC and NYS in the mixture, for routine quality control. RESULTS: The separation was obtained using RP‐18 F254S coated HPTLC plates with acetonitrile/methanol (equal volumes):toluene:KH2PO4/KOH (buffer, pH 6.8) = 57:3:40 (v/v/v), adjusted with HCl to pH 8.2, as a mobile phase. The densitograms were monitored at 192, 215 and 305 nm and both antibiotics were assayed at 215 nm. The method was shown to be specific, accurate (recoveries were 98.7 ± 0.5% and 104.8 ± 0.7% for Zn‐BC and NYS, respectively), linear over the tested range (correlation coefficients, 0.9982 and 0.9884), and precise (intermediate precision RSD below 2.2% for both analytes) with efficient separation (Rs = 3.5). CONCLUSION: The method was applied for determining Zn‐BC and NYS as additives in spiked matrices of commercial animal feedstuffs. According to LOD values for each antibiotic, the minimum detectable amount in feed is 4.5 and 5.5 ppm of Zn‐BC and NYS, respectively. Copyright © 2008 Society of Chemical Industry 相似文献
8.
An Efficient Code-Based Voxel-Traversing Algorithm 总被引:2,自引:1,他引:2
The paper considers an efficient approach to traversing a uniformly-subdivided space pierced by a line segment. A voxel, as the basic constituent element of the uniformly subdivided space, is restricted to having the form of a cube. The algorithm works in two steps. In the first step, the so-called Bresenham voxels are identified and, by comparing their position codes, their type of connectivity is determined. To achieve the required connectivity between neighbouring voxels, the second step of the algorithm is applied to find the missing voxels. In this way, the algorithm efficiently switches between face-, edge- and vertex-connectivity. Although the algorithm works with oating-point precision, it is extremely computationally efficient, and tests of speed compared with the Müller, Cleary & Wyvill, Amanatides & Woo, and Zemčik algorithms are described. 相似文献
9.
Nina Kobal Tjaa Kraovec Maja utar Marija Volk Borut Peterlin Marko Hawlina Ana Fakin 《International journal of molecular sciences》2021,22(4)
Mutations in rhodopsin gene (RHO) are a frequent cause of retinitis pigmentosa (RP) and less often, congenital stationary night blindness (CSNB). Mutation p.G90D has previously been associated with CSNB based on the examination of one family. This study screened 60 patients. Out of these 60 patients, 32 were affected and a full characterization was conducted in 15 patients. We described the clinical characteristics of these 15 patients (12 male, median age 42 years, range 8–71) from three families including visual field (Campus Goldmann), fundus autofluorescence (FAF), optical coherence tomography (OCT) and electrophysiology. Phenotypes were classified into four categories: CSNB (N = 3, 20%) sector RP (N = 3, 20%), pericentral RP (N = 1, 6.7%) and classic RP (N = 8, 53.3% (8/15)). The phenotypes were not associated with family, sex or age (Kruskal–Wallis, p > 0.05), however, cystoid macular edema (CME) was observed only in one family. Among the subjects reporting nyctalopia, 69% (22/32) were male. The clinical characteristics of the largest p.G90D cohort so far showed a large frequency of progressive retinal degeneration with 53.3% developing RP, contrary to the previous report. 相似文献
10.
A double-loop network is an undirected graph whose nodes are integers 0,1,…,n−1 and each node u is adjacent to four nodes u±h1(mod>n), u±h2(mod>n), where 0<h1<h2<n/2. There are initially n packets, one at each of the n nodes. The packet at node u is destined to node π(u), where the mapping uπ(u) is a permutation. The aim is to minimize the number of routing steps to route all the packets to their destinations. If ℓ is the tight lower bound for this number, then the best known permutation routing algorithm takes, on average, 1.98ℓ routing steps (and 2ℓ routing steps in the worst-case).Because the worst-case complexity cannot be improved, we design four new static permutation routing algorithms with gradually improved average-case performances, which are 1.37ℓ, 1.35ℓ, 1.18ℓ, and 1.12ℓ. Thus, the best of these algorithms exceeds the optimal routing by at most 12% on average.To support our algorithm design we develop a program which simulates permutation routing in a network according to the given topology, routing model as well as communication pattern and measure several quality criteria. We have tested our algorithms on a large number of double-loop networks and permutations (randomly generated and standard). 相似文献