首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   159篇
  免费   9篇
电工技术   3篇
化学工业   44篇
机械仪表   17篇
建筑科学   8篇
能源动力   4篇
轻工业   3篇
水利工程   1篇
无线电   15篇
一般工业技术   21篇
冶金工业   5篇
自动化技术   47篇
  2023年   2篇
  2022年   15篇
  2021年   13篇
  2020年   6篇
  2019年   8篇
  2018年   9篇
  2017年   3篇
  2016年   14篇
  2015年   5篇
  2014年   10篇
  2013年   14篇
  2012年   5篇
  2011年   8篇
  2010年   6篇
  2009年   6篇
  2008年   2篇
  2007年   10篇
  2006年   8篇
  2005年   4篇
  2004年   2篇
  2003年   5篇
  2002年   5篇
  2000年   1篇
  1999年   2篇
  1998年   3篇
  1988年   1篇
  1976年   1篇
排序方式: 共有168条查询结果,搜索用时 296 毫秒
71.
Mobile nodes arouse new challenges that expand the performance in those environments. The nodes of Internet of Things (IoT) generate a large amount of data, which have to be stored and processed in a seamless and interpretable form by indexing. Therefore, indexing is a challenge in IoT, particularly when the nodes are mobile. The current indexing techniques dedicated to mobile environments are unsatisfying because the data are transmitted from different locations within different time periods and randomness of sensor movement. Although huge research efforts have been dedicated to this subject amid the last decades, little consideration has been paid for the research summarization and guidance. The objective of this survey is to identify the relationship between activities of mobile sensors in the context of IoT, that concerned on transferring and collecting data as well as the effectiveness of indexing techniques. The contribution of this review is to investigate the techniques of mobile IoT nodes, to find the source of challenges that adversely affect the index effectiveness. In‐depth investigation and analyses of approaches to apply IoT mobile nodes will enable the researcher to understand the behavior of mobile environments to extract the deformities that adversely affect the indexing effectiveness. The analyzed approaches are meta‐heuristic, spatial‐temporal indexing, and prediction model approach. Each approach is analyzed by discussing the features and limitations from the mobility perspectives. Furthermore, the indexing techniques are analyzed according to their features and limitations and mobile IoT indexing requirements. In conclusion, recognize and contemplate different open issues that got little focus or still unknown at this point.  相似文献   
72.
An addition sequence problem is given a set of numbers X = {n 1, n 2, . . . , n m }, what is the minimal number of additions needed to compute all m numbers starting from 1? This problem is NP-complete. In this paper, we present a branch and bound algorithm to generate an addition sequence with a minimal number of elements for a set X by using a new strategy. Then we improve the generation by generalizing some results on addition chains (m = 1) to addition sequences and finding what we will call a presumed upper bound for each n j , 1 ≤ j ≤ m, in the search tree.  相似文献   
73.
A large number of web pages contain data structured in the form of ??lists??. Many such lists can be further split into multi-column tables, which can then be used in more semantically meaningful tasks. However, harvesting relational tables from such lists can be a challenging task. The lists are manually generated and hence need not have well-defined templates??they have inconsistent delimiters (if any) and often have missing information. We propose a novel technique for extracting tables from lists. The technique is domain independent and operates in a fully unsupervised manner. We first use multiple sources of information to split individual lines into multiple fields and then, compare the splits across multiple lines to identify and fix incorrect splits and bad alignments. In particular, we exploit a corpus of HTML tables, also extracted from the web, to identify likely fields and good alignments. For each extracted table, we compute an extraction score that reflects our confidence in the table??s quality. We conducted an extensive experimental study using both real web lists and lists derived from tables on the web. The experiments demonstrate the ability of our technique to extract tables with high accuracy. In addition, we applied our technique on a large sample of about 100,000 lists crawled from the web. The analysis of the extracted tables has led us to believe that there are likely to be tens of millions of useful and query-able relational tables extractable from lists on the web.  相似文献   
74.
This work presents an artificial order-driven market able to reproduce mature and immature stock markets properties in the case of a single traded asset. This agent-based artificial market is designed to simulate characteristics of immature stock markets (high risk and low efficiency) by reproducing their stylized facts related mainly to information asymmetry and herd behavior. These two properties are modeled by combining social network and multi-agent simulations. The constructed scale-free social network, linking the modeled investors, gives rise to both informed and uninformed agents communities. Different assortative topologies are proposed and linked to different degrees of information asymmetry and market maturities. Several simulation experiments show that the modeled information asymmetry and herd behavior succeed in reproducing artificially some important stylized facts characterizing differences between immature and mature stock markets.  相似文献   
75.
We consider the problem of locating a watermark in pages of archaic documents that have been both scanned and back-lit: the problem is of interest to codicologists in identifying and tracking paper materials. Commonly, documents of interest are worn or damaged, and all information is victim to very unfavourable signal-to-noise ratios—this is especially true of ‘hidden’ data such as watermarks and chain lines. We present an approach to recto removal, followed by highlighting of such ‘hidden’ data. The result is still of very low signal quality, and we also present a statistical approach to locate watermarks from a known lexicon of fragments. Results are presented from a comprehensively scanned nineteenth century copy of the Qur’ān. The approach has lent itself to immediate exploitation in improving known watermarks, and distinguishing between twin copies. Mr Hiary was supported by the University of Jordan in pursuing this work.  相似文献   
76.
The magnetohydrodynamic rotating disk flow and heat transfer of a non-Newtonian Reiner-Rivlin conducting fluid is studied considering the ion slip. The governing nonlinear equations are solved numerically using finite differences. The results show that the inclusion of the ion slip and the non-Newtonian fluid characteristics have interesting effects on the velocity and temperature distributions.  相似文献   
77.
In the present study, the unsteady Hartmann flow of a dusty viscous incompressible electrically conducting fluid under the influence of an exponentially decreasing pressure gradient is studied without neglecting the ion slip. The parallel plates are assumed to be porous and subjected to a uniform suction from above and injection from below. The fluid is acted upon by an external uniform magnetic field which is applied perpendicular to the plates. An analytical solution for the governing equations of motion is obtained to yield the velocity distributions for both the fluid and dust particles.  相似文献   
78.
In this paper the dynamic analysis of the Macpherson strut motor-vehicle suspension system is presented. The equations of motion are formulated using a two-step transformation. Initially, the equations of motion are derived for a dynamically equivalent constrained system of particles that replaces the rigid bodies by applying Newton’s second law. The equations of motion are then transformed to a reduced set in terms of the relative joint variables. Use of both Cartesian and joint variables produces an efficient set of equations without loss of generality. For open chains, this process automatically eliminates all of the non-working constraint forces and leads to an efficient solution and integration of the equations of motion. For closed loops, suitable joints should be cut and few cut-joints constraint equations should be included for each closed chain. The chosen suspension includes open and closed loops with quarter-car model. The results of the simulation indicate the simplicity and generality of the dynamic formulation.  相似文献   
79.
The steady hydromagnetic flow of a conducting fluid above a rotating disk is studied with heat transfer in the presence of uniform suction or injection without neglecting the Hall effect. The governing momentum and energy equations are solved numerically using finite differences. The results show that the inclusion of the Hall current together with the suction or injection velocity has important effects on the velocity and temperature fields.  相似文献   
80.
In this paper, an efficient numerical algorithm for the kinematic analysis of the standard MacPherson suspension system is presented. The kinematic analysis of the suspension mechanism is carried out in terms of the rectangular Cartesian coordinates of some defined points in the links and at the kinematic joints. Geometric constraints that fix the distances between the points belonging to the same rigid link are introduced. The nonlinear constraint equations are solved by iterative numerical methods. The corresponding linear equations of the velocity and acceleration are solved to yield the velocities and accelerations of the unknown points. The velocities and accelerations of other points of interest as well as the angular velocity and acceleration of any link in the mechanism can be calculated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号