首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   124篇
  免费   6篇
化学工业   23篇
机械仪表   8篇
建筑科学   8篇
矿业工程   1篇
能源动力   2篇
轻工业   4篇
石油天然气   1篇
无线电   3篇
一般工业技术   19篇
冶金工业   10篇
自动化技术   51篇
  2022年   8篇
  2021年   2篇
  2020年   1篇
  2019年   8篇
  2018年   4篇
  2017年   3篇
  2016年   1篇
  2015年   4篇
  2014年   6篇
  2013年   4篇
  2012年   9篇
  2011年   9篇
  2010年   18篇
  2009年   9篇
  2008年   7篇
  2007年   6篇
  2006年   4篇
  2005年   2篇
  2004年   4篇
  2002年   2篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有130条查询结果,搜索用时 16 毫秒
101.
Motivated by applications in batch scheduling of jobs in manufacturing systems and distributed computing, we study two related problems. Given is a set of jobs {J 1,…,J n }, where J j has a processing time p j , and an undirected intersection graph G=({1,…,n},E), with an edge (i,j) whenever the pair of jobs J i and J j cannot be processed in the same batch. We are to schedule the jobs in batches, where each batch completes its processing when the last job in the batch completes execution. The goal is to minimize the sum of job completion times. Our two problems differ in the definition of completion time of a job within a given batch. In the first variant, a job completes its execution when its batch is completed, whereas in the second variant, a job completes execution when its own processing is completed. For the first variant, we show that an adaptation of the greedy set cover algorithm gives a 4-approximation for perfect graphs. For the second variant, we give new or improved approximations for a number of different classes of graphs. The algorithms are of widely different genres (LP, greedy, subgraph covering), yet they curiously share a common feature in their use of randomized geometric partitioning.  相似文献   
102.
In many experiments facilitating tomography the reconstruction problem is under-determined, meaning there are many possible solutions consistent with the measurements. If the sampling rate is fast relative to the typical evolution time, the known physical dynamics of the system can be used as additional reconstruction constraints. Here we demonstrate that incorporating the requirement of incompressible flow can improve significantly the fidelity of the reconstructed sequence. The incompressibility of the reconstruction is assured by requiring the conservation of the density moments. It is demonstrated that the "incompressible" reconstruction can be significantly more accurate than the reconstruction using standard methods. A consequence of the density moments' conservation is the conservation of the density histogram throughout the reconstructed sequence.  相似文献   
103.
This research synthesizes a taxonomy for classifying detection methods of new malicious code by Machine Learning (ML) methods based on static features extracted from executables. The taxonomy is then operationalized to classify research on this topic and pinpoint critical open research issues in light of emerging threats. The article addresses various facets of the detection challenge, including: file representation and feature selection methods, classification algorithms, weighting ensembles, as well as the imbalance problem, active learning, and chronological evaluation. From the survey we conclude that a framework for detecting new malicious code in executable files can be designed to achieve very high accuracy while maintaining low false positives (i.e. misclassifying benign files as malicious). The framework should include training of multiple classifiers on various types of features (mainly OpCode and byte n-grams and Portable Executable Features), applying weighting algorithm on the classification results of the individual classifiers, as well as an active learning mechanism to maintain high detection accuracy. The training of classifiers should also consider the imbalance problem by generating classifiers that will perform accurately in a real-life situation where the percentage of malicious files among all files is estimated to be approximately 10%.  相似文献   
104.
Though competitive analysis is often a very good tool for the analysis of online algorithms, sometimes it does not give any insight and sometimes it gives counter-intuitive results. Much work has gone into exploring other performance measures, in particular targeted at what seems to be the core problem with competitive analysis: The comparison of the performance of an online algorithm is made with respect to a too powerful adversary. We consider a new approach to restricting the power of the adversary, by requiring that when judging a given online algorithm, the optimal offline algorithm must perform at least as well as the online algorithm, not just on the entire final request sequence, but also on any prefix of that sequence. This is limiting the adversary’s usual advantage of being able to exploit that it knows the sequence is continuing beyond the current request. Through a collection of online problems, including machine scheduling, bin packing, dual bin packing, and seat reservation, we investigate the significance of this particular offline advantage.  相似文献   
105.
Online Clustering with Variable Sized Clusters   总被引:1,自引:0,他引:1  
Online clustering problems are problems where the classification of points into sets (called clusters) is performed in an online fashion. Points arrive at arbitrary locations, one by one, to be assigned to clusters at the time of arrival. A point can be either assigned to an existing cluster or a new cluster can be opened for it. Here, we study a one-dimensional variant on a line. Each cluster is a closed interval, and there is no restriction on the length of a cluster. The cost of a cluster is the sum of a fixed set-up cost and its diameter (or length). The goal is to minimize the sum of costs of the clusters used by the algorithm. We study several variants, each having the two essential properties that a point which has been assigned to a given cluster must remain assigned to that cluster and no pair of clusters can be merged. In the strict variant, the diameter and the exact location of the cluster must be fixed when it is initialized. In the flexible variant, the algorithm can shift the cluster or expand it, as long as it contains all points assigned to it. In an intermediate model, the diameter is fixed in advance but the exact location can be modified. Here we give tight bounds on the competitive ratio of any online algorithm in each of these variants. In addition, for each model we also consider the semi-online case where points are presented ordered by their location.  相似文献   
106.
We consider an optical routing problem. SONET add-drop multiplexers (ADMs) are the dominant cost factor in SONET/WDM rings. The number of SONET ADMs required by a set of traffic streams is determined by the routing and wavelength assignment of the traffic streams. In this paper we consider the version where a traffic stream may be divided into several parts and assigned different wavelengths. A specific division may increase or decrease the number of ADMs needed for a given input. Following previous work, we consider two versions. In the arc version the route of each traffic stream is given as input, and we need to decide on divisions of streams, and then to assign wavelengths so as to minimize the total number of used SONET ADMs. In the chord version the route is not prespecified, but is assigned by the algorithm, and only after this step are the divisions done and wavelengths assigned. The previously best known approximation algorithm for the arc version has a performance guarantee of 5/4 = 1.25 whereas the previously best known approximation algorithm for the chord version has a performance guarantee of 3/2 = 1.5. We improve both these results. We present a 36/29 ≈ 1.24138-approximation algorithm for the arc version and a 7/5 = 1.4-approximation algorithm for the chord version.  相似文献   
107.
Bridge bidding is considered to be one of the most difficult problems for game-playing programs. It involves four agents rather than two, including a cooperative agent. In addition, the partial observability of the game makes it impossible to predict the outcome of each action. In this paper we present a new decision-making algorithm that is capable of overcoming these problems. The algorithm allows models to be used for both opponent agents and partners, while utilizing a novel model-based Monte Carlo sampling method to overcome the problem of hidden information. The paper also presents a learning framework that uses the above decision-making algorithm for co-training of partners. The agents refine their selection strategies during training and continuously exchange their refined strategies. The refinement is based on inductive learning applied to examples accumulated for classes of states with conflicting actions. The algorithm was empirically evaluated on a set of bridge deals. The pair of agents that co-trained significantly improved their bidding performance to a level surpassing that of the current state-of-the-art bidding algorithm. Editors: Michael Bowling, Johannes Fürnkranz, Thore Graepel, Ron Musick  相似文献   
108.
Steady-state free convection heat transfer in a right-angle triangular enclosure, whose vertical wall insulated and inclined and bottom walls are differentially heated, is performed in this study. The governing equations are obtained using Darcy model. In this study, the governing equations were solved by finite difference method and solution of algebraic equations was made via Successive Under Relaxation method. The effect of aspect ratios ranging from 0.25 to 1.0 and Rayleigh numbers 50 ≤ Ra ≤ 1000 is investigated as governing parameters on heat transfer and flow field. It is observed that heat transfer is increased with the decreasing of aspect ratio and multiple cells are formed at high Rayleigh numbers.  相似文献   
109.
A number of herbal plants sold in herbal markets of Lahore are under adulteration threat which can pose harmful health effects to end‐user. This adulteration problem of medicinal plants can be resolved by the implication of some valuable taxonomic parameter such as leaf epidermal anatomical characteristics. Hence, this research was aimed to provide viable anatomical markers in order to resolve this adulteration issue persisted in some common marketed medicinal plants of district Lahore, that is, Cinnamomum verum Presl., Cinnamomum tamala (Buuch.‐Ham.) T.Nees&Eberm., Gymnema sylvestre (Retz.) R.Br.ex Sm., Sphaeranthus indicus Linn., Artemisia maritima Linn., Achillea millifolim L., Adhatoda vasica Nees, Butea monosperma (Lam.) Taub, and Morus nigra L. Overall multiple anatomical variations (epidermal cell shape, their length and width, type of stomata, length and width of guard cells along with presence or absence of trichomes) had been reported in the study that could be worthwhile for the correct identification of medicinal plants. Irregular shapes of epidermal cells were observed in Cinnamomum verum and Achillea millifolium while pentagonal and polygonal cells were found in their adultaerants, that is, Canella winterana and Adhatoda vasica, respectively. Types of stomata were also strikingly varied among genuine plant and its adulterant, for example, anisocytic stomata were observed in Artemisia maritima while in its adulterant (Artemisia absinthium) anomocytic stomata were found. Similarly, paracytic stomata were observed in Butea monosperma, whereas its adulterant plant (Averrhoa carambola) characteristically possessed anisocytic stomata. Hence, anatomical characteristics were proved to be a valuable taxonomic tool in resolving the adulteration issue of medicinal plants.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号