首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   130篇
  免费   3篇
化学工业   23篇
机械仪表   8篇
建筑科学   8篇
矿业工程   1篇
能源动力   2篇
轻工业   4篇
石油天然气   1篇
无线电   5篇
一般工业技术   20篇
冶金工业   10篇
自动化技术   51篇
  2024年   2篇
  2022年   8篇
  2021年   2篇
  2020年   1篇
  2019年   9篇
  2018年   4篇
  2017年   3篇
  2016年   1篇
  2015年   4篇
  2014年   6篇
  2013年   4篇
  2012年   9篇
  2011年   9篇
  2010年   18篇
  2009年   9篇
  2008年   7篇
  2007年   6篇
  2006年   4篇
  2005年   2篇
  2004年   4篇
  2002年   2篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有133条查询结果,搜索用时 15 毫秒
71.
A numerical analysis has been performed to investigate the effects of fin location onto the bottom wall of a triangular enclosure filled with porous media whose height base ratio is 1. The temperature of the bottom wall is higher than that of the inclined wall while the vertical wall is insulated. Thus, the fin divides the heated bottom wall to two separate regions. Finite difference method was applied to solve governing equations which are written using Darcy method. Solutions of algebraic equations were made by Successive Under Relaxation (SUR) technique. The effective parameters on flow and temperature fields are: Rayleigh number, location center of fin, dimensionless fin height, and dimensionless fin width. The obtained results indicated that the fin can be used as a control element for heat transfer and fluid flow.  相似文献   
72.
In this study, we propose a new approach for detecting previously unencountered instances of known classes of malicious software based on their temporal behavior. In the proposed approach, time-stamped security data are continuously monitored within the target computer system or network and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of running processes) and events (e.g., installation of a software) are integrated with a security-domain, temporal-abstraction knowledge-base (i.e., a security ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher-level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions can be monitored to detect suspicious temporal patterns. These patterns are compatible with a set of predefined classes of malware as defined by a security expert employing a set of time and value constraints. The new approach was applied for detecting worm-related malware using two different ontologies. Evaluation results demonstrated the effectiveness of the new approach. The approach can be used for detecting other types of malware by updating the security ontology with new definitions of temporal patterns.  相似文献   
73.
We consider the problem of finding a minimum diameter spanning tree with maximum node degree $B$ in a complete undirected edge-weighted graph. We provide an $O(\sqrt{\log_Bn})$-approximation algorithm for the problem. Our algorithm is purely combinatorial, and relies on a combination of filtering and divide and conquer.  相似文献   
74.
The (Weighted) Metric Dimension of Graphs: Hard and Easy Cases   总被引:1,自引:0,他引:1  
  相似文献   
75.
Visible light photocatalysis is a promising route for harnessing of solar energy to perform useful chemical reactions and to convert light to chemical energy. Nanoscale photocatalytic systems used to date were based mostly on oxide semiconductors aided by metal deposition and were operational only under UV illumination. Additionally, the degree of control over particle size and shape was limited. We report visible light photocatalysis using highly controlled hybrid gold-tipped CdSe nanorods (nanodumbbells). Under visible light irradiation, charge separation takes place between the semiconductor and metal parts of the hybrid particles. The charge-separated state was then utilized for direct photoreduction of a model acceptor molecule, methylene blue, or alternatively, retained for later use to perform the reduction reaction in the dark.  相似文献   
76.
    
Integral membrane proteins mediate a myriad of cellular processes and are the target of many therapeutic drugs. Enhancement and extension of the functional scope of membrane proteins can be realized by membrane incorporation of engineered nanoparticles designed for specific diagnostic and therapeutic applications. In contrast to hydrophobic insertion of small amphiphilic molecules, delivery and membrane incorporation of particles on the nanometric scale poses a crucial barrier for technological development. In this perspective, the transformative potential of biomimetic membrane proteins (BMPs), current state of the art, and the barriers that need to be overcome in order to advance the field are discussed.  相似文献   
77.
78.
79.
80.
In this paper, it is proposed a new methodology based on invariant moments and multi-class support vector machine (MCSVM) for classification of human parasite eggs in microscopic images. The MCSVM is one of the most used classifiers but it has not used for classification of human parasite eggs to date. This method composes four stages. These are pre-processing stage, feature extraction stage, classification stage, and testing stage. In pre-processing stage, the digital image processing methods, which are noise reduction, contrast enhancement, thresholding, and morphological and logical processes. In feature extraction stage, the invariant moments of pre-processed parasite images are calculated. Finally, in classification stage, the multi-class support vector machine (MCSVM) classifier is used for classification of features extracted feature extraction stage. We used MATLAB software for estimating the success classification rate of proposed approach in this study. For this aim, proposed approach was tested by using test data. At end of test, 97.70% overall success rates were obtained.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号