首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   215篇
  免费   20篇
  国内免费   2篇
电工技术   3篇
化学工业   69篇
金属工艺   18篇
机械仪表   4篇
建筑科学   3篇
能源动力   7篇
轻工业   10篇
石油天然气   7篇
无线电   28篇
一般工业技术   43篇
冶金工业   8篇
原子能技术   1篇
自动化技术   36篇
  2023年   8篇
  2022年   6篇
  2021年   16篇
  2020年   2篇
  2019年   6篇
  2018年   15篇
  2017年   13篇
  2016年   20篇
  2015年   4篇
  2014年   5篇
  2013年   13篇
  2012年   11篇
  2011年   13篇
  2010年   12篇
  2009年   13篇
  2008年   11篇
  2007年   3篇
  2006年   4篇
  2005年   2篇
  2004年   4篇
  2003年   1篇
  2002年   4篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   4篇
  1997年   2篇
  1996年   1篇
  1995年   3篇
  1993年   1篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   3篇
  1987年   3篇
  1986年   2篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1974年   2篇
  1973年   3篇
  1972年   3篇
  1967年   1篇
  1961年   1篇
排序方式: 共有237条查询结果,搜索用时 15 毫秒
31.
In this paper, a recovery model is developed for managing sudden supply delays that affect retailers’ economic order quantity model. For this, a mathematical model is developed that considers fuzzy demand and safety stock, and generates a recovery plan for a finite future period immediately after a sudden supply delay. An efficient heuristic solution is developed that generates the recovery plan after a sudden supply delay. An experiment with scenario-based analysis is conducted to test our heuristic and to analyse the results. To assess the quality and consistency of solutions, the performance of the proposed heuristic is compared with the performance of the generalised reduced gradient method, which is widely applied in constrained mathematical programming. A simulation model is also designed to bring the recovery model closer to real-world processes. Several numerical examples are presented and a sensitivity analysis is performed to demonstrate the effects of various parameters on the performance of the heuristic method. The results show that safety stock plays an important role in recovery from sudden supply delays, and there is a trade-off between backorder and lost sales costs in the recovery plan. With the help of the proposed model, supply chain decision-makers can make accurate and prompt decision regarding recovery plans in case of sudden supply delay.  相似文献   
32.
In the present work, the gamma ray shielding properties of zinc oxide soda lime silica, (ZnO)x(SLS)1?x glasses with 0 ≥ x ≥ 50 wt% have been investigated. By using WinXCom computer software, the mass attenuation coefficient (µ/ρ) and half value layer (HVL) for total photon interaction in the energy range of 1 keV–100 GeV were calculated. Furthermore and by Geometric Progression method exposure buildup factor values were calculated for incident photon energy 0.015–15 MeV up to penetration depths of 40 mfp (mean free path). The addition of zinc oxide (ZnO) into soda lime silica (SLS) glass resulted in an increase the mass attenuation coefficient and decreases both the half value layer and exposure buildup factor. The obtained results of the selected glass series have been compared, in terms of mass attenuation coefficient, half value layer and exposure buildup factor with some common shielding materials. The shielding effectiveness of the selected glasses is found comparable to that of common ones; which indicates that the SLS glasses with suitable ZnO content may be developed as gamma ray shielding materials.  相似文献   
33.
Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves a diverse set of technologies including networking, virtualization and transaction scheduling. Thus, it is vulnerable to a wide range of security threats. Some of the most important security issues threatening the cloud computing systems originate from virtualization technology, as it constitutes the main body and basis of these systems. The most important virtualization-based security threats include VM side channel, VM escape and rootkit attacks. The previous works on the subject of virtualization security rely on hardware approaches such as the use of firewalls, which are expensive, the use of schedulers to control the side channels along with noise injection, which impose high overhead, or the use of agents to collect information and send them back to a central intrusion detection system, which itself can become the target of attacker. In the method presented in this paper, a group of mobile agents act as the sensors of invalid actions in the cloud environment. They start a noncooperative game with the suspected attacker and then calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. The simulation results show that this method can detect the attacks with 86% accuracy. The use of mobile agents and their trainability feature has led to reduced system overhead and accelerated detection process.  相似文献   
34.
Architecture-level business services are identified based on business processes; and likewise, in service-oriented product lines, identifying the domain architecture-level business services and their variability is preferred to be based on business processes and their variability. Identification of business services for a product line satisfying a set of given design metrics (such as cohesion and coupling) is extremely difficult for a domain architect, since there are many product configurations for which the services must be proper at the same time. This means that the identified services must have proper values for n metrics in m different configurations at the same time. The problem becomes more serious when there are high degrees of variability and complexity embedded in the business processes that are the basis for service identification.We contribute to solve the multi-objective optimization problem of identifying business services for a product line by partitioning the graph of a business process variability model utilizing Non-dominated Sorting Genetic Algorithm-II. The service specification is achieved based on the results of the partitioning. The variability of the services is then determined in terms of mandatory and optional services as well as variability relationships, which are all represented in a Service Variability Model. The method was empirically evaluated through experimentation, and showed proper levels of reusability and variability. Furthermore, the resulting models were fully consistent.  相似文献   
35.
36.
Most parts of Iran have completely different climates in different seasons of year. In other words, in summer it is very warm and in winter it becomes very cold. Achieving modified bitumen that could function adequately in both high and low temperature has always been under attention of researchers. One of bitumen modifiers is styrene butadiene styrene polymer. Because bitumen modified by styrene butadiene styrene does not show expected field function in both high and low temperatures, largely due to phase separation of bitumen and polymer, in the present study it has been tried to analyze the low-temperature function of bitumen modified by combining nano-SiO2 and styrene butadiene styrene polymer. The study reveals that adding nano-SiO2 by 3% and 4% of bitumen weight to the double combination of bitumen and styrene butadiene styrene polymer has improved its function in low temperature. This study has innovation as it deals with the analysis of low temperature function of nano-SiO2 and SBS in modification of bitumen for the first time in the world.  相似文献   
37.
38.
Biomass as a renewable fuel compared to fossil fuels usually contains high moisture content and volatile release. Hydrogen production by large particle biomass gasification is a promising technology for utilizing high moisture content biomass particle in the high temperature fluidized bed reactor. In the present work, simulation of large particles biomass gasification investigated at high temperature by using the discrete phase model (DPM). Combustible gases with homogeneous gas phase reactions, drying process with a heterogeneous reaction, primary and secondary pyrolysis with independent parallel-reaction by using two-competing-rate model to control a high and low temperature were used. During the thermochemical process of biomass, gaseous products containing of H2, H2O, CH4, CO and CO2 was obtained. The effects of concentration, mole and mass fraction and hydrodynamics effects on gaseous production during gasification were studied. The results showed that hydrodynamic effect of hot bed is different from cold bed. Concentration and molar fraction of CO and H2 production by continually and stably state and small amount of CO2, H2O, and CH4 was obtained. The hydrodynamic of bed plays the significant role on the rate of gaseous products.  相似文献   
39.
The solution of an inverse, conduction-radiation problem in a two-dimensional rectangle is analyzed to determine the temperature-dependent emissivity at the boundary. The medium is gray, absorbing, emitting and isotropically scattering. The bounding surfaces are assumed to be opaque and diffuse. The inverse problem is solved by minimizing the performance function, which is expressed by the sum of square residuals between estimated and exact heat fluxes, using a combined method of genetic algorithm and conjugate gradient. The emissivity is assumed to be represented as a function of boundary temperature with unknown variables. Therefore, the inverse problem is treated by the estimation of these variables. Finally, four examples are presented to show the accuracy of the algorithm. The effect of the measurement errors on the accuracy of the inverse analysis is also investigated. Results show the algorithm can estimate the unknown emissivity when the measurement errors are neglected. Also it is found that increasing the measurement error decreases the accuracy of estimation of temperature-dependent emissivity.  相似文献   
40.
Abstract

The authors report that 1-octyl-3-methylimidazolium tetrafluoroborate, [OMIM][BF4], and 1-butyl-3-methylimidazolium hexafluorophosphate, [BMIM][PF6], ionic liquids were synthesized and tested for their capability to desulfurization from model of gasoline. The results show that the aromatic sulfur compounds with higher π-electron density were favorably adsorbed. The results also show that [BF4]?-based ionic liquid displays higher extraction efficiencies than [PF6]?-based ionic liquid. Thus, it was shown that the extractive ability of the imidazolium ionic liquids was dominated by the structure of cation and anion. It is also found that the sizes of ionic liquids are important factors affecting the absorption capacity for aromatic sulfur compounds.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号