首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   342篇
  免费   17篇
电工技术   3篇
化学工业   68篇
金属工艺   3篇
机械仪表   3篇
建筑科学   33篇
能源动力   4篇
轻工业   23篇
水利工程   1篇
石油天然气   5篇
无线电   47篇
一般工业技术   51篇
冶金工业   34篇
原子能技术   3篇
自动化技术   81篇
  2024年   3篇
  2023年   7篇
  2022年   17篇
  2021年   22篇
  2020年   16篇
  2019年   15篇
  2018年   23篇
  2017年   15篇
  2016年   23篇
  2015年   7篇
  2014年   12篇
  2013年   19篇
  2012年   22篇
  2011年   16篇
  2010年   22篇
  2009年   23篇
  2008年   22篇
  2007年   9篇
  2006年   11篇
  2005年   8篇
  2004年   5篇
  2003年   7篇
  2002年   5篇
  2001年   3篇
  2000年   1篇
  1999年   4篇
  1998年   4篇
  1997年   2篇
  1996年   5篇
  1995年   4篇
  1994年   1篇
  1993年   2篇
  1991年   1篇
  1990年   1篇
  1980年   1篇
  1977年   1篇
排序方式: 共有359条查询结果,搜索用时 13 毫秒
31.
We introduce a data structure which provides efficient heap operations with respect to the number of element comparisons performed. Let n denote the size of the heap being manipulated. Our data structure guarantees the worst-case cost of O(1) for finding the minimum, inserting an element, extracting an (unspecified) element, and replacing an element with a smaller element; and the worst-case cost of O(lg n) with at most lg n + 3 lg lg n + O(1) element comparisons for deleting an element. We thereby improve the comparison complexity of heap operations known for run-relaxed heaps and other worst-case efficient heaps. Furthermore, our data structure supports melding of two heaps of size m and n at the worst-case cost of O(min {lg m, lg n}). A preliminary version of this paper [8] was presented at the 17th International Symposium on Algorithms and Computation held in Kolkata in December 2006. Partially supported by the Danish Natural Science Research Council under contracts 21-02-0501 (project Practical data structures and algorithms) and 272-05-0272 (project Generic programming—algorithms and tools).  相似文献   
32.
In this investigation, the headspace volatiles of treacle samples from three different producers were subjected to GC-MS and HPLC analysis in order to assess the variation in their aroma volatile composition and their content of 5-hydroxymethylfurfural (HMF). The volatile constituents were rich in aliphatic short chain acids, specially acetic acid, alcohols, aldehydes, ketones, and furan derivatives. The HMF content varied according to the producer from 66 mg/kg to 179 mg/kg. The present investigation is considered to be the first, which determine the volatile aroma profile and HMF content for treacle.  相似文献   
33.
提出了钢筋混凝土超高层建筑的地震脆性评估分析的框架模型和应用案例。对于这类结构,由于没有任何随机的脆性关系存在,本文工作填补了区域地震影响评估的空白。所提出框架模型的关键是发展了典型的复杂超高层建筑系统的简单集中参数模型方法。在ZEUS-NL环境中所构建的这个模型能够有效进行高层结构的动力响应序列分析,  相似文献   
34.
In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues: a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery‐based node, which harvests energy packets from the environment. In addition to its data queues, the secondary user has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete‐time queue with Markov arrival and service processes. Because of the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
35.
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.’s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these flaws. In this paper, we show that the modified schemes proposed by Chen are not secure. In particular, we present an attack that allows a dishonest referee, in case of a dispute, to decrypt all the future and past authenticated ciphertext between the contended parties. We also present a simple fix to prevent this attack.  相似文献   
36.
The paper reports the results of an extensive numerical simulation to estimate the elastic buckling pressure and the corresponding thrust and bending moment induced in loosely fitted thin liners. The study is conducted numerically using a two-dimensional (2D) non-linear finite element model that accounts for the effects of large deformations on the stability of loosely fitted liners. The finite element results together with a non-linear multi-variant regression analysis are used to develop simplified non-dimensional formulae that provide the critical pressure, thrust and bending moments, at buckling, based on the liner’s geometry and material properties.In addition, several other analytical and numerical solutions for the same problem are revisited and critically reviewed. For comparison purposes, two of such methods are extended to allow for the calculation of the thrust and bending moment developed at the most heavily stressed point in the loosely fitted liners at the onset of buckling. In general, the comparison reveals the appropriateness of the proposed regression models in predicting the critical pressure and the associated thrust and bending moment induced in imperfect loosely fitted liners. Developed formulae provide designers with a simple and reliable means for ensuring stability and safety of such special type of structures.  相似文献   
37.
Delay and loss of productivity are the two main types of damage experienced by the contractor when the owner issues a change order. Courts have recognized critical path method schedule analysis as the preferred method of identifying and quantifying critical delays. As for the inefficiency damages, there is no direct way of measuring inefficiency due to its qualitative nature and the difficulty of linking the cause of the productivity loss to the damage. Most of the scholarly work published in this area was based on data supplied by the contractors; and that explains why there are discrepancies between what the contractor asks for and what the owner believes the contractor is entitled to. This study addresses the need for a statistical model to quantify the productivity loss from verifiable site data such as owner’s daily reports, change orders, drawings, and specifications, rather than rely solely on contractor surveys. A model is developed and validated to quantify the productivity loss in pipe work in roadway projects due to the change orders. The productivity loss study analyzed two sets of data that include: (1) variables that predict which of the two parties, the owner and the contractor, contributed to the productivity loss; and (2) variables that predict, from the legal viewpoint, productivity losses which only the owner is responsible for. The study showed the difference between what the contractor asked for and what he/she is actually entitled to. This model can be used by both the owner and the contractor to quantify the productivity loss due to change orders, and to offer an objective approach to reconcile their differences. This study concludes with an example to demonstrate the use of the model.  相似文献   
38.
In recent years, smart healthcare, artificial intelligence (AI)-aided diagnostics, and automated surgical robots are just a few of the innovations that have emerged and gained popularity with the advent of Healthcare 4.0. Such technologies are powered by machine learning (ML) and deep learning (DL), which are preferable for disease diagnosis, identifying patterns, prescribing treatments, and forecasting diseases like stroke prediction, cancer prediction and so forth. Nevertheless, much data is needed for AI, ML, and DL-based systems to train effectively and provide the desired outcomes. Further, it raises concerns about data privacy, security, communication overhead, regulatory compliance and so forth. Federated learning (FL) is a technology that protects data security and privacy by limiting data sharing and utilizing model information of distributed systems to enhance performance. However, existing approaches are traditionally verified on pre-established datasets that fail to capture real-life applicability. Therefore, this study proposes an AI-enabled stroke prediction architecture consisting of FL based on the artificial neural network (ANN) model using data from actual stroke cases. This architecture can be implemented on healthcare-based wearable devices (WD) for real-time use as it is effective, precise, and computationally affordable. In order to continuously enhance the performance of the global model, the proposed FL-based architecture aggregates the optimizer weights of many clients using a fifth-generation (5G) communication channel. Then, the performance of the proposed FL-based architecture is studied based on multiple parameters such as accuracy, precision, recall, bit error rate, and spectral noise. It outperforms the traditional approaches regarding accuracy, which is 5% to 10% higher.  相似文献   
39.
40.
The concept of pacing is described in an articulate manner which will enable readers to discuss the views put forwards. The nine major activities are divided into two types and are discussed in detail together with the methods used by the prime contractors to allocate time windows and the underlying logic employed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号