首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   410篇
  免费   36篇
  国内免费   2篇
电工技术   5篇
综合类   3篇
化学工业   86篇
金属工艺   17篇
机械仪表   9篇
建筑科学   19篇
矿业工程   1篇
能源动力   25篇
轻工业   45篇
水利工程   12篇
石油天然气   8篇
无线电   55篇
一般工业技术   73篇
冶金工业   18篇
原子能技术   3篇
自动化技术   69篇
  2024年   2篇
  2023年   7篇
  2022年   13篇
  2021年   34篇
  2020年   22篇
  2019年   31篇
  2018年   61篇
  2017年   42篇
  2016年   35篇
  2015年   22篇
  2014年   33篇
  2013年   42篇
  2012年   20篇
  2011年   31篇
  2010年   22篇
  2009年   15篇
  2008年   4篇
  2007年   3篇
  2006年   4篇
  2005年   2篇
  2004年   1篇
  1997年   1篇
  1994年   1篇
排序方式: 共有448条查询结果,搜索用时 15 毫秒
51.

Software design patterns are well-known solutions for solving commonly occurring problems in software design. Detecting design patterns used in the code can help to understand the structure and behavior of the software, evaluate the quality of the software, and trace important design decisions. To develop and maintain a software system, we need sufficient knowledge of design decisions and software implementation processes. However, the acquisition of knowledge related to design patterns used in complex software systems is a challenging, time-consuming, and costly task. Therefore, using a suitable method to detect the design patterns used in the code reduces software development and maintenance costs. In this paper, we proposed a new method based on conceptual signatures to improve the accuracy of design pattern detection. So we used the conceptual signatures based on the purpose of patterns to detect the patterns’ instances that conform to the standard structure of patterns, and cover more instances of patterns’ variants and implementation versions of the patterns and improve the accuracy of pattern detection. The proposed method is a specific process in two main phases. In the first phase, the conceptual signature and detection formula for each pattern is determined manually. Then in the second phase, each pattern in the code is detected in a semi-automatic process using the conceptual signature and pattern detection formula. To implement the proposed method, we focused on GoF design patterns and their variants. We evaluated the accuracy of our proposed method on five open-source projects, namely, Junit v3.7, JHotDraw v5.1, QuickUML 2001, JRefactory v2.6.24, and MapperXML v1.9.7. Also, we performed our experiments on a set of source codes containing the instances of GoF design patterns’ variants for a comprehensive and fair evaluation. The evaluation results indicate that the proposed method has improved the accuracy of design pattern detection in the code.

  相似文献   
52.
This study deals with the neuro-fuzzy (NF) modelling of a real industrial winding process in which the acquired NF model can be exploited to improve control performance and achieve a robust fault-tolerant system. A new simulator model is proposed for a winding process using non-linear identification based on a recurrent local linear neuro-fuzzy (RLLNF) network trained by local linear model tree (LOLIMOT), which is an incremental tree-based learning algorithm. The proposed NF models are compared with other known intelligent identifiers, namely multilayer perceptron (MLP) and radial basis function (RBF). Comparison of our proposed non-linear models and associated models obtained through the least square error (LSE) technique (the optimal modelling method for linear systems) confirms that the winding process is a non-linear system. Experimental results show the effectiveness of our proposed NF modelling approach.  相似文献   
53.
The open quantum systems consisting of coupled and uncoupled asymmetric oscillators are considered with an initial quantum-dot trapped-ion coherent state. The quantum correlations between spatial modes of this trapped ion are examined to find their dependence on the temperature, asymmetric parameter, dissipation coefficient and the magnetic field. It is observed that the discord of the initial state is an increasing function of the asymmetric parameter and the magnetic field. Moreover, in the case of two uncoupled modes, entanglement and discord are decreasing functions of temperature and the dissipation coefficient. However, as the temperature and dissipation coefficient increase, the discord fades out faster. In the case of two coupled modes, as the temperature and dissipation coefficient increase, the sudden death of the entanglement and fade out of the discord happen sooner; moreover, as the magnetic field increases, the entanglement sudden death and the discord fade out time occur sooner. Also, with the increase in the asymmetric parameter, the entanglement sudden death is postponed. In addition, in the asymmetric system, appreciable discord can be created in the temperature range 0–10 K, while appreciable entanglement can be created in the temperature range 0–5 mK. Finally, it is observed that non-monotonic evolution of quantum correlations is due to coupling of modes.  相似文献   
54.

We address the problem of resource allocation for bag-of-tasks (BoT) workflows in a federation of clouds and formulate it as an integer linear programming problem. The proposed model minimizes financial cost including fees for running VMs and fees for data transfer, and fulfills deadline and resource constraints in the clouds. We also formulate the problem of BoT scheduling in the hybrid clouds, and compare the financial cost in the federation of clouds with that in the hybrid clouds. Moreover, this paper discusses sensitivity analysis to investigate stability in the related allocation problem. Numerical results show that the resource allocation in the federation is considerably preferred to that in the hybrid clouds in terms of stability and cost-saving. In this paper, we also propose an approach named GRASP-FC for obtaining an approximate optimal solution of BoT scheduling in the federation. GRASP-FC is an extension of greedy randomized adaptive search procedure (GRASP), and it can be of great interest from the computational points of view.

  相似文献   
55.
Technical trading rules can be generated from historical data for decision making in stock markets. Genetic programming (GP) as an artificial intelligence technique is a valuable method to automatically generate such technical trading rules. In this paper, GP has been applied for generating risk-adjusted trading rules on individual stocks. Among many risk measures in the literature, conditional Sharpe ratio has been selected for this study because it uses conditional value at risk (CVaR) as an optimal coherent risk measure. In our proposed GP model, binary trading rules have been also extended to more realistic rules which are called trinary rules using three signals of buy, sell and no trade. Additionally we have included transaction costs, dividend and splits in our GP model for calculating more accurate returns in the generated rules. Our proposed model has been applied for 10 Iranian companies listed in Tehran Stock Exchange (TSE). The numerical results showed that our extended GP model could generate profitable trading rules in comparison with buy and hold strategy especially in the case of risk adjusted basis.  相似文献   
56.
In this paper, a fuzzy expert system based on adaptive neuro‐fuzzy inference system (ANFIS) is introduced to assess the mortality after coronary bypass surgery. In preprocessing phase, the attributes were reduced using a univariant analysis in order to make the classifier system more effective. Prognostic factors with a p‐value of less than 0.05 in chi‐square or t‐student analysis were given to inputs ANFIS classifier. The correct diagnosis performance of the proposed fuzzy system was calculated in 824 samples. To demonstrate the usefulness of the proposed system, the study compared the performance of fuzzy system based on ANFIS method through the binary logistic regression with the same attributes. The experimental results showed that the fuzzy model (accuracy: 96.4%; sensitivity: 66.6%; specificity: 97.2%; and area under receiver operating characteristic curve: 0.82) consistently outperformed the logistic regression (accuracy: 89.4%; sensitivity: 47.6%; specificity: 89.4%; and area under receiver operating characteristic curve: 0.62). The obtained classification accuracy of fuzzy expert system was very promising with regard to the traditional statistical methods to predict mortality after coronary bypass surgery such as binary logistic regression model.  相似文献   
57.
58.
Rapid and accurate estimation of Ground Cover (GC) at regional and global scales for agricultural management application is only possible by using remote sensing (RS). In this study, two Vegetation Indices (VIs) including the Perpendicular Vegetation Index (PVI) and Normalized Difference Vegetation Index (NDVI) were used for estimating GC. Since the parameters of the bare soil line have an important role in calculating GC based on PVI, this line was extracted based on the red-NIRmin (minimum near infrared) method with different intervals (0.0001, 0.0005, and 0.0010). In addition to traditional statistics such as Root Mean Square Error (RMSE), the sensitivity analysis (S) was also used to sharpen the accuracy of the models' estimations. The results indicated that the PVI-based method, in contrast to the NDVI-based approach, had a better performance in estimating GC of wheat. The highest correlation between the observed GC and the estimated GC based on PVI method was achieved in interval length of 0.0005 (R2 = 0.91) with RMSE equal to 8.82. This regression line (GCEST = -3.47 + 0.96 GCOBS) was not significantly different from the 1:1 line. As expected, the best estimation was achieved when the sensitivity of estimated GC based on PVI (length of the interval: 0.0005) was almost constant and low compared to the other models.  相似文献   
59.
We construct two optimal Newton–Secant like iterative methods for solving nonlinear equations. The proposed classes have convergence order four and eight and cost only three and four function evaluations per iteration, respectively. These methods support the Kung and Traub conjecture and possess a high computational efficiency. The new methods are illustrated by numerical experiments and a comparison with some existing optimal methods. We conclude with an investigation of the basins of attraction of the solutions in the complex plane.  相似文献   
60.
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is copy-move digital image forgery, which involves copying one part of the image onto another area of the same image. Various methods have been proposed to detect copy-move forgery that uses different types of transformations. The goal of this paper is to determine which copy-move forgery detection methods are best for different image attributes such as JPEG compression, scaling, rotation. The advantages and drawbacks of each method are also highlighted. Thus, the current state-of-the-art image forgery detection techniques are discussed along with their advantages and drawbacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号