首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61篇
  免费   0篇
电工技术   5篇
化学工业   1篇
机械仪表   1篇
能源动力   2篇
石油天然气   1篇
无线电   5篇
一般工业技术   8篇
冶金工业   22篇
自动化技术   16篇
  2016年   1篇
  2015年   2篇
  2013年   3篇
  2012年   2篇
  2011年   3篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2007年   2篇
  2005年   4篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   1篇
  1998年   8篇
  1997年   3篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
  1991年   2篇
  1990年   1篇
  1989年   4篇
  1988年   3篇
  1985年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1974年   1篇
排序方式: 共有61条查询结果,搜索用时 15 毫秒
31.
32.
An auction-based process is proposed that allows power market participants to acquire and reconfigure financial transmission rights. The process simultaneously accommodates flowgate and point-to-point options and obligations, along with energy production and consumption futures. A sequence of auctions is held during which participants can buy and sell rights, which are then settled in a day-ahead or real-time auction, at which time all rights are cashed out. By allowing flowgate and point-to-point obligations and options to be reconfigured and exchanged, the market can decide what combination of financial rights are most useful to power generators, consumers, and traders. Rights can be specified not only for capacity of individual flowgates, but also for more complex transmission constraints, such as nomograms. Under certain conditions, we prove that the auction is revenue adequate for the market operator, in that payments to rights holders cannot exceed congestion revenues. We present a linearized (DC) auction along with a numerical illustration.  相似文献   
33.
Electric utility companies employ a crew of workers who periodically visit and read the electric meters of each customer in their service area. Each reader is transported by auto from a central office to the first customer on his work list. At the end of his work shift time limit the reader is free to leave the area possibly returning home or to the central office by public bus. Taking a graph that corresponds to the city network of streets meter readers must traverse each street while moving from house to house. It is possible that dead heading may be required—back tracking over a street that has already been covered. A working tour is an open path whose reading time plus deadheading time does not exceed the work limit. The problem is to find the minimum number of working tours. Stating the problem in this manner gives us an optimization problem closely related to the M-Chinese postman problem—an edge oriented routing problem. After presenting some background on this type of problem a heuristic procedure is used to solve an example from the City of Beersheva. The solution provides a 40% reduction in the number of working tours. The paper ends with a discussion of the solution, and provides conditions under which the algorithm should have practical utility.  相似文献   
34.
A set DB of data elements can be represented in terms of its complement set, known as a negative database. That is, all of the elements not in DB are represented, and DB itself is not explicitly stored. This method of representing data has certain properties that are relevant for privacy enhancing applications. The paper reviews the negative database (NDB) representation scheme for storing a negative image compactly, and proposes using a collection of NDBs to represent a single DB, that is, one NDB is assigned for each record in DB. This method has the advantage of producing negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain DB. This result is obtained by adapting a technique for generating hard-to-solve 3-SAT formulas. Finally we suggest potential avenues of application.  相似文献   
35.
Data from two previously published studies were used to examine the correlations between scores on the violation, error and lapse sub-scales of the driver behaviour questionnaire, and observed driving speed. One dataset utilised data from an instrumented vehicle, which recorded driver speed on bends on a rural road. The other utilised data from a driving simulator study. Generally in both datasets the DBQ violation subscale was associated with objectively-measured speed, while the error and lapse sub-scales were not. These findings are consistent with the idea that the DBQ is a valid measure of observed behaviour in real driving (its original intended use) and also in simulated driving. The fact that associations were the same in real and simulated driving lends further support to the relative validity of driving simulation. The need for larger and more focused studies examining the role of different motivations in different driving situations is discussed.  相似文献   
36.
Design of Efficient Generation Markets   总被引:1,自引:0,他引:1  
The design of spot markets for generation services, such as energy, regulation,and operating reserves, and longer term markets for capacity, remain in evolution in many countries. Market design includes definition of the service, bid, or offer requirements, and rules for pricing and financial settlement. In the United States, most organized regional markets have converged on similar elements of spot market design. The design of capacity markets remains influx. Market power mitigation is currently a regulatory requirement in the United States, and experience with different methods shows that it must be carefully aligned with market design to ensure both efficient pricing and efficient investment. This paper surveys these topics and their relationships to each other and identifies researchable issues.  相似文献   
37.
A formal framework for positive and negative detection schemes.   总被引:5,自引:0,他引:5  
In anomaly detection, the normal behavior of a process is characterized by a model, and deviations from the model are called anomalies. In behavior-based approaches to anomaly detection, the model of normal behavior is constructed from an observed sample of normally occurring patterns. Models of normal behavior can represent either the set of allowed patterns (positive detection) or the set of anomalous patterns (negative detection). A formal framework is given for analyzing the tradeoffs between positive and negative detection schemes in terms of the number of detectors needed to maximize coverage. For realistically sized problems, the universe of possible patterns is too large to represent exactly (in either the positive or negative scheme). Partial matching rules generalize the set of allowable (or unallowable) patterns, and the choice of matching rule affects the tradeoff between positive and negative detection. A new match rule is introduced, called r-chunks, and the generalizations induced by different partial matching rules are characterized in terms of the crossover closure. Permutations of the representation can be used to achieve more precise discrimination between normal and anomalous patterns. Quantitative results are given for the recognition ability of contiguous-bits matching together with permutations.  相似文献   
38.
Dispatchable transmission in RTO markets   总被引:2,自引:0,他引:2  
We consider transmission owners that bid capacity, under appropriate Regional Transmission Organization (RTO) market rules, at a positive price into forward and spot (dispatch) auctions to derive congestion revenues. This can encompass daily, monthly, or multimonthly auctions, allowing for commitment of transmission to reflect market needs in different time periods, e.g., seasons. We provide two and three node examples and a general formulation of the auction model.  相似文献   
39.
We model computer transactions as generated by two stationary stochastic processes, the legitimate (normal) process N and the misuse process M. We define misuse (anomaly) detection to be the identification of transactions most likely to have been generated by M. We formally demonstrate that the accuracy of misuse detectors is bounded by a function of the difference of the densities of the processes N and M over the space of transactions. In practice, detection accuracy can be far below this bound, and generally improves with increasing sample size of historical (training) data. Careful selection of transaction attributes also can improve detection accuracy; we suggest several criteria for attribute selection, including adequate sampling rate and separation between models. We demonstrate that exactly optimizing even the simplest of these criteria is NP-hard, thus motivating a heuristic approach. We further differentiate between modeling (density estimation) and nonmodeling approaches  相似文献   
40.
The mouse myoblast C2C12 cell line transfected singly with cDNA for Pax-3, PAX3-FKHR, or insulin-like growth factor (IGF) II or cotransfected with IGF-II plus Pax-3 or with IGF-II plus PAX3-FKHR genes showed an altered morphology, a lack of differentiation, and higher proliferation rates in vitro. On s.c. injection into nude mice, tumors grew from transfected cell lines but not from cells transfected with the empty vector. Tumors derived from IGF-II/PAX3-FKHR- and IGF-II-transfected cells grew most rapidly. Cotransfection of IGF-II plus Pax-3 induced tumors comprised highly differentiated striated muscle cells; Pax-3, PAX3-FKHR, or IGF-II transfection produced tumors at varying stages of differentiation. Tumors derived from IGF-II plus PAX3-FKHR-cotransfected cells were composed of undifferentiated cells. This was the only tumor type to infiltrate the underlying muscle. The most angiogenesis and the least apoptosis were observed in the latter tumors. These results support the hypothesis that PAX3-FKHR interacts with IGF-II to play a critical role in the oncogenesis of rhabdomyosarcoma.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号