全文获取类型
收费全文 | 72篇 |
免费 | 3篇 |
专业分类
综合类 | 3篇 |
化学工业 | 6篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 6篇 |
矿业工程 | 1篇 |
一般工业技术 | 7篇 |
冶金工业 | 8篇 |
原子能技术 | 1篇 |
自动化技术 | 40篇 |
出版年
2017年 | 1篇 |
2016年 | 3篇 |
2013年 | 4篇 |
2012年 | 1篇 |
2011年 | 4篇 |
2010年 | 5篇 |
2009年 | 2篇 |
2008年 | 9篇 |
2007年 | 3篇 |
2006年 | 8篇 |
2005年 | 9篇 |
2003年 | 2篇 |
2002年 | 2篇 |
2001年 | 3篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有75条查询结果,搜索用时 31 毫秒
11.
向珏良 《上海工程技术大学学报》1998,12(3):18-22
描述了在并行分布式图匹配算法中的子图分割算法。通过寻找一个相关矩阵进行图变换,从而使这种分割容易而且有效。同时,这种分割降低了相互关联的复杂性,提高了并行机并行运算的效率。 相似文献
12.
M. O'Callaghan 《Probabilistic Engineering Mechanics》2001,16(3):245
In the context of modelling residual roughness on nominally flat moderately polished metal surfaces, a method is proposed for solving problems related to sample function properties and/or special points such as maxima, minima, saddle points for random fields having non-Gaussian height distributions by recasting them in terms of the corresponding problems for the much more tractable Gaussian random fields by means of transformations. Special reference is made to the expansion of the transformations in series of Hermite polynomials. While the use of Hermite polynomials in connection with transformations of random fields and the useful results they yield with regard to covariance functions are well known, this paper derives the most general explicit formula for the expectation of any product of several Hermite polynomials in correlated Gaussian arguments thereby allowing their application to the higher moments of the transformed random field, in particular, to the third moment, which may be used to measure skewness. 相似文献
13.
Recent investigations have shown that the Pareto class of models provide a valid approximation for the statistical structure of the backscattering from the sea, for high resolution X-band maritime surveillance radar. This has stimulated the research and development of non-coherent radar detection processes for operation in such a clutter model environment. Using data from Defence Science and Technology Group's X-band radar the application of a Pareto Type I clutter model has been justified, which has facilitated the development of sliding window decision processes. However it has been found that when these detectors are applied to synthetic target detection in real data there are some issues resulting in substantial detection losses. In order to rectify this it is necessary to investigate the development of radar detection schemes under a Pareto Type II clutter model assumption. Using a transformation approach for radar detector design it will be shown that it is possible to construct detection processes that achieve the constant false alarm rate property with respect to the Pareto shape parameter, as in the Pareto Type I case, while requiring a priori knowledge of the Pareto scale parameter. Performance analysis includes application to real X-band clutter returns with synthetic target models. 相似文献
14.
Paul R Mort 《Powder Technology》2005,150(2):86-103
This review article describes scale-up of batch and continuous granulation processes where liquid binder is added to fine powder in order to form a granular product. The technical goal of scale-up is to maintain similarity of critical product attributes as the production scale and/or throughput of a manufacturing process is increased. This paper provides a framework for scaling-up that considers critical process transformations in relation to the desired product attributes. A similar approach can be taken in developing process control strategies. In any agglomeration process, transformations can be used to describe how raw materials (typically fine powders and liquid binders) are converted into a granular product. Often the critical product attributes are characterized on the scale of individual granules (e.g., size, shape, porosity, mechanical strength, etc.). On the other hand, industrial scale-up requires predictive relations for the sizing, design and operation of process equipment. Considering scale-up on the basis of transformations is one way to link the macro-scale equipment decisions with micro-scale product attributes. This approach can be applied to the scale-up of batch and/or continuous granulation processes as well as transitioning from small batch prototypes to continuous production circuits. 相似文献
15.
HLA/RTI仿真框架中的坐标转换及其实现机制 总被引:2,自引:0,他引:2
为了保证分布交互仿真的互操作、可重用和时空一致性,应在仿真运行支撑环境(RTI)中提供不同仿真应用的坐标转换功能。文章首先分析了坐标转换的必要性,然后介绍了常用坐标系及其相互转换关系,最后探讨了HLA/RTI仿真框架中的坐标转换实现机制,重点解决了如何转换、何时转换、由谁转换、如何标示所用坐标系、如何调用坐标转换模块等问题,并建议在当前的对象模型模板(OMT)增加有关对象所用坐标系的说明。 相似文献
16.
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of algorithms (benchmarking). Moreover, extensible middleware may exploit resource consumption information in order to detect a resource overuse of client components (detection of denial-of-service attacks) or to charge clients for the resource consumption of their deployed components. The Java Virtual Machine (JVM) is a predominant target platform for application and middleware developers, but it currently lacks standard mechanisms for resource management.In this paper we present a tool, the Java Resource Accounting Framework, Second Edition (J-RAF2), which enables precise CPU management on standard Java runtime environments. J-RAF2 employs a platform-independent CPU consumption metric, the number of executed JVM bytecode instructions. We explain the advantages of this approach to CPU management and present five case studies that show the benefits in different settings. 相似文献
17.
Dobiesaw Wrblewski 《Electronic Notes in Theoretical Computer Science》2006,154(2):113-120
We consider finite connected undirected graphs without self-loops as a model of computer networks. The nodes of the graph represent computers or processors, while the edges of the graph correspond to the links between them. We present a model of distributed computations, called semi-local. This extension of the classical local model breaks the local symmetry. As a result, many useful tasks become deterministically solvable in every network assuming a very small initial knowledge about its graph representation. One of these tasks is a creation of a token in an arbitrary anonymous ring – an example of election of a leader. A semi-local solution to this problem is presented. 相似文献
18.
模型转换是MDA框架中的重要环节之一,以往的模型转换方法可能会因为缺乏语义保证而出现错误。本文通过本体映射来研究MDA模型转换,提出实现MDA模型语义层转换的方法,并提高模型转换的效率和准确率。 相似文献
19.
Resource management is essential to build reliable middleware and to host potentially untrusted software components. Resource accounting allows to study and optimize program performance and to charge users for the resource consumption of their deployed components, while resource control can limit the resource consumption of components in order to prevent denial-of-service attacks. In the approach presented here, program transformations enable resource management in Java-based environments, even though the underlying runtime system may not expose information concerning the resource consumption of applications. We present a fully portable program transformation scheme to enhance standard Java runtime systems with mechanisms for CPU management. We implemented several optimizations in order to reduce the overhead of our CPU accounting scheme. Detailed performance measurements quantify this overhead and show the impact of various optimizations. 相似文献
20.
On transformation of authorization policies 总被引:3,自引:0,他引:3
In this paper, we propose a logic based approach to specify and to reason about transformation of authorization policies. The authorization policy is specified using a policy base which comprises a finite set of facts and access constraints. We define the structure of the policy transformation and employ a model-based semantics to perform the transformation under the principle of minimal change. Furthermore, we extend model-based semantics by introducing preference ordering to resolve possible conflicts during transformation of policies. We also discuss the implementation of the model-based transformation approach and analyse the complexity of the algorithms introduced. Our system is able to represent both implicit and incomplete authorization requirements and reason about nonmonotonic properties. 相似文献