首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   283篇
  免费   39篇
  国内免费   2篇
电工技术   2篇
化学工业   77篇
金属工艺   15篇
机械仪表   5篇
建筑科学   11篇
能源动力   18篇
轻工业   44篇
水利工程   6篇
石油天然气   2篇
无线电   25篇
一般工业技术   54篇
冶金工业   12篇
原子能技术   2篇
自动化技术   51篇
  2023年   5篇
  2022年   10篇
  2021年   28篇
  2020年   20篇
  2019年   24篇
  2018年   41篇
  2017年   28篇
  2016年   23篇
  2015年   20篇
  2014年   29篇
  2013年   30篇
  2012年   10篇
  2011年   19篇
  2010年   16篇
  2009年   10篇
  2008年   4篇
  2007年   2篇
  2006年   2篇
  2005年   1篇
  1998年   1篇
  1997年   1篇
排序方式: 共有324条查询结果,搜索用时 31 毫秒
1.
2.
This study deals with the neuro-fuzzy (NF) modelling of a real industrial winding process in which the acquired NF model can be exploited to improve control performance and achieve a robust fault-tolerant system. A new simulator model is proposed for a winding process using non-linear identification based on a recurrent local linear neuro-fuzzy (RLLNF) network trained by local linear model tree (LOLIMOT), which is an incremental tree-based learning algorithm. The proposed NF models are compared with other known intelligent identifiers, namely multilayer perceptron (MLP) and radial basis function (RBF). Comparison of our proposed non-linear models and associated models obtained through the least square error (LSE) technique (the optimal modelling method for linear systems) confirms that the winding process is a non-linear system. Experimental results show the effectiveness of our proposed NF modelling approach.  相似文献   
3.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
4.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method.  相似文献   
5.
Iranian Polymer Journal - Effects of graphene oxide (GO) on various properties of rubber hybrid nanocomposites based on PVMQ/XNBR-g-GMA/XNBR (phenyl-vinyl-methyl-polysiloxane/carboxylated nitrile...  相似文献   
6.
Gelatin (Gel)-based pH- and thermal-responsive magnetic hydrogels (MH-1 and MH-2) were designed and developed as novel drug delivery systems (DDSs) for cancer chemo/hyperthermia therapy. For this goal, Gel was functionalized with methacrylic anhydride (GelMA), and then copolymerized with (2-dimethylaminoethyl) methacrylate (DMAEMA) monomer in the presence of methacrylate-end capped magnetic nanoparticles (MNPs) as well as triethylene glycol dimethacrylate (TEGDMA; as crosslinker). Afterward, a thiol-end capped poly(N-isopropylacrylamide) (PNIPAAm-SH) was synthesized through an atom transfer radical polymerization technique, and then attached onto the hydrogel through “thiol-ene” click grafting. The preliminary performances of developed MHs for chemo/hyperthermia therapy of human breast cancer was investigated through the loading of doxorubicin hydrochloride (Dox) as an anticancer agent followed by cytotoxicity measurement of drug-loaded DDSs using MTT assay by both chemo- and chemo/hyperthermia-therapies. Owing to porous morphologies of the fabricated magnetic hydrogels according to scanning electron microscopy images and strong physicochemical interactions (e.g., hydrogen bonding) the drug loading capacities of the MH-1 and MH-2 were obtained as 72 ± 1.4 and 77 ± 1.8, respectively. The DDSs exhibited acceptable pH- and thermal-triggered drug release behaviors. The MTT assay results revealed that the combination of hyperthermia therapy and chemotherapy has synergic effect on the anticancer activities of the developed DDSs.  相似文献   
7.
International Journal of Wireless Information Networks - With exponential growth in the number of wireless devices and limited available spectrum, the problem of spectrum sharing remains in...  相似文献   
8.

Software design patterns are well-known solutions for solving commonly occurring problems in software design. Detecting design patterns used in the code can help to understand the structure and behavior of the software, evaluate the quality of the software, and trace important design decisions. To develop and maintain a software system, we need sufficient knowledge of design decisions and software implementation processes. However, the acquisition of knowledge related to design patterns used in complex software systems is a challenging, time-consuming, and costly task. Therefore, using a suitable method to detect the design patterns used in the code reduces software development and maintenance costs. In this paper, we proposed a new method based on conceptual signatures to improve the accuracy of design pattern detection. So we used the conceptual signatures based on the purpose of patterns to detect the patterns’ instances that conform to the standard structure of patterns, and cover more instances of patterns’ variants and implementation versions of the patterns and improve the accuracy of pattern detection. The proposed method is a specific process in two main phases. In the first phase, the conceptual signature and detection formula for each pattern is determined manually. Then in the second phase, each pattern in the code is detected in a semi-automatic process using the conceptual signature and pattern detection formula. To implement the proposed method, we focused on GoF design patterns and their variants. We evaluated the accuracy of our proposed method on five open-source projects, namely, Junit v3.7, JHotDraw v5.1, QuickUML 2001, JRefactory v2.6.24, and MapperXML v1.9.7. Also, we performed our experiments on a set of source codes containing the instances of GoF design patterns’ variants for a comprehensive and fair evaluation. The evaluation results indicate that the proposed method has improved the accuracy of design pattern detection in the code.

  相似文献   
9.
Liquid–liquid phase diagrams of surfactant-based aqueous two-phase systems (ATPS) composed of TritonX-100, as a non-ionic surfactant, and two different salts have been studied at 298.15 K. The salts used were an inorganic salt, magnesium sulfate (MgSO4), and an organic salt, sodium citrate (Na3C6H5O7). The results show that the salt MgSO4 is more capable of inducing ATPS formation than the salt Na3C6H5O7. The experimental liquid–liquid equilibrium data were correlated using a modified virial model. Good agreement was obtained with the experimental data.  相似文献   
10.
Technical trading rules can be generated from historical data for decision making in stock markets. Genetic programming (GP) as an artificial intelligence technique is a valuable method to automatically generate such technical trading rules. In this paper, GP has been applied for generating risk-adjusted trading rules on individual stocks. Among many risk measures in the literature, conditional Sharpe ratio has been selected for this study because it uses conditional value at risk (CVaR) as an optimal coherent risk measure. In our proposed GP model, binary trading rules have been also extended to more realistic rules which are called trinary rules using three signals of buy, sell and no trade. Additionally we have included transaction costs, dividend and splits in our GP model for calculating more accurate returns in the generated rules. Our proposed model has been applied for 10 Iranian companies listed in Tehran Stock Exchange (TSE). The numerical results showed that our extended GP model could generate profitable trading rules in comparison with buy and hold strategy especially in the case of risk adjusted basis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号