首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   296篇
  免费   11篇
  国内免费   4篇
电工技术   1篇
综合类   1篇
化学工业   55篇
金属工艺   6篇
机械仪表   8篇
建筑科学   6篇
矿业工程   3篇
能源动力   12篇
轻工业   8篇
石油天然气   1篇
无线电   61篇
一般工业技术   57篇
冶金工业   8篇
原子能技术   1篇
自动化技术   83篇
  2024年   1篇
  2023年   5篇
  2022年   6篇
  2021年   6篇
  2020年   2篇
  2019年   5篇
  2018年   10篇
  2017年   11篇
  2016年   16篇
  2015年   5篇
  2014年   14篇
  2013年   19篇
  2012年   24篇
  2011年   12篇
  2010年   14篇
  2009年   11篇
  2008年   18篇
  2007年   13篇
  2006年   16篇
  2005年   9篇
  2004年   7篇
  2003年   10篇
  2002年   10篇
  2001年   2篇
  2000年   5篇
  1999年   6篇
  1998年   5篇
  1997年   4篇
  1996年   2篇
  1995年   8篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1990年   4篇
  1989年   1篇
  1987年   2篇
  1986年   1篇
  1985年   5篇
  1984年   6篇
  1983年   3篇
  1982年   1篇
  1979年   2篇
  1975年   1篇
排序方式: 共有311条查询结果,搜索用时 31 毫秒
1.
With a view to evaluate the effects of hydraulic retention time and volatile solids loading rate on methane production using water hyacinth, experiments were conducted in a 160 dm3 capacity, well-mixed continuous digestion unit at ambient temperature. The optimal design of biogas plant using water hyacinth was elucidated, to provide a unit giving a maximum methane yield of 0.16 nm3 kg?1 volatile solids added, which was 60% greater than the conventional plant using cowdung. The calculations of optimal design factors were based on reactor size, hydraulic retention time and volatile solids loading rate; considerations were made of capital cost, running costs and operational revenue.  相似文献   
2.
In the wake of growing importance for quality and the need to reduce inspection costs simultaneously, the need for a scientific method of selecting an optimum inspection strategy for coordinate measuring machine (CMM) based inspection has become very important. The inspection error resulting from CMM inspection is greatly affected by the profile irregularities and the sampling strategy, which includes sample size, sampling methods, and algorithms used for form evaluation. This paper describes a system that can recommend an optimal inspection plan based on the needs of the user. A design of experiments (DOE) based approach is used to relate the inspection error with sampling strategies. Surface irregularities are included in the form of lobes formed on the profile. A new two-way model is proposed that works in both directions between the sampling strategy and the performance metrics. The results indicate that the number of lobes and the sampling method used have little impact on the inspection error, while the sample size and form evaluation algorithms have a significant influence. An inspection plan advisor is presented, which provides an inspection plan based on the estimated shape and acceptable measurement error.  相似文献   
3.
This paper describes a 32-KB two-read, one-write ported L0 cache for 4.5-GHz operation in 1.2-V 130-nm dual-V/sub TH/ CMOS technology. The local bitline uses a leakage-tolerant self reverse-bias (SRB) scheme with nMOS source-follower pullup access transistors, while preserving robust full-swing operation. Gate-source underdrive of -220 mV on the bitline read-select transistors is established without external bias voltages or gate-oxide overstress. Device-level measurements in the 130-nm technology show 72/spl times/ bitline active leakage reduction, enabling low-V/sub TH/ usage, 40% bitline keeper downsizing, and 16 bitcells/bitline. 11% faster read delay and 2/spl times/ higher dc noise robustness are achieved compared with high-performance dual-V/sub TH/ bitline scheme. Sustained performance and robustness benefits of the SRB technique against conventional dynamic bitline with scaling to 100- and 70-nm technology is also presented.  相似文献   
4.
An actor-critic algorithm for constrained Markov decision processes   总被引:2,自引:0,他引:2  
An actor-critic type reinforcement learning algorithm is proposed and analyzed for constrained controlled Markov decision processes. The analysis uses multiscale stochastic approximation theory and the envelope theorem' of mathematical economics.  相似文献   
5.
We develop a stochastic approximation version of the classical Kaczmarz algorithm that is incremental in nature and takes as input noisy real time data. Our analysis shows that with probability one it mimics the behavior of the original scheme: starting from the same initial point, our algorithm and the corresponding deterministic Kaczmarz algorithm converge to precisely the same point. The motivation for this work comes from network tomography where network parameters are to be estimated based upon end-to-end measurements. Numerical examples via Matlab based simulations demonstrate the efficacy of the algorithm.  相似文献   
6.
The mechanical, electrical, and thermal expansion properties of carbon nanotube(CNT)-based silver and silver–palladium(10:1, w/w) alloy nanocomposites are reported. To tailor the properties of silver, CNTs were incorporated into a silver matrix by a modified molecular level-mixing process. CNTs interact weakly with silver because of their non-reactive nature and lack of mutual solubility. Therefore, palladium was utilized as an alloying element to improve interfacial adhesion. Comparative microstructural characterizations and property evaluations of the nanocomposites were performed. The structural characterizations revealed that decorated type-CNTs were dispersed, embedded, and anchored into the silver matrix. The experimental results indicated that the modification of the silver and silver–palladium nanocomposite with CNT resulted in increases in the hardness and Young's modulus along with concomitant decreases in the electrical conductivity and the coefficient of thermal expansion(CTE). The hardness and Young's modulus of the nanocomposites were increased by 30%?40% whereas the CTE was decreased to 50%-60% of the CTE of silver. The significantly improved CTE and the mechanical properties of the CNT-reinforced silver and silver–palladium nanocomposites are correlated with the intriguing properties of CNTs and with good interfacial adhesion between the CNTs and silver as a result of the fabrication process and the contact action of palladium as an alloying element.  相似文献   
7.
Fine-grained image search is one of the most challenging tasks in computer vision that aims to retrieve similar images at the fine-grained level for a given query image. The key objective is to learn discriminative fine-grained features by training deep models such that similar images are clustered, and dissimilar images are separated in the low embedding space. Previous works primarily focused on defining local structure loss functions like triplet loss, pairwise loss, etc. However, training via these approaches takes a long training time, and they have poor accuracy. Additionally, representations learned through it tend to tighten up in the embedded space and lose generalizability to unseen classes. This paper proposes a noise-assisted representation learning method for fine-grained image retrieval to mitigate these issues. In the proposed work, class manifold learning is performed in which positive pairs are created with noise insertion operation instead of tightening class clusters. And other instances are treated as negatives within the same cluster. Then a loss function is defined to penalize when the distance between instances of the same class becomes too small relative to the noise pair in that class in embedded space. The proposed approach is validated on CARS-196 and CUB-200 datasets and achieved better retrieval results (85.38% recall@1 for CARS-196% and 70.13% recall@1 for CUB-200) compared to other existing methods.  相似文献   
8.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
9.
Hemant Gehlot 《工程优选》2016,48(9):1550-1570
The aggregate batch mixing problem determines the proportion (or relative masses) in which aggregate batches with different gradations are to be blended so as to achieve a target mix with a given gradation. As shown in previous studies, the gradation of a batch is not homogeneous and should be considered stochastic. Also, when batches are blended in the field there are random variations in the masses or proportions of individual batches in the mix. Assuming batch gradation and blend masses as stochastic implies that the notion of a mix (blend) satisfying the gradation of a target mix becomes stochastic. In such a framework, every mix has a reliability with which it satisfies the definition of the target mix. In addition, a mix is also required to satisfy various restrictions. This article presents an optimization formulation to determine the most reliable mix while satisfying restrictions on available quantity, budget, etc.  相似文献   
10.
In recent years, evolutionary algorithms (EAs) have been extensively developed and utilized to solve multi-objective optimization problems. However, some previous studies have shown that for certain problems, an approach which allows for non-greedy or uphill moves (unlike EAs), can be more beneficial. One such approach is simulated annealing (SA). SA is a proven heuristic for solving numerical optimization problems. But owing to its point-to-point nature of search, limited efforts has been made to explore its potential for solving multi-objective problems. The focus of the presented work is to develop a simulated annealing algorithm for constrained multi-objective problems. The performance of the proposed algorithm is reported on a number of difficult constrained benchmark problems. A comparison with other established multi-objective optimization algorithms, such as infeasibility driven evolutionary algorithm (IDEA), Non-dominated sorting genetic algorithm II (NSGA-II) and multi-objective Scatter search II (MOSS-II) has been included to highlight the benefits of the proposed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号