首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   456篇
  免费   14篇
  国内免费   1篇
综合类   1篇
化学工业   81篇
金属工艺   7篇
机械仪表   6篇
建筑科学   15篇
矿业工程   1篇
能源动力   20篇
轻工业   26篇
水利工程   10篇
石油天然气   7篇
无线电   51篇
一般工业技术   104篇
冶金工业   53篇
原子能技术   1篇
自动化技术   88篇
  2024年   3篇
  2023年   7篇
  2022年   23篇
  2021年   11篇
  2020年   23篇
  2019年   24篇
  2018年   20篇
  2017年   20篇
  2016年   14篇
  2015年   8篇
  2014年   23篇
  2013年   33篇
  2012年   23篇
  2011年   31篇
  2010年   19篇
  2009年   12篇
  2008年   14篇
  2007年   11篇
  2006年   15篇
  2005年   12篇
  2004年   8篇
  2003年   8篇
  2002年   8篇
  2001年   4篇
  2000年   3篇
  1999年   4篇
  1998年   11篇
  1997年   10篇
  1996年   6篇
  1995年   6篇
  1994年   5篇
  1993年   1篇
  1992年   7篇
  1991年   2篇
  1990年   4篇
  1989年   2篇
  1988年   7篇
  1987年   4篇
  1986年   3篇
  1985年   3篇
  1982年   1篇
  1981年   1篇
  1980年   3篇
  1978年   1篇
  1977年   2篇
  1976年   6篇
  1975年   1篇
  1974年   2篇
  1973年   1篇
  1967年   1篇
排序方式: 共有471条查询结果,搜索用时 15 毫秒
1.
A dynamic model for computer simulation and control of steelmaking has been developed. It is essentially based on multicomponent mixed transport control theory with the incorporation of energy balance calculations. The model is applicable to both steelmaking in electric furnaces as well as in oxygen steelmaking converters. The adjustable parameters of the model for simulation of oxygen steelmaking are gas evolution rate (Gco). oxygen flux factor (Fo) and emulsification factor (EM). These simulation parameters, when combined with on-line measurement of off-gas composition and temperature, enable complete dynamic control of the process. The model developed is applied, as an example, to an industrially produced heat in a top blown oxygen steelmaking converter and the results of simulation are discussed.  相似文献   
2.
A forming model based on a viscoplastic flow formulation is derived which includes the effects of small elastic strains. A significant feature of the formulation is its reliance on the dominant inelastic material characteristics in the formation of the stiffness matrix for large strain problems. The resultant non-linear system of equations is solved by an adaptive descent method which combines the rapid convergence of Newton's method near the solution with the robustness of a method of successive approximations. The use of the adaptive descent method effectively extends the viscoplastic flow formulations into the nearly rate-insensitive range of behaviours exhibited, for example, by metals at low temperature, where slow convergence of the non-linear solution algorithm has traditionally hampered their use.  相似文献   
3.
Al-SBA-15 of varying Si/Al ratios in the range 11.4–78.4 was synthesized using tri-block copolymer P123. The calcined materials were examined by XRD, pore size distribution, surface area, 27Al NMR spectroscopy. The acidity and acid strength distribution were studied using microcalorimetric adsorption of NH3. The acidic properties were also examined by cumene cracking reaction as a function of Si/Al ratios. Systematic variation of acidity and activity was observed as a function of Si/Al ratio. The initial heats of NH3 adsorption correlated well with activity indicate that acid sites with ΔH > 100 kJ/mole is responsible for cumene cracking activity. Linear correlations were obtained with total acidity and cumene cracking activities. The tetrahedral aluminum was found to be responsible for the observed acidities and catalytic activities.  相似文献   
4.
We describe a new parallel data structure, namely parallel heap, for exclusive-read exclusive-write parallel random access machines. To our knowledge, it is the first such data structure to efficiently implement a truly parallel priority queue based on a heap structure. Employing p processors, the parallel heap allows deletions of (p) highest priority items and insertions of (p) new items, each in O(log n) time, where n is the size of the parallel heap. Furthermore, it can efficiently utilize processors in the range 1 through n.This work was supported by U.S. Army's PM-TRADE contract N61339-88-g-0002, Florida High Technology and Industry grant 11-28-716, and Georgia State University's internal research support during spring and summer quarters, 1991.  相似文献   
5.
A suspension of mica particles (40m diameter and 3.7 thick) obtained in a mechanically stirred Al-4 wt % Cu-1.5 wt % Mg melt was poured and solidified in a variety of moulds under different heat flow configurations. The resulting cast structure showed a non-uniform distribution of dispersed mica particles with mica-depleted and segregated zones due to their flotation before and during solidification. The experimentally observed profiles of mica-free regions deviate significantly from those computed on the basis of Stokes's law and freezing-time computations. In relatively thick castings, segregation of mica could be minimized by using low pouring temperatures and/or side as well as bottom chilling. It was found, however, that thin castings (12.5 mm) could easily be produced with a homogeneous distribution of mica particles.  相似文献   
6.
We study entanglement dynamics of qubit–qutrit pair under Dzyaloshinskii–Moriya (DM) interaction. The qubit–qutrit pair acts as a closed system and one external qubit serve as the environment for the pair. The external qubit interact with qubit of closed system via DM interaction. This interaction frequently kills the entanglement between qubit–qutrit pair, which is also periodically recovered. On the other hand two parameter class of state of qubit–qutrit pair also affected by DM interaction and one parameter class of state remains unaffected. The frequency of occurrence of entanglement sudden death and entanglement sudden birth in two parameter class of state is half than qubit–qutrit pure state. We used our quantification of entanglement as negativity measure.  相似文献   
7.
Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG.  相似文献   
8.

Data quality became significant with the emergence of data warehouse systems. While accuracy is intrinsic data quality, validity of data presents a wider perspective, which is more representational and contextual in nature. Through our article we present a different perspective in data collection and collation. We focus on faults experienced in data sets and present validity as a function of allied parameters such as completeness, usability, availability and timeliness for determining the data quality. We also analyze the applicability of these metrics and apply modifications to make it conform to IoT applications. Another major focus of this article is to verify these metrics on aggregated data set instead of separate data values. This work focuses on using the different validation parameters for determining the quality of data generated in a pervasive environment. Analysis approach presented is simple and can be employed to test the validity of collected data, isolate faults in the data set and also measure the suitability of data before applying algorithms for analysis. On analyzing the data quality of the two data sets on the basis of above-mentioned parameters. We show that validity for data set 1 was found to be 75% while it was found to be 67% only for data set 2. Availability and data freshness metrics performance were analyzed graphically. It was found that for data set 1, data freshness was better while availability metric was found better for data set 2. Usability obtained for data set 2 was 86% which was higher as compared to data set 1 whose usability metric was 69%. Thus, this work presents methods that can be leveraged for estimating data quality that can be beneficial in various IoT based industries which are essentially data centric and the decisions made by them depends upon the validity of data.

  相似文献   
9.
10.
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered Approach. Experimental results on the benchmark KDD '99 intrusion data set show that our proposed system based on Layered Conditional Random Fields outperforms other well-known methods such as the decision trees and the naive Bayes. The improvement in attack detection accuracy is very high, particularly, for the U2R attacks (34.8 percent improvement) and the R2L attacks (34.5 percent improvement). Statistical Tests also demonstrate higher confidence in detection accuracy for our method. Finally, we show that our system is robust and is able to handle noisy data without compromising performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号