首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   300篇
  免费   21篇
  国内免费   1篇
电工技术   3篇
综合类   6篇
化学工业   49篇
金属工艺   5篇
机械仪表   19篇
建筑科学   6篇
能源动力   10篇
轻工业   28篇
水利工程   1篇
石油天然气   1篇
无线电   32篇
一般工业技术   60篇
冶金工业   19篇
原子能技术   7篇
自动化技术   76篇
  2023年   5篇
  2022年   17篇
  2021年   22篇
  2020年   23篇
  2019年   20篇
  2018年   17篇
  2017年   19篇
  2016年   22篇
  2015年   15篇
  2014年   17篇
  2013年   32篇
  2012年   14篇
  2011年   20篇
  2010年   15篇
  2009年   5篇
  2008年   6篇
  2007年   6篇
  2006年   4篇
  2005年   7篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   5篇
  1996年   4篇
  1995年   4篇
  1994年   1篇
  1993年   4篇
  1992年   3篇
  1991年   2篇
  1989年   1篇
  1985年   1篇
排序方式: 共有322条查询结果,搜索用时 15 毫秒
1.
ABSTRACT

The quality of user-generated content over World Wide Web media is a matter of serious concern for both creators and users. To measure the quality of content, webometric techniques are commonly used. In recent times, bibliometric techniques have been introduced to good effect for evaluation of the quality of user-generated content, which were originally used for scholarly data. However, the application of bibliometric techniques to evaluate the quality of YouTube content is limited to h-index and g-index considering only views. This paper advocates for and demonstrates the adaptation of existing Bibliometric indices including h-index, g-index and M-index exploiting both views and comments and proposes three indices hvc, gvc and mvc for YouTube video channel ranking. The empirical results prove that the proposed indices using views along with the comments outperform the existing approaches on a real-world dataset of YouTube.  相似文献   
2.
Anatomic snapshot memory object in shared memory systems enables a set of processes, calledscanners, to obtain a consistent picture of the shared memory while other processes, calledupdaters, keep updating memory locations concurrently. In this paper we present two conversion methods of snapshot implementations. Using the first conversion method we obtain a new snapshot implementation in which the scan operation has linear time complexity and the time complexity of the update operation becomes the sum of the time complexities of the original implementation. Applying the second conversion method yields similar results, where in this case the time complexity of the update protocol becomes linear. Although our conversion methods use unbounded space, their space complexity can be bounded using known techniques. One of the most intriguing open problems in distributed wait-free computing is the existence of a linear-time implementation of this object. Using our conversion methods and known constructions we obtain the following results:
  • ?Consider a system ofn processes, each an updater and a scanner. We present an implementation in which the time complexity of either the update or the scan operation is linear, while the time complexity of the second operation isO(n logn).
  • ?We present an implementation with linear time complexity when the number of either updaters or scanners isO(n/logn), wheren is the total number of processes.
  • ?We present an implementation with amortized linear time complexity when one of the protocols (either upate or scan) is executed significantly more often than the other protocol.
  •   相似文献   
    3.
    4.
    The main purpose of this paper is to provide a methodology for discussing the fuzzy. Bayesian system reliability from the fuzzy component reliabilities, actually we discuss on the Fuzzy Bayesian system reliability assessment based on Pascal distribution, because the data sometimes cannot be measured and recorded precisely. In order to apply the Bayesian approach, the fuzzy parameters are assumed as fuzzy random variables with fuzzy prior distributions. The (conventional) Bayes estimation method will be used to create the fuzzy Bayes point estimator of system reliability by invoking the well-known theorem called ‘Resolution Identity’ in fuzzy sets theory. On the other hand, we also provide the computational procedures to evaluate the membership degree of any given Bayes point estimate of system reliability. In order to achieve this purpose, we transform the original problem into a nonlinear programming problem. This nonlinear programming problem is then divided into four sub-problems for the purpose of simplifying computation. Finally, the sub problems can be solved by using any commercial optimizers, e.g. GAMS or LINGO.  相似文献   
    5.
    Bridges are the most useful part in the transportation network. Any disruption of the bridge structures may hamper the whole transportation system. In the last recent tsunamis, numerous number of bridges were structurally damaged by the tsunami waves. Lack of proper provisions of tsunami forces in the design guidelines also contributes to the augmentations of the damage level. Therefore, proper evaluation of the tsunami forces on the bridge girder should be introduced in the design promptly. In this study, laboratory experiments were carried out to reveal the damage mechanism of the bridge girder by assessing the exerted tsunami forces. Both broken and unbroken waves were considered for the analysis. The results showed that measured forces were larger for broken waves than those of unbroken waves. Maximum force of the broken waves was 4.59 times as large as the hydrostatic pressure. Also, waves reached the peak value more rapidly for larger wave heights than those of smaller ones. Additionally, a girder that is placed at a higher position is much vulnerable to tsunami hazard.  相似文献   
    6.
    A flat rigid elliptical anchorage located in a damage‐susceptible fluid‐saturated poroelastic medium is subjected to an in‐plane load, which induces a pure translation in the plane of the anchor. This paper develops computational estimates for the time‐dependent displacement of the disc anchor for the classical problem that involves Biot consolidation and compares the results with situations where the porous skeleton can experience micro‐mechanical damage that leads to an alteration in both its elasticity and fluid transport characteristics. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
    7.
    Horseshoe vortex topological structure has been studied extensively in the past, traditional “saddle of separation” and new “attachment saddle point” topologies found in literature both have theoretical basis and experimental and computational evidences for support. The laminar incompressible juncture flows at low Reynolds numbers especially are observed to have new topology. Studies concerning the existence of the new topology though found in literature, the topological evolution and its dependency on various critical flow parameters require further investigation. A Particle Image Velocimetry based analysis is carried out to observe the effect of aspect ratio, δ*/D and shape of the obstacle on laminar horseshoe vortex topology for small obstacles. Rise in aspect ratio evolves the topology from the traditional to new for all the cases observed. The circular cross section obstacles are found more apt to having the new topology compared to square cross sections. It is noted that the sweeping effect of the fluid above the vortex system in which horseshoe vortex is immersed plays a critical role in this evolution. Topological evolution is observed not only in the most upstream singular point region of horseshoe vortex system but also in the corner region. The corner vortex topology evolves from the traditional type to new one before the topological evolution of the most upstream singular point, resulting in a new topological pattern of the laminar juncture flows “separation-attachment combination”. The study may help extend the understanding of the three-dimensional boundary layer separation phenomenon.  相似文献   
    8.
    9.
    In this article, an internal-reforming solid oxide fuel cell–gas turbine (IRSOFC–GT) hybrid system is modeled and analyzed from thermal (energy and exergy), economic, and environmental points of view. The model is validated using available data in the literature. Utilizing the genetic algorithm optimization technique, multi-objective optimization of modeled system is carried out and the optimal values of system design parameters are obtained. In the multi-objective optimization procedure, the exergy efficiency and the total cost rate of the system (including the capital and maintenance costs, operational cost (fuel cost), and social cost of air pollution for CO, NOx, and CO2) are considered as objective functions. A sensitivity analysis is also performed in order to study the effect of variations of the fuel unit cost on the Pareto optimal solutions and their corresponding design parameters. The optimization results indicate that the final optimum design chosen from the Pareto front results in exergy efficiency of 65.60% while it leads to total cost of 3.28 million US$ year−1. It is also demonstrated that the payback time of the chosen design is 6.14 years.  相似文献   
    10.

    A novel method for grain refinement of martensite structures was proposed, in which transformation strain is accumulated by cyclic displacive forward and reverse transformations. This method can refine martensite structures in an Fe-18Ni alloy because a high density of austenite dislocations is introduced by a displacive reverse transformation in addition to an inheritance of dislocations in body-centered cubic martensite into austenite during cyclic transformation. The addition of a small amount of carbon accelerates structure refinement significantly, which results in the formation of ultra-fine-grained structures after ten cycles.

      相似文献   
    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号