首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   87篇
  免费   0篇
化学工业   7篇
轻工业   36篇
无线电   2篇
一般工业技术   9篇
冶金工业   4篇
自动化技术   29篇
  2013年   33篇
  2011年   2篇
  2008年   1篇
  2005年   1篇
  2002年   2篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1988年   1篇
  1987年   2篇
  1983年   3篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1977年   5篇
  1976年   1篇
  1975年   1篇
  1974年   2篇
  1972年   2篇
  1970年   1篇
  1969年   1篇
  1968年   2篇
  1967年   2篇
  1966年   1篇
  1964年   1篇
  1962年   1篇
  1961年   1篇
  1956年   1篇
  1955年   1篇
  1954年   2篇
  1950年   3篇
  1942年   1篇
  1940年   1篇
  1938年   1篇
排序方式: 共有87条查询结果,搜索用时 31 毫秒
1.
Oxidizing SiC particles is a common practice in the fabrication of SiC/Al composites through direct mixing of the liquid metal and the ceramic particles. This practice is addressed to reduce the reaction between the two materials. In a previous work it was concluded that oxidizing SiC particles scarcely affected the threshold pressure for infiltration of pure Al into compacts made of those particles. In this work we present a detailed study of this problem for infiltration of pure Al and the eutectic Al-Si alloy. Our results indicate that oxidizing of SiC particles does not affect significantly either the threshold pressure or the infiltration kinetics. This conclusion is equally valid for both pure Al and the eutectic alloy.  相似文献   
2.
The closed-loop design experiment described in this paper demonstrates a three-phase automated design approach to pattern recognition. The experiment generates morphological feature detectors and then uses a novel application of genetic algorithms to select cooperative sets of features to pass to a neural net classifier. The self-organizing hybrid learning approach embodied in this closed-loop design methodology is complementary to conventional artificial intelligence (AI) expert systems that utilize rule-based approaches and a specific set of design elements. This experiment is part of a study directed to emulating the nondirected processes of biological evolution. The approach we discuss is semiautomatic in that initialization of computer programs requires human experience and expertise to select representations, develop search strategies, choose performance measures, and devise resource-allocation strategies. The hope is that these tasks will become easier with experience and will provide the means to exploit parallel processing without the need to analyze or program an entire design solution.  相似文献   
3.
Abstract

This paper describes a system for explaining solutions generated by genetic algorithms (GAs) using tools developed for case-based reasoning (CBR). In addition, this work empirically supports the building block hypothesis (BBH) which states that genetic algorithms work by combining good sub-solutions called building blocks into complete solutions. Since the space of possible building blocks and their combinations is extremely large, solutions found by GAs are often opaque and cannot be easily explained. Ironically, much of the knowledge required to explain such solutions is implicit in the processing done by the GA. Our system extracts and processes historical information from the GA by using knowledge acquisition and analysis tools developed for case-based reasoning. If properly analysed, the resulting knowledge base can be used: to shed light on the nature of the search space; to explain how a solution evolved; to discover its building blocks; and to justify why it works. Such knowledge about the search space can be used to tune the GA in various ways. As well as being a useful explanatory tool for GA researchers, our system serves as an empirical test of the building block hypothesis. The fact that it works so well lends credence to the theory that GAs work by exploiting common genetic building blocks.  相似文献   
4.
CIPHER DEVICES     
LOUIS KRUH 《Cryptologia》2013,37(1):78-79
  相似文献   
5.
An inverse power aeries solution, dealing with a wide variety of space charge problems, which has been proposed previously, suffers from one drawback. The first coefficient in the expansion is given as the solution of an infinite polynomial and all other coefficients depend on the first one. In this paper we describe a method of obtaining the first coefficient directly from a Poisson Equation of the form ü=g(u) for the case where ∫g(u) du is readily obtainable. That this is often the case physically is shown by applying the theory to several junction and blocking electrode problems both with and without traps.  相似文献   
6.
LOUIS KRUH 《Cryptologia》2013,37(2):163-172
Abstract

In this article, we describe the five block cipher modes of operation that have been approved by the National Institute of Standards and Technology (NIST) for confidentiality. Each mode specifies an algorithm for encrypting/decrypting data sequences that are longer than a single block.  相似文献   
7.
Abstract

Sets out, with comments, an account by A. G. Denniston (the operational head of the British Government Code and Cypher School in 1939) of the meeting near Pyry, Poland, in July 1939, when Polish cryptanalysts revealed how they broke Enigma, and a letter by Dillwyn Knox on the meeting's outcome.  相似文献   
8.
9.
10.
Hydration behaviour of synthetic saponite was examined by X-ray powder diffraction simulation at various relative humidities (RH). The basal spacing of the Ca-saponite increased stepwise with increase in RH. The (00l) reflections observed reflect single or dual hydration states of smectite. Quasi-rational, intermediate, or asymmetrical reflections were observed for all XRD patterns and reflecting heterogeneity of the samples, especially along the transition between two hydration states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号