全文获取类型
收费全文 | 120篇 |
免费 | 6篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 29篇 |
金属工艺 | 1篇 |
机械仪表 | 9篇 |
能源动力 | 1篇 |
轻工业 | 1篇 |
无线电 | 8篇 |
一般工业技术 | 31篇 |
冶金工业 | 2篇 |
自动化技术 | 43篇 |
出版年
2023年 | 1篇 |
2022年 | 7篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2017年 | 3篇 |
2016年 | 6篇 |
2015年 | 2篇 |
2014年 | 6篇 |
2013年 | 7篇 |
2012年 | 12篇 |
2011年 | 8篇 |
2010年 | 10篇 |
2009年 | 6篇 |
2008年 | 8篇 |
2007年 | 5篇 |
2006年 | 9篇 |
2005年 | 5篇 |
2004年 | 1篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2000年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1982年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有126条查询结果,搜索用时 0 毫秒
1.
The main purpose of this study is to evaluate the computational efficiency of algorithms for calculating shortest paths when they are correctly coded by using the C programming language. The eight algorithms that we selected for this experiment are the most efficient, either measured in terms of worst-case bounds or marked as such from previous computational studies; they include the redistributive heap algorithm. We suggest computer implementations that use the full power of C. In particular, the network representation and the various data structures used to keep the scan eligible list may be managed by using only additions and no multiplications, while it is not possible with FORTRAN. These capabilities, unique to C, yield several interesting conclusions: one may expect to speed up a shortest path algorithm by a factor of 20%; in some cases, this factor may reach 30%. Interestingly, the level of programming difficulty required to achieve these benefits is not greater than that required by implementations using arrays. 相似文献
2.
In this paper, we introduce two algorithms to address the two-echelon capacitated location-routing problem (2E-CLRP). We introduce a branch-and-cut algorithm based on the solution of a new two-index vehicle-flow formulation, which is strengthened with several families of valid inequalities. We also propose an adaptive large-neighbourhood search (ALNS) meta-heuristic with the objective of finding good-quality solutions quickly. The computational results on a large set of instances from the literature show that the ALNS outperforms existing heuristics. Furthermore, the branch-and-cut method provides tight lower bounds and is able to solve small- and medium-size instances to optimality within reasonable computing times. 相似文献
3.
Teodor C. Przymusinski 《Annals of Mathematics and Artificial Intelligence》1994,12(3-4):141-187
We investigate the class ofstationary or partial stable models of normal logic programs. This important class of models includes all (total)stable models, and, moreover, thewell-founded model is always its smallest member. Stationary models have several natural fixed-point definitions and can be equivalently obtained as expansions or extensions of suitable autoepistemic or default theories. By taking a particular subclass of this class of models one can obtain different semantics of logic programs, including the stable semantics and the well-founded semantics. Stationary models can be also naturally extended to the class of all disjunctive logic programs. These features of stationary models designate them as an important class of models with applications reaching far beyond the realm of logic programming.Partially supported by the National Science Foundation grant #IRI-9313061. 相似文献
4.
Dana Petcu Silviu Panica Marc Frîncu Marian Neagul Daniela Zaharie Georgiana Macariu Dorian Gorgan Teodor Ştefănuţ 《Computer Standards & Interfaces》2012,34(6):493-508
Earth observation data processing and storing can be done nowadays only using distributed systems. Experiments dealing with a large amount of data are possible within the timeframe of a lesson and can give trainees the freedom to innovate. Following these trends and ideas, we have built a proof-of-the-concept platform, named GiSHEO, for Earth observation educational tasks. It uses Grid computing technologies to analyze and store remote sensing data, and combines them with eLearning facilities. This paper provides an overview of the GiSHEO's platform architecture and of its technical and innovative solutions. 相似文献
5.
3D graphical method for profiling gear hob tools 总被引:1,自引:1,他引:0
S. Berbinschi V. Teodor N. Oancea 《The International Journal of Advanced Manufacturing Technology》2013,64(1-4):291-304
This paper approaches the issue of profiling gear hob bounded by a cylindrical helical surface with constant pitch, reciprocally enveloping with an ordered surfaces curl. The process kinematics of generation reproduces the 3D gear between the worm and the wheel. This gear has crossing axes and it is used for the profiling of the primary peripheral surface of the gear hub in the intermediary surface method (the common rack-gear of the surfaces curl to be generated and the primary peripheral surface of the gear hob). An algorithm in the CATIA design environment is presented, based onto an original method for the determination of the reference rack-gear form—the rack-gear reciprocally enveloping with the surfaces curl, using the principle of the cylindrical helical motion decomposition in translation and rotation motions. Graphical and analytical profiling examples are presented for the gear hob for generation of a parallel spline shaft and for the generation of a toothed wheel with involute teeth. Solutions for the interference problems, problems due to the singular points onto the profiles, are presented. 相似文献
6.
Two-stage oxidation using tracers of the oxidizing medium The mechanism of scaling can be determined using a two stage oxidation method; according to this method an isotope is added to the oxidizing medium in the second stage of the oxidation. If the isotope is radioactive, the result is evaluated by autoradiography (e. g. S, Cl, Br), otherwise mass spectroscopy is used (e. g. oxygen). Depending on the nature of the diffusion processes – diffusion of metal through the scale to the surface, or diffusion of the attacking medium through the scale to the core metal – one obtains typical concentration gradients of the isotope within the scale layer; beyond that, information is obtained concerning diffusion paths (pores, lattice defects). Experiments described include sulfidation of Ni, CuZn, Ag. 相似文献
7.
Teodor Gabriel Crainic Guido Perboli Miriam Pezzuto Roberto Tadei 《Computers & Operations Research》2007
In this paper, we address the issue of computing fast lower bounds for the Bin Packing problem, i.e., bounds that have a computational complexity dominated by the complexity of ordering the items by non-increasing values of their volume. We introduce new classes of fast lower bounds with improved asymptotic worst-case performance compared to well-known results for similar computational effort. Experimental results on a large set of problem instances indicate that the proposed bounds reduce both the deviation from the optimum and the computational effort. 相似文献
8.
Olha Khymenets Jesús Joglar Pere Claps Teodor Parella María‐Isabel Covas Rafael de la Torre 《Advanced Synthesis \u0026amp; Catalysis》2006,348(15):2155-2162
The biocatalytic synthesis and purification of O‐β‐D ‐monoglucuronide conjugates of hydroxytyrosol, tyrosol, homovanillic alcohol, and 3‐(4′‐hydroxyphenyl)propanol, using porcine liver microsomes, are described here. The glucuronides were synthesized, analyzed and separated by HPLC‐UV, identified by HPLC‐MS, and their structures unequivocally established by NMR techniques. The outcome of the glucuronidation reaction depends on the structure of the phenolic compounds. Thus, the glucuronidation of hydroxytyrosol, biocatalyzed with porcine liver microsomes, proceeded exclusively on the phenolic hydroxy groups. The regioselectivity was similar to that observed for human and rat liver microsomes, the 4′‐hydroxy position being more favorable than the 3′‐hydroxy one. In the case of tyrosol, homovanillic alcohol, and hydroxyphenylpropanol, two products were formed during microsomal glucuronidation: a major one, the phenolic O‐β‐D ‐glucuronidated derivative and, a minor one, the O‐β‐D ‐glucuronidated aliphatic alcohol. 相似文献
9.
Camelia Agapescu Anca Cojocaru Adina Cotarta Teodor Visan 《Journal of Applied Electrochemistry》2013,43(3):309-321
This article presents a series of preliminary results regarding the electrodeposition of bismuth, tellurium, and bismuth telluride films at 60 °C from ionic liquids, containing a mixture of choline chloride and oxalic acid (ChCl–OxA). Ten millimolar concentration solutions of BiCl3 and TeO2 were used as precursors in this supporting electrolyte. Cyclic voltammetry and electrochemical impedance spectroscopy techniques were used to demonstrate the deposition processes on Pt and Cu electrodes. Long-time electrolyses (30–120 min) performed at 60 °C with potential control (between ?0.22 and ?0.37 V vs. Ag reference electrode) have resulted in films deposited on copper substrate. Film surfaces were studied by scanning electron microscopy and analyzed by energy dispersive X-ray spectroscopy. The results of this study show that ChCl–OxA ionic liquid may be considered as a promising substitute of aqueous baths for Bi, Te or Bi2Te3 film plating. 相似文献
10.
Marius Barat Dumitru-Bogdan Prelipcean Dragoş Teodor Gavriluţ 《Journal in Computer Virology》2013,9(4):171-178
With the exponential growth of malware in the last 5 years, the number of polymorphic malware increased as well. The aim of this paper is to describe the evolution throughout a year of four major malware families (FakeAlert, Sirefef, ZBot and Vundo). The analysis has been made in terms of polymorphic mechanisms with regards to the polymorphic mechanisms (such as changes in the packer module, changes in the geometry of file, variation of version information from the resource directory or different methods used to modify the icon of one file) which have been used in order to avoid their detection by anti-malware systems. The malware files were collected every week throughout one year’s time. For each family we have recorded the new variants and the updates that were added to the old ones in order to avoid detection. We have managed to examine more than 1,000 new versions of such files. The current article includes an additional study case. The latter focuses on the methods that have been used by the FakeAlert malware family in order to modify their icons. 相似文献