首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   363篇
  免费   9篇
综合类   1篇
化学工业   71篇
金属工艺   10篇
机械仪表   1篇
建筑科学   11篇
矿业工程   1篇
能源动力   15篇
轻工业   20篇
水利工程   6篇
石油天然气   7篇
无线电   27篇
一般工业技术   69篇
冶金工业   48篇
原子能技术   1篇
自动化技术   84篇
  2024年   2篇
  2023年   4篇
  2022年   10篇
  2021年   5篇
  2020年   7篇
  2019年   14篇
  2018年   11篇
  2017年   8篇
  2016年   10篇
  2015年   6篇
  2014年   10篇
  2013年   27篇
  2012年   10篇
  2011年   24篇
  2010年   12篇
  2009年   10篇
  2008年   17篇
  2007年   15篇
  2006年   14篇
  2005年   14篇
  2004年   13篇
  2003年   10篇
  2002年   8篇
  2001年   6篇
  2000年   5篇
  1999年   7篇
  1998年   7篇
  1997年   10篇
  1996年   8篇
  1995年   7篇
  1994年   7篇
  1993年   2篇
  1992年   8篇
  1991年   4篇
  1990年   4篇
  1989年   2篇
  1988年   8篇
  1987年   5篇
  1986年   3篇
  1985年   3篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1978年   1篇
  1977年   2篇
  1976年   6篇
  1975年   1篇
  1967年   1篇
排序方式: 共有372条查询结果,搜索用时 15 毫秒
1.
A dynamic model for computer simulation and control of steelmaking has been developed. It is essentially based on multicomponent mixed transport control theory with the incorporation of energy balance calculations. The model is applicable to both steelmaking in electric furnaces as well as in oxygen steelmaking converters. The adjustable parameters of the model for simulation of oxygen steelmaking are gas evolution rate (Gco). oxygen flux factor (Fo) and emulsification factor (EM). These simulation parameters, when combined with on-line measurement of off-gas composition and temperature, enable complete dynamic control of the process. The model developed is applied, as an example, to an industrially produced heat in a top blown oxygen steelmaking converter and the results of simulation are discussed.  相似文献   
2.
We describe a new parallel data structure, namely parallel heap, for exclusive-read exclusive-write parallel random access machines. To our knowledge, it is the first such data structure to efficiently implement a truly parallel priority queue based on a heap structure. Employing p processors, the parallel heap allows deletions of (p) highest priority items and insertions of (p) new items, each in O(log n) time, where n is the size of the parallel heap. Furthermore, it can efficiently utilize processors in the range 1 through n.This work was supported by U.S. Army's PM-TRADE contract N61339-88-g-0002, Florida High Technology and Industry grant 11-28-716, and Georgia State University's internal research support during spring and summer quarters, 1991.  相似文献   
3.
A suspension of mica particles (40m diameter and 3.7 thick) obtained in a mechanically stirred Al-4 wt % Cu-1.5 wt % Mg melt was poured and solidified in a variety of moulds under different heat flow configurations. The resulting cast structure showed a non-uniform distribution of dispersed mica particles with mica-depleted and segregated zones due to their flotation before and during solidification. The experimentally observed profiles of mica-free regions deviate significantly from those computed on the basis of Stokes's law and freezing-time computations. In relatively thick castings, segregation of mica could be minimized by using low pouring temperatures and/or side as well as bottom chilling. It was found, however, that thin castings (12.5 mm) could easily be produced with a homogeneous distribution of mica particles.  相似文献   
4.
Silicon is the primary semiconductor material used to fabricate microchips. A series of processes are required to manufacture high-quality silicon wafers. Surface grinding is one of the processes used to flatten wire-sawn wafers. A major issue in grinding of wire-sawn wafers is reduction and elimination of wire-sawing induced waviness. Results of finite element analysis have shown that soft-pad grinding is very effective in reducing the waviness. This paper presents an experimental investigation into soft-pad grinding of wire-sawn silicon wafers. Wire-sawn wafers from a same silicon ingot were used for the study to ensure that these wafers have similar waviness. These wafers were ground using two different soft pads. As a comparison, some wafers were also ground on a rigid chuck. Effectiveness of soft-pad grinding in removing waviness has been clearly demonstrated.  相似文献   
5.
In social psychology, emotional contagion describes the widely observed phenomenon of one person’s emotions being influenced by surrounding people’s emotions. While the overall effect is agreed upon, the underlying mechanism of the spread of emotions has seen little quantification and application to computational agents despite extensive evidence of its impacts in everyday life. In this paper, we examine computational models of emotional contagion by implementing two models (Bosse et al., European council on modeling and simulation, pp. 212–218, 2009) and Durupinar, From audiences to mobs: Crowd simulation with psychological factors, PhD dissertation, Bilkent University, 2010) that draw from two separate lines of contagion research: thermodynamics-based and epidemiological-based. We first perform sensitivity tests on each model in an evacuation simulation, ESCAPES, showing both models to be reasonably robust to parameter variations with certain exceptions. We then compare their ability to reproduce a real crowd panic scene in simulation, showing that the thermodynamics-style model (Bosse et al., European council on modeling and simulation, pp. 212–218, 2009) produces superior results due to the ill-suited contagion mechanism at the core of epidemiological models. We also identify that a graduated effect of fear and proximity-based contagion effects are key to producing the superior results. We then reproduce the methodology on a second video, showing that the same results hold, implying generality of the conclusions reached in the first scene.  相似文献   
6.
Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG.  相似文献   
7.

Data quality became significant with the emergence of data warehouse systems. While accuracy is intrinsic data quality, validity of data presents a wider perspective, which is more representational and contextual in nature. Through our article we present a different perspective in data collection and collation. We focus on faults experienced in data sets and present validity as a function of allied parameters such as completeness, usability, availability and timeliness for determining the data quality. We also analyze the applicability of these metrics and apply modifications to make it conform to IoT applications. Another major focus of this article is to verify these metrics on aggregated data set instead of separate data values. This work focuses on using the different validation parameters for determining the quality of data generated in a pervasive environment. Analysis approach presented is simple and can be employed to test the validity of collected data, isolate faults in the data set and also measure the suitability of data before applying algorithms for analysis. On analyzing the data quality of the two data sets on the basis of above-mentioned parameters. We show that validity for data set 1 was found to be 75% while it was found to be 67% only for data set 2. Availability and data freshness metrics performance were analyzed graphically. It was found that for data set 1, data freshness was better while availability metric was found better for data set 2. Usability obtained for data set 2 was 86% which was higher as compared to data set 1 whose usability metric was 69%. Thus, this work presents methods that can be leveraged for estimating data quality that can be beneficial in various IoT based industries which are essentially data centric and the decisions made by them depends upon the validity of data.

  相似文献   
8.
How do we build algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human interaction, such as oligopolistic markets and security domains. In Stackelberg games, one player, the leader, commits to a strategy and the follower makes her decision with knowledge of the leader's commitment. Existing algorithms for Stackelberg games efficiently find optimal solutions (leader strategy), but they critically assume that the follower plays optimally. Unfortunately, in many applications, agents face human followers (adversaries) who — because of their bounded rationality and limited observation of the leader strategy — may deviate from their expected optimal response. In other words, human adversaries' decisions are biased due to their bounded rationality and limited observations. Not taking into account these likely deviations when dealing with human adversaries may cause an unacceptable degradation in the leader's reward, particularly in security applications where these algorithms have seen deployment. The objective of this paper therefore is to investigate how to build algorithms for agent interactions with human adversaries.To address this crucial problem, this paper introduces a new mixed-integer linear program (MILP) for Stackelberg games to consider human adversaries, incorporating: (i) novel anchoring theories on human perception of probability distributions and (ii) robustness approaches for MILPs to address human imprecision. Since this new approach considers human adversaries, traditional proofs of correctness or optimality are insufficient; instead, it is necessary to rely on empirical validation. To that end, this paper considers four settings based on real deployed security systems at Los Angeles International Airport (Pita et al., 2008 [35]), and compares 6 different approaches (three based on our new approach and three previous approaches), in 4 different observability conditions, involving 218 human subjects playing 2960 games in total. The final conclusion is that a model which incorporates both the ideas of robustness and anchoring achieves statistically significant higher rewards and also maintains equivalent or faster solution speeds compared to existing approaches.  相似文献   
9.
This paper analyzes the Russian software industry in the context of trade in information technology services. We assess Russia's underlying sources of competitive edge in software, such as its scientific establishments, education system, diaspora and low costs, and identify the institutional impediments to growth. A survey reveals that foreign outsourcing contracts, a high value-added niche and high education levels characterize Russia's small, privately held software firms. A comparison with the Indian software industry underscores the structural differences in outsourcing relationships developed by the two countries and emphasizes that national advantages are complex amalgamations of many factors and need to be overtly marketed. Beyond the resources that give comparative and competitive advantage to a transitioning economy, a critical role is played by powerful industry organizations and by non-market state institutions that can level the economic field and inject credibility into market structures.  相似文献   
10.
Satya Deo 《Sadhana》2004,29(4):381-387
The problem of creeping flow past a swarm of porous circular cylinders with Happel and Kuwabara boundary conditions is investigated. The Brinkman equation for the flow inside the porous cylinder and the Stokes equation outside the porous cylinder in their stream function formulations are used. The force experienced by each porous circular cylinder in a cell is evaluated. Explicit expressions of stream functions are obtained for both the inside and outside flow fields. The earlier results reported by Happel and Kuwabara for flow past a solid cylinder in Happel’s and Kuwabara’s cell model, have been deduced. Analytical expressions for the velocity components, pressure, vorticity and stresstensor are also obtained  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号