首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   489篇
  免费   31篇
  国内免费   3篇
电工技术   5篇
化学工业   102篇
金属工艺   11篇
机械仪表   8篇
建筑科学   13篇
矿业工程   2篇
能源动力   39篇
轻工业   36篇
水利工程   25篇
石油天然气   5篇
无线电   60篇
一般工业技术   95篇
冶金工业   17篇
自动化技术   105篇
  2024年   1篇
  2023年   18篇
  2022年   38篇
  2021年   39篇
  2020年   38篇
  2019年   41篇
  2018年   36篇
  2017年   28篇
  2016年   26篇
  2015年   19篇
  2014年   16篇
  2013年   50篇
  2012年   15篇
  2011年   35篇
  2010年   25篇
  2009年   14篇
  2008年   18篇
  2007年   12篇
  2006年   6篇
  2005年   12篇
  2004年   3篇
  2003年   3篇
  2002年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1996年   3篇
  1994年   2篇
  1993年   2篇
  1992年   4篇
  1991年   1篇
  1990年   2篇
  1989年   4篇
  1987年   1篇
  1985年   1篇
  1977年   1篇
排序方式: 共有523条查询结果,搜索用时 15 毫秒
1.

Optimization models are developed for simultaneously determining the pipe layout and the pipe design for storm sewer systems. The pipe design process includes computation of commercial diameters, slopes, and crown elevations for the storm sewer pipes. The optimization models aim to minimize the total costs of the layout and the pipe design for most of system elements. The optimization models are formulated as a 0–1 Integer Nonlinear Programming problem and solved using the General Algebraic Modeling System without the use of heuristic models which were characteristic of all previous models for the simultaneous determine of the pipe layout and pipe design of sewer networks. The models are based upon two different optimization approaches: (1) considers one or more commercial diameters of pipe connecting two manholes and (2) considers only one commercial diameter in a pipe connecting two manholes. The commercial diameters, pipe slopes, crown elevations, and total costs of the storm sewer system were compared for the two approaches using an example that illustrates the savings in cost by allowing multiple pipe sizes. The two new optimization modeling approaches developed herein can simultaneously determine the minimum cost pipe design (commercial diameters, slopes, and crown elevations) and pipe layout of storm sewer systems and satisfy all design constraints.

  相似文献   
2.
Cucurbitaceae family seeds are mostly discarded as agro-industrial wastes. Gurum (Citrullus lanatus var. colocynthoide) is an underutilized wild cucurbit plant, closely related to desert watermelon, which is grown abundantly in some African countries. Gurum seeds can play a significant role in health and nutrition due to their high oil content. This review describes the nutritional composition of gurum seeds and their oil profile. Gurum seeds are a good source of oil (27–35.5%), fiber (26–31%), crude protein (15–18%), and carbohydrates (14–17%). Gurum seeds oil is extracted by supercritical CO2 (SFE), screw press, and solvent extraction techniques. The gurum seeds oil is composed of unsaturated fatty acids with a high proportion of linoleic acid (C18:2) and oleic acid (C18:1). Gurum seeds oil contains various bioactive compounds, such as tocopherols, phytosterols, and polyphenols. It is reported that solvent extraction gives a higher yield than the screw press and SFE, but the SFE is preferred due to safety issues. More studies are required for producing better quality gurum seeds oil by using novel extraction techniques that can increase oil yield.  相似文献   
3.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
4.
5.
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times.  相似文献   
6.
Computational Economics - This study tries to unravel the stock market prediction puzzle using the textual analytic with the help of natural language processing (NLP) techniques and Deep-learning...  相似文献   
7.
Link relative-based approach was used in an article (see reference 1) to enhance the performance of the cumulative sum (CUSUM) control chart. This technique involves the use of firstly, the link relative variable to convert the process observations in a relative to the mean form and secondly, optimal constants to define a new variable which is used as the plotting statistic of the link relative CUSUM chart. In this article, it is proven through simulation study that the optimal constants with fixed values, as reported in the aforementioned article, give different results. Instead, if the regression technique is used, then the same results will be obtained.  相似文献   
8.
Diagnosing a power quality disturbance means identifying the type and cause of the disturbance. Fast diagnosis of power quality disturbances is important so as to assist network operators in performing counter measures and implementing suitable power quality mitigation actions. In this study a novel method for performing power quality diagnosis is presented by using the S-transform and rule based classification techniques. The proposed power quality diagnosis method was evaluated for its functionality in detecting the type of short duration voltage disturbances and identifying the cause of the disturbances which may be due to permanent or non permanent faults. Based on the results, this new method has the potential to be used in the existing real time power quality monitoring system in Malaysia to expedite the diagnosis on the recorded voltage disturbances.  相似文献   
9.
This paper reports the dynamic behaviour of a magnetically actuated floating liquid marble by analysing the oscillation of the marble. A liquid marble is a liquid droplet coated with hydrophobic powder. Magnetite particles inside the marble make it magnetic. The marble floats on a carrier liquid that contains aqueous glycerol of various concentrations. A permanent magnet located under the carrier liquid drives the floating marble with the initial velocity. Stopping the magnet abruptly causes the marble to oscillate around its final position for a few seconds. The oscillation was recorded and analysed using customised image processing and evaluation software. The damped harmonic motion model was then applied to the data and tested. Subsequently, critical parameters of the system such as the initial displacement, friction correction factor, the apparent frequency and the spring constant were determined and discussed. The simple experimental set-up and convenient theoretical approach allow us to characterise the marble motion under the influence of a magnet with good accuracy.  相似文献   
10.
Choosing a suitable classifier for a given dataset is an important part of developing a pattern recognition system. Since a large variety of classification algorithms are proposed in literature, non-experts do not know which method should be used in order to obtain good classification results on their data. Meta-learning tries to address this problem by recommending promising classifiers based on meta-features computed from a given dataset. In this paper, we empirically evaluate five different categories of state-of-the-art meta-features for their suitability in predicting classification accuracies of several widely used classifiers (including Support Vector Machines, Neural Networks, Random Forests, Decision Trees, and Logistic Regression). Based on the evaluation results, we have developed the first open source meta-learning system that is capable of accurately predicting accuracies of target classifiers. The user provides a dataset as input and gets an automatically created high-performance ready-to-use pattern recognition system in a few simple steps. A user study of the system with non-experts showed that the users were able to develop more accurate pattern recognition systems in significantly less development time when using our system as compared to using a state-of-the-art data mining software.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号