首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   540篇
  免费   83篇
  国内免费   88篇
电工技术   44篇
综合类   39篇
化学工业   22篇
金属工艺   12篇
机械仪表   44篇
建筑科学   47篇
矿业工程   17篇
能源动力   10篇
轻工业   12篇
水利工程   7篇
石油天然气   4篇
武器工业   3篇
无线电   42篇
一般工业技术   43篇
冶金工业   12篇
原子能技术   99篇
自动化技术   254篇
  2024年   6篇
  2023年   12篇
  2022年   27篇
  2021年   21篇
  2020年   27篇
  2019年   25篇
  2018年   19篇
  2017年   24篇
  2016年   26篇
  2015年   31篇
  2014年   43篇
  2013年   61篇
  2012年   30篇
  2011年   50篇
  2010年   37篇
  2009年   38篇
  2008年   34篇
  2007年   36篇
  2006年   25篇
  2005年   35篇
  2004年   23篇
  2003年   15篇
  2002年   15篇
  2001年   11篇
  2000年   4篇
  1999年   7篇
  1998年   4篇
  1997年   1篇
  1996年   3篇
  1995年   7篇
  1994年   4篇
  1992年   2篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1981年   1篇
  1959年   3篇
排序方式: 共有711条查询结果,搜索用时 15 毫秒
1.
Frequency Insertion Strategy for Channel Assignment Problem   总被引:1,自引:0,他引:1  
This paper presents a new heuristic method for quickly finding a good feasible solution to the channel assignment problem (CAP). Like many other greedy-type heuristics for CAP, the proposed method also assigns a frequency to a call, one at a time. Hence, the method requires computational time that increases only linear to the number of calls. However, what distinguishes the method from others is that it starts with a narrow enough frequency band so as to provoke violations of constraints that we need to comply with in order to avoid radio interference. Each violation is then resolved by inserting frequencies at the most appropriate positions so that the band of frequencies expands minimally. An extensive computational experiment using a set of randomly generated problems as well as the Philadelphia benchmark instances shows that the proposed method perform statistically better than existing methods of its kind and even yields optimum solutions to most of Philadelphia benchmark instances among which two cases are reported for the first time ever, in this paper. Won-Young Shin was born in Busan, Korea in 1978. He received B.S. in industrial engineering from Pohang University of Science and Technology (POSTECH) in 2001 and M.S in operation research and applied statistics from POSTECH in 2003. Since 2003 he has been a researcher of Agency for Defense Development (ADD) in Korea. He is interested in optimization of communication system and applied statistics. Soo Y. Chang is an associate professor in the Department of Industrial Engineering at Pohang University of Science and Technology (POSTECH), Pohang, Korea. He teaches linear programming, discrete optimization, network flows and operations research courses. His research interests include mathematical programming and scheduling. He has published in several journals including Discrete Applied Mathematics, Computers and Mathematics with Application, IIE Transactions, International Journal of Production Research, and so on. He is a member of Korean IIE, and ORMSS. Jaewook Lee is an assistant professor in the Department of Industrial Engineering at Pohang University of Science and Technology (POSTECH), Pohang, Korea. He received the B.S. degree in mathematics with honors from Seoul National University, and the Ph.D. degree from Cornell University in applied mathematics in 1993 and 1999, respectively. He is currently an assistant professor in the department of industrial engineering at the Pohang University of Science and Technology (POSTECH). His research interests include nonlinear systems, neural networks, nonlinear optimization, and their applications to data mining and financial engineering. Chi-Hyuck Jun was born in Seoul, Korea in 1954. He received B.S. in mineral and petroleum engineering from Seoul National University in 1977, M.S. in industrial engineering from Korea Advanced Institute of Science and Technology in 1979 and Ph.D. in operations research from University of California, Berkeley, in 1986. Since 1987 he has been with the department of industrial engineering, Pohang University of Science and Technology (POSTECH) and he is now a professor and the department head. He is interested in performance analysis of communication and production systems. He has published in several journals including IIE Transactions, IEEE Transactions, Queueing Systems and Chemometrics and Intelligent Laboratory Systems. He is a member of IEEE, INFORMS and ASQ.  相似文献   
2.
汤安迪  韩统  徐登武  谢磊 《计算机应用》2021,41(8):2265-2272
针对哈里斯鹰优化(HHO)算法存在的收敛精度低、收敛速度慢、易于陷入局部最优的不足,提出了一种混沌精英哈里斯鹰优化(CEHHO)算法。首先,引入精英等级制度策略,以充分利用优势种群来增强种群多样性以及提升算法收敛速度和精度;其次,利用Tent混沌映射调整算法关键参数;然后,使用一种非线性能量因子调节策略来平衡算法的开发与探索;最后,使用高斯随机游走策略对最优个体施加扰动,并在算法停滞时,利用随机游走策略使算法有效跳出局部最优。通过对20个基准测试函数在不同维度下进行仿真实验,来评估算法的寻优能力。实验结果表明,改进算法的表现优于鲸鱼优化算法(WOA)、灰狼优化(GWO)算法、粒子群优化(PSO)算法和生物地理优化(BBO)算法,性能较原始HHO算法有明显提升,验证了改进算法的有效性。  相似文献   
3.
为了实现资源和系统环境的隔离,近年来新兴了多种虚拟化工具,容器便是其中之一。在超算资源上运行的问题通常是由软件配置引起的。容器的一个作用就是将依赖打包进轻量级可移植的环境中,这样可以提高超算应用程序的部署效率。为了解基于IB网的CPU-GPU异构超算平台上容器虚拟化技术的性能特征,使用标准基准测试工具对Docker容器进行了全面的性能评估。该方法能够评估容器在虚拟化宿主机过程中产生的性能开销,包括文件系统访问性能、并行通信性能及GPU计算性能。结果表明,容器具备近乎原生宿主机的性能,文件系统I/O开销及GPU计算开销与原生宿主机差别不大。随着网络负载的增大,容器的并行通信开销也相应增大。根据评估结果,提出了一种能够发挥超算平台容器性能的方法,为使用者有针对性地进行系统配置、合理设计应用程序提供依据。  相似文献   
4.
5.
K-栅栏覆盖是无线传感器网络覆盖控制的研究热点之一。本文构建了强栅栏覆盖模型,提出了分区强K-栅栏覆盖构建算法PMNSB,用最少的节点形成强栅栏。首先把监控区域分成多个子区域,通过匈牙利算法选用移动距离之和最少的网格集合为基准1-栅栏覆盖,缺少移动节点的子区域,选择附近区域的剩余移动节点修补形成1-栅栏覆盖。水平相邻的两个子区域之间构建竖直栅栏,这些1-栅栏合起来构成强K-栅栏覆盖。仿真结果证明了该方法的有效性,本文的研究对提升无线传感器网络的性能具有重要的理论与实际意义。  相似文献   
6.
针对基于最小方差的性能评价准则由于只考虑时滞引起的性能限制,不适合对PID控制回路进行性能评价的问题,本文采用PID能实现最小方差控制准则,对四水箱控制系统进行性能分析,得到的性能指标比传统最小方差准则明显提高,控制器参数大大改善了过程的输出方差。实验表明,PID能实现最小方差准则能够为PID控制器的性能评价提供一个合理的评价基准,更说明其对特定类型控制器性能评价所具有的实际意义。  相似文献   
7.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
8.
The search for food stimulated by hunger is a common phenomenon in the animal world. Mimicking the concept, recently, an optimization algorithm Hunger Games Search (HGS) has been proposed for global optimization. On the other side, the Whale Optimization Algorithm (WOA) is a commonly utilized nature-inspired algorithm portrayed by a straightforward construction with easy parameters imitating the hunting behavior of humpback whales. However, due to minimum exploration of the search space, WOA has a high chance of trapping into local solutions, and more exploitation leads it towards premature convergence. The concept of hunger from HGS is merged with the food searching techniques of the whale to lessen the inherent drawbacks of WOA. Two weights of HGS are adaptively designed for every whale using the respective hunger level for balancing search strategies. Performance verification of the proposed hunger search-based whale optimization algorithm (HSWOA) is done by comparing it with 10 state-of-the-art algorithms, including three very recently developed algorithms on 30 classical benchmark functions. Comparison with some basic algorithms, recently modified algorithms, and WOA variants is performed using IEEE CEC 2019 function set. Statistical performance of the proposed algorithm is verified with Friedman's test, boxplot analysis, and Nemenyi multiple comparison test. The operating speed of the algorithm is determined and tested with complexity analysis and convergence analysis. Finally, seven real-world engineering problems are solved and compared with a list of metaheuristic algorithms. Numerical and statistical performance comparison with state-of-the-art algorithms confirms the efficacy of the newly designed algorithm.  相似文献   
9.
提出了一种新的适用于处理器的硅前性能验证平台的基准程序实现方法.方法的主要思想是利用现成的广泛使用的测试程序集合,通过降低工作负载,采用基于基本块的划分、归并方式,将多个基于相同特征点的代码片段作为一个基准检测点,这些抽象的检测点构成了基准程序库.该方法将复杂的处理器内部行为的一致性判断转换为性能的宏观统计分析,充分利用了已有的权威测试基准集,无需重新编写性能验证平台的基准程序,既扩大了验证程序的规模,又节省了大量的劳动,同时可以针对验证样本通过分析系统自动展开验证工作,减少了人工核对的工作量.  相似文献   
10.
基于PageRank的计算机性能评价方法   总被引:1,自引:0,他引:1       下载免费PDF全文
赵波 《计算机工程》2010,36(17):286-287,290
现有选择性计算机性能评价方法主要使用基准程序评价方法,基准程序中各子程序的输出往往因为单位不同而无法进行进一步数据处理,同时基准程序评价方法广泛采用的权重和评分方法缺乏理论依据。针对该问题,提出基于佩奇排名(PageRank)的计算机性能评价方法,采用比较数据序列间相似性的方法产生邻接矩阵从而为各项评估功能计算PageRank得分。实验结果表明,该方法能客观反映目标计算机系统的性能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号