全文获取类型
收费全文 | 370篇 |
免费 | 1篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 1篇 |
综合类 | 7篇 |
化学工业 | 3篇 |
金属工艺 | 7篇 |
机械仪表 | 56篇 |
建筑科学 | 6篇 |
矿业工程 | 3篇 |
能源动力 | 4篇 |
轻工业 | 1篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 6篇 |
一般工业技术 | 13篇 |
冶金工业 | 39篇 |
自动化技术 | 224篇 |
出版年
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 3篇 |
2019年 | 1篇 |
2018年 | 3篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 4篇 |
2014年 | 11篇 |
2013年 | 8篇 |
2012年 | 10篇 |
2011年 | 19篇 |
2010年 | 18篇 |
2009年 | 15篇 |
2008年 | 21篇 |
2007年 | 16篇 |
2006年 | 20篇 |
2005年 | 21篇 |
2004年 | 15篇 |
2003年 | 18篇 |
2002年 | 21篇 |
2001年 | 19篇 |
2000年 | 16篇 |
1999年 | 16篇 |
1998年 | 14篇 |
1997年 | 5篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 7篇 |
1993年 | 10篇 |
1992年 | 11篇 |
1991年 | 8篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
排序方式: 共有373条查询结果,搜索用时 15 毫秒
1.
Redundancy allocation problem (RAP) is one of the best-developed problems in reliability engineering studies. This problem follows to optimize the reliability of a system containing s sub-systems under different constraints, including cost, weight, and volume restrictions using redundant components for each sub-system. Various solving methodologies have been used to optimize this problem, including exact, heuristic, and meta-heuristic algorithms. In this paper, an efficient multi-objective meta-heuristic algorithm based on simulated annealing (SA) is developed to solve multi-objective RAP (MORAP). This algorithm is knowledge-based archive multi-objective simulated annealing (KBAMOSA). KBAMOSA applies a memory matrix to reinforce the neighborhood structure to achieve better quality solutions. The results analysis and comparisons demonstrate the performance of the proposed algorithm for solving MORAP. 相似文献
2.
Modeling molecular interactions in signalling networks is important from various perspectives such as predicting side effects
of drugs, explaining unusual cellular behavior and drug and therapy design. Various formal languages have been proposed for
representing and reasoning about molecular interactions. The interactions are modeled as triggered events in most of the approaches.
The triggering of events is assumed to be immediate: once an interaction is triggered, it should occur immediately. Although
working well for engineering systems, this assumption poses a serious problem in modeling biological systems. Our knowledge
about biological systems is inherently incomplete, thus molecular interactions are constantly elaborated and refined at different
granularity of abstraction. The model of immediate triggers can not consistently deal with this refinement. In this paper
we propose an action language to address this problem. We show that the language allows for refinements of biological knowledge,
although at a higher cost in terms of complexity.
相似文献
3.
Yacine Rezgui 《Canadian Metallurgical Quarterly》2006,20(4):261-270
The paper argues that an effective solution to information and knowledge management (KM) needs of practitioners in the construction industry can be found in the provision of an adapted knowledge environment that makes use of user profiling and document summarization techniques based on information retrieval sciences. The conceptualization of the domain through ontology takes a pivotal role in the proposed knowledge environment and provides a semantic referential to ensure relevance, accuracy, and completeness of information. A set of KM services articulated around the selected ontology have been developed, using the Web services model, tested, and validated in real organizational settings. This provided the basis for formulating recommendations and key success factors for any KM project development. 相似文献
4.
5.
6.
为了实现回转体零件挤压模具的快速设计,减少不必要的重复性工作,通过变量化建模和装配技术,并结合人工智能技术和多变性设计技术,在UG/NX平台上开发了回转体零件的挤压模具智能设计系统,实例研究表明所建立的系统是有效的。 相似文献
7.
Asaf Shabtai Author Vitae Uri Kanonov Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(8):1524-1537
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average). 相似文献
8.
In this study, we are concerned with system modeling which involves limited data and reconciles the developed model with some previously acquired domain knowledge being captured in the format of already constructed models. Each of these previously available models was formed on a basis of extensive data sets which are not available for the current identification pursuits. To emphasize the nature of modeling being guided by the reconciliation mechanisms, we refer to this mode of identification as experience-consistent modeling. The paper presents the conceptual and algorithmic framework by focusing on regression models. By forming a certain extended form of the performance index, it is shown that the domain knowledge captured by regression models can play a similar role as a regularization component used quite commonly in system identification. Experimental results involve both synthetic low-dimensional data and selected data coming from Machine Learning repository. The data used in the experiments tackle regression models as well as classification problems (two-class classifiers). 相似文献
9.
RMAIN: Association rules maintenance without reruns through data 总被引:1,自引:0,他引:1
Damian Dudek 《Information Sciences》2009,179(24):4123-5213
Association rules are well recognised as a data mining tool for analysis of transactional data, currently going far beyond the early basket-based applications. A wide spectrum of methods for mining associations have been proposed up to date, including batch and incremental approaches. Most of the accurate incremental methods minimise, but do not completely eliminate reruns through processed data. In this paper we propose a new approximate algorithm RMAIN for incremental maintenance of association rules, which works repeatedly on subsequent portions of new transactions. After a portion has been analysed, the new rules are combined with the old ones, so that no reruns through the processed transactions are performed in the future. The resulting set of rules is kept similar to the one that would be achieved in a batch manner. Unlike other incremental methods, RMAIN is fully separated from a rule mining algorithm and this independence makes it highly general and flexible. Moreover, it operates on rules in their final form, ready for decision support, and not on intermediate representation (frequent itemsets), which requires further processing. These features make the RMAIN algorithm well suited for rule maintenance within knowledge bases of autonomous systems with strongly bounded resources and time for decision making. We evaluated the algorithm on synthetic and real datasets, achieving promising results with respect to either performance or quality of output rules. 相似文献
10.
K. L. Poh 《Knowledge and Information Systems》2000,2(3):340-358
We present an intelligent decision support system that combines decision analysis and traditional investment evaluation and
analysis. The system brings to the ordinary user expertise in both decision analysis and investment evaluation techniques,
as well as domain knowledge about the market. The system supports the entire decision analysis cycle and provides facilities
and tools for decision modeling, probability assessment, model evaluation, and sensitivity analysis. An example based on the
Shanghai Stock Market is presented. We demonstrate how an investment decision model for the stock market is constructed by
the system and how the optimal decision is obtained. Sensitivity and value of information analysis were also carried out by
the system.
Received 12 April 1999 / Revised 8 February 2000 / Accepted 2 March 2000 相似文献