首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   332篇
  免费   25篇
  国内免费   4篇
工业技术   361篇
  2024年   4篇
  2023年   8篇
  2022年   16篇
  2021年   27篇
  2020年   12篇
  2019年   16篇
  2018年   22篇
  2017年   20篇
  2016年   15篇
  2015年   25篇
  2014年   16篇
  2013年   40篇
  2012年   16篇
  2011年   33篇
  2010年   15篇
  2009年   17篇
  2008年   9篇
  2007年   9篇
  2006年   6篇
  2005年   1篇
  2004年   2篇
  2003年   3篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1991年   3篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1984年   1篇
  1982年   1篇
  1976年   1篇
排序方式: 共有361条查询结果,搜索用时 10 毫秒
101.
102.
Optimization of sustainable process plant configurations requires the use of systematic assessment methods based on the usage of natural resources, release of pollutants and generation of environmental impact. This paper presents an integrated life cycle optimization framework for the synthesis of microalgae cultivation systems, using a multiple objective linear program formulation; in the model, individual objective functions are aggregated and weighted using the analytic hierarchy process. Four different cultivation alternatives were used as case study to demonstrate the capability of this formulated integrated model. The model takes into account three main environmental criteria in assessing different cultivation alternatives, namely energy, water (direct and indirect water) and carbon footprints. It is determined in the case study that the open pond cultivation system is preferred compared to other alternatives.  相似文献   
103.
In Wuhan, China, a novel Corona Virus (COVID-19) was detected in December 2019; it has changed the entire world and to date, the number of diagnosed cases is 38,756,2891 and 1,095,2161 people have died. This happened because a large number of people got affected and there is a lack of hospitals for COVID-19 patients. One of the precautionary measures for COVID-19 patients is isolation. To support this, there is an urgent need for a platform that makes treatment possible from a distance. Telemedicine systems have been drastically increasing in number and size over recent years. This increasing number intensifies the extensive need for telemedicine for the national healthcare system. In this paper, we present Tele-COVID which is a telemedicine application to treat COVID-19 patients from a distance. Tele-COVID is uniquely designed and implemented in Service-Oriented Architecture (SOA) to avoid the problem of interoperability, vendor lock-in, and data interchange. With the help of Tele-COVID, the treatment of patients at a distance is possible without the need for them to visit hospitals; in case of emergency, necessary services can also be provided.  相似文献   
104.
105.
Over the past decade, an increasing number of efficient algorithms have been proposed to mine frequent patterns by satisfying the minimum support threshold. Generally, determining an appropriate value for minimum support threshold is extremely difficult. This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. Recently, a few efficient interactive mining algorithms have been proposed, which are able to capture the content of transaction database to eliminate possibility of the database rescanning. In this paper, we propose a new method based on prime number and its characteristics mainly for interactive mining of frequent patterns. Our method isolates the mining model from the mining process such that once the mining model is constructed; it can be frequently used by mining process with various minimum support thresholds. During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. The experimental results verify the efficiency of our method for interactive mining of frequent patterns.  相似文献   
106.
Based on a Belief-Action-Outcome framework, we produced a model that shows senior managers’ perception of both the antecedents to and the consequences of Green IS adoption by a firm. This conceptual model and its associated hypotheses were empirically tested using a dataset generated from a survey of 405 organizations. The results suggest that coercive pressure influences the attitude toward Green IS adoption while mimetic pressure does not. In addition, we found that there was a significant relationship between Green IS adoption, attitude, and consideration of future consequences. Finally, we found that only long term Green IS adoption was positively related to environmental performance.  相似文献   
107.
The clustering ensemble has emerged as a prominent method for improving robustness, stability, and accuracy of unsupervised classification solutions. It combines multiple partitions generated by different clustering algorithms into a single clustering solution. Genetic algorithms are known as methods with high ability to solve optimization problems including clustering. To date, significant progress has been contributed to find consensus clustering that will yield better results than existing clustering. This paper presents a survey of genetic algorithms designed for clustering ensembles. It begins with the introduction of clustering ensembles and clustering ensemble algorithms. Subsequently, this paper describes a number of suggested genetic-guided clustering ensemble algorithms, in particular the genotypes, fitness functions, and genetic operations. Next, clustering accuracies among the genetic-guided clustering ensemble algorithms is compared. This paper concludes that using genetic algorithms in clustering ensemble improves the clustering accuracy and addresses open questions subject to future research.  相似文献   
108.
The Journal of Supercomputing - Efficient task scheduling is required to attain high performance in both homogeneous and heterogeneous computing systems. An application can be considered as a task...  相似文献   
109.
This paper presents, from a practical viewpoint, an investigation of real-time actuator fault detection, propagation and accommodation in distillation columns. Addressing faults in industrial processes, coupled with the growing demand for higher performance, improved safety and reliability necessitates implementation of less complex alternative control strategies in the events of malfunctions in actuators, sensors and or other system components. This work demonstrates frugality in the design and implementation of fault tolerant control system by integrating fault detection and diagnosis techniques with simple active restructurable feedback controllers and with backup feedback signals and switchable reference points to accommodate actuator fault in distillation columns based on a priori assessed control structures. A multivariate statistical process monitoring based fault detection and diagnosis technique through dynamic principal components analysis is integrated with one-point control or alternative control structure for prompt and effective fault detection, isolation and accommodation. The work also investigates effects of disturbances on fault propagation and detection. Specifically, the reflux and vapor boil-up control strategy used for a binary distillation column during normal operation is switched to one point control of the more valued product by utilizing the remaining healthy actuator. The proposed approach was implemented on two distillation processes: a simulated methanol-water separation column and the benchmark Shell standard heavy oil fractionation process to assess its effectiveness.  相似文献   
110.
Malware, in essence, is an infiltration to one’s computer system. Malware is created to wreak havoc once it gets in through weakness in a computer’s barricade. Anti-virus companies and operating system companies are working to patch weakness in systems and to detect infiltrators. However, with the advance of fragmentation, detection might even prove to be more difficult. Malware detection relies on signatures to identify malware of certain shapes. With fragmentation, functionality and size can change depending on how many fragments are used and how the fragments are created. In this paper we present a robust malware detection technique, with emphasis on detecting fragmentation malware attacks in RFID systems that can be extended to detect complex obfuscated and mutated malware. After a particular fragmented malware has been first identified, it can be analyzed to extract the signature, which provides a basis for detecting variants and mutants of similar types of malware in the future. Encouraging experimental results on a limited set of recent malware are presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号