首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   1篇
  国内免费   4篇
工业技术   63篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   2篇
  2017年   6篇
  2016年   4篇
  2015年   2篇
  2014年   2篇
  2013年   3篇
  2012年   6篇
  2011年   4篇
  2010年   5篇
  2009年   4篇
  2008年   4篇
  2007年   1篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   3篇
  1997年   2篇
  1996年   3篇
  1994年   1篇
排序方式: 共有63条查询结果,搜索用时 16 毫秒
1.
2.
The success of several constraint-based modeling languages such as OPL, ZINC or COMET, appeals for better software engineering practices, particularly in the testing phase. This paper introduces a testing framework enabling automated test case generation for constraint programming. We propose a general framework of constraint program development which supposes that a first declarative and simple constraint model is available from the problem specifications analysis. Then, this model is refined using classical techniques such as constraint reformulation, surrogate, redundant, implied, global constraint and symmetry-breaking to form an improved constraint model that must be thoroughly tested before being used to address real-sized problems. We think that most of the faults are introduced in this refinement step and propose a process which takes the first declarative model as an oracle for detecting non-conformities and derive practical test purposes from this process. We implemented this approach in a new tool called CPTEST that was used to automatically detect non-conformities on classical benchmark programs, such as the Golomb rulers, n-queens, social golfer and the car-sequencing problems.  相似文献   
3.
Mobile nodes in ad hoc networks move freely and run out of battery power so quickly, which leads to frequent network partitioning. Network partitioning considerably reduces service availability when the server node is not in the same partition as the client nodes. In order to provide a continuous service availability for all mobile nodes, we propose a self-stabilizing algorithm that can tolerate multiple concurrent topological changes and can incur a cost of one server per long-lived connected component. By using (1) the time interval-based computations concept that distinguishes between disjoint and concurrent computations, and (2) Markov chain model, the proposed algorithm can within a finite time converge to a legitimate state even if topological changes occur during the convergence time. Our simulation results show that the algorithm can ensure very high service availability, and each node has a strong path to the server of its network component over 98% of the time.  相似文献   
4.
The structure, morphology, and magnetic properties of the mechanically alloyed iron manganese phosphides (Fe1?x Mn x )2P with 0.15 ≤ x ≤ 0.75 (Mn/Fe ratio = 0.17, 0.33, 0.66, and 3) have been studied by means of X-ray diffraction, scanning electron microscopy coupled with energy-dispersive X-ray spectrometry, and BS1 and BS2 magnetometry. The powder form (Fe1?x Mn x )2P compounds exhibit multiphase structures that contain Fe(Mn)-type solid solution and Fe2P-type, Mn2P-type, Fe3P-type, and MnP/FeP-type phosphides. The magnetization versus temperature reveals the existence of multiple magnetic phase transitions. The saturation magnetization, coercivity, and squarness M r/M s ratio values are discussed as a function of both the Mn content and the temperature. From the approach to saturation magnetization studies, several fundamental magnetic parameters were extracted. The local magnetic anisotropy constant K 1 was determined.  相似文献   
5.
Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that more than 70% of energy is consumed in data transmission in WSN. Since most of the time, the sensed information is redundant due to geographically collocated sensors, most of this energy can be saved through data aggregation. Furthermore, data aggregation improves bandwidth usage and reduces collisions due to interference. Unfortunately, while aggregation eliminates redundancy, it makes data integrity verification more complicated since the received data is unique.  相似文献   
6.
This paper considers a supply chain management problem which integrates production, inventory, and distribution decisions. The supply chain is composed of one supplier production facility and several retailers located in a given geographic region. The supplier is responsible for the production and the replenishment of the inventory of retailers, in a vendor managed inventory (VMI) context. The distance between retailers is negligible compared to the distance between the supplier and the retailers’ region. Thus, for each vehicle, there is a major fixed cost for traveling to the cluster of retailers and a minor fixed cost for visiting each individual retailer. The problem consists of determining quantities to be produced, quantities to be delivered to retailers, vehicles to be used, and retailers to be serviced by each vehicle. This problem is an extension of the one warehouse multi-retailer problem with the consideration of production planning and storage and vehicle capacity limitations in addition to fixed vehicle utilization costs and retailer servicing costs. The objective is to minimize a total cost composed of production, transportation, and inventory holding costs at the supplier and at the retailers. Two mixed integer linear programming formulations are proposed and six families of valid inequalities are added to strengthen these formulations. Two of these families are new and the others are adapted from the literature. The numerical results show that the valid inequalities considerably improve the quality of the formulations. Moreover, the parameters that influence the most computational times are analyzed.  相似文献   
7.
In this paper we deal with misbehaving nodes in mobile ad hoc networks (MANETs) that drop packets supposed to be relayed, whose purpose may be either saving their resources or launching a DoS attack. We propose a new solution to monitor, detect, and safely isolate such misbehaving nodes, structured around five modules: (i) The monitor, responsible for controlling the forwarding of packets, (ii) the detector, which is in charge of detecting the misbehaving of monitored nodes, (iii) the isolator, basically responsible for isolating misbehaving nodes detected by the detector, (iv) the investigator, which investigates accusations before testifying when the node has not enough experience with the accused, and (v) finally the witness module that responds to witness requests of the isolator. These modules are based on new approaches, aiming at improving the efficiency in detecting and isolating misbehaving nodes with a minimum overhead. We describe these modules in details, and their interactions as well. We also mathematically analyze our solution and assess its performance by simulation, and compare it with the watchdog, which is a monitoring technique employed by almost all the current solutions.  相似文献   
8.
Aotus lemurinus monkeys were immunized with pools of either lipid-tailed peptides injected in PBS or peptides in Montanide ISA-51, all derived from four Plasmodium falciparum pre-erythrocytic antigens, namely, LSA1, LSA3, SALSA, and STARP. These formulations were well tolerated. Their immunogenicity was demonstrated by the induction of both B- and T-cell responses to most of the peptides studied (of the 12, 10 induced antibody production, 9 induced T-cell proliferative responses, and all 12 induced gamma interferon secretion). Immune responses proved to be long lasting, since some were still detectable 210 days after immunization. Of particular importance is the fact that B- and T-cell responses elicited in this way by synthetic peptides were specific for native parasite proteins on P. falciparum sporozoites and liver stage parasites.  相似文献   
9.
The silica fume (SF) is used in civil engineering, in particular for the manufacture of high performance concrete.In order to better understand the gain in strength of the concretes containing SF, the microstructural aspect has been examined.Mixtures of SF–Lime pastes present a hydraulic setting which is due to the formation of a C–S–H phase (calcium silicate hydrate). The latter is semi-crystallized. It is characterized by the lines of X-ray diffraction, hk0 such as: 3,06 Å (220), 2,80 Å (400) and 1,83 Å (040).The mix design SF–Lime paste is thus a simplified approach of that of the mixtures SF–OPC in which the main reaction is the fixation, by the SF, of lime coming from the hydration of C3S in the form of C–S–H.Tests have been carried out on two varieties of SF resulting from the same furnace with the presence of lime or Portland cement. The results show that the presence of certain impurities, by their actions on the solubility of silica plays a significant role on the evolution of the hydration of the principal components of Portland cements and the kinetics of lime fixation by the SF.Among the impurities contained in the SF, carbon delays considerably the hydration of the principal components of Portland cement (C3S and C3A) as well as the pozzolanic reactivity of the silica fume without removing it.  相似文献   
10.
This work aims to determine the characteristic PN junction diode, subject to a reverse polarization, while I (breakdown voltage) of the inverse current in a GaAs specifying the parameters that influence the breakdown voltage of the diode. In this work, we simulated the behavior of the ionization phenomenon by impact breakdown by avalanche of the PN junctions, subject to an inverse polarization. We will take into account both the trapping model in a stationary regime in the P+N structure using like material of basis the Ⅲ-Ⅴ compounds and mainly the GaAs semi-insulating in which the deep centers have in important densities. We are talking about the model of trapping in the space charge region (SCR) and that is the trap density donor and acceptor states. The carrier crossing the space charge region (SCR) of W thickness creates N electron-hole pairs: for every created pair, the electron and the hole are swept quickly by the electric field, each in an opposite direction, which comes back, according to an already accepted reasoning, to the crossing of the space charge region (SCR) by an electron or a hole. So the even N pair created by the initial particle provoke N2 ionizations and so forth. The study of the physical and electrical behaviour of semiconductors is based on the influence of the presence of deep centers on the characteristic I(V) current-tension, which requires the calculation of the electrostatic potential, the electric field, the integral of ionization, the density of the states traps, the diffusion current of minority in the regions (1) and (3), the current thermal generation in the region (2), the leakage current in the surface, and the breakdown voltage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号