首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113篇
  免费   7篇
工业技术   120篇
  2023年   1篇
  2021年   2篇
  2020年   2篇
  2019年   2篇
  2018年   1篇
  2017年   3篇
  2016年   6篇
  2015年   2篇
  2014年   6篇
  2013年   7篇
  2012年   12篇
  2011年   8篇
  2010年   10篇
  2009年   6篇
  2008年   8篇
  2007年   5篇
  2006年   9篇
  2005年   5篇
  2004年   1篇
  2003年   3篇
  2002年   4篇
  2000年   1篇
  1998年   2篇
  1997年   1篇
  1995年   2篇
  1994年   3篇
  1992年   1篇
  1991年   2篇
  1989年   1篇
  1987年   1篇
  1982年   1篇
  1977年   1篇
  1968年   1篇
排序方式: 共有120条查询结果,搜索用时 625 毫秒
1.
We investigate the class ofstationary or partial stable models of normal logic programs. This important class of models includes all (total)stable models, and, moreover, thewell-founded model is always its smallest member. Stationary models have several natural fixed-point definitions and can be equivalently obtained as expansions or extensions of suitable autoepistemic or default theories. By taking a particular subclass of this class of models one can obtain different semantics of logic programs, including the stable semantics and the well-founded semantics. Stationary models can be also naturally extended to the class of all disjunctive logic programs. These features of stationary models designate them as an important class of models with applications reaching far beyond the realm of logic programming.Partially supported by the National Science Foundation grant #IRI-9313061.  相似文献   
2.
The main purpose of this study is to evaluate the computational efficiency of algorithms for calculating shortest paths when they are correctly coded by using the C programming language. The eight algorithms that we selected for this experiment are the most efficient, either measured in terms of worst-case bounds or marked as such from previous computational studies; they include the redistributive heap algorithm. We suggest computer implementations that use the full power of C. In particular, the network representation and the various data structures used to keep the scan eligible list may be managed by using only additions and no multiplications, while it is not possible with FORTRAN. These capabilities, unique to C, yield several interesting conclusions: one may expect to speed up a shortest path algorithm by a factor of 20%; in some cases, this factor may reach 30%. Interestingly, the level of programming difficulty required to achieve these benefits is not greater than that required by implementations using arrays.  相似文献   
3.
In this paper, we introduce two algorithms to address the two-echelon capacitated location-routing problem (2E-CLRP). We introduce a branch-and-cut algorithm based on the solution of a new two-index vehicle-flow formulation, which is strengthened with several families of valid inequalities. We also propose an adaptive large-neighbourhood search (ALNS) meta-heuristic with the objective of finding good-quality solutions quickly. The computational results on a large set of instances from the literature show that the ALNS outperforms existing heuristics. Furthermore, the branch-and-cut method provides tight lower bounds and is able to solve small- and medium-size instances to optimality within reasonable computing times.  相似文献   
4.
Often in the engineering practice, cutting tools bounded by primary peripheral surfaces of revolution are used because of their effectiveness. Among these, ring and tangential tools can be used for the generation of constant pitch cylindrical helical surfaces. In this paper, we present an algorithm for the profiling of these types of tools. The algorithm is based on the topological representation of the tool’s primary peripheral surface. The main goal is to devise a methodology for the profiling of tools whose surfaces are reciprocally enveloping with cylindrical helical surfaces. We present a numerical example for the numerical determination of the axial section form for this type of tools. The application method for this algorithm was developed in the CATIA graphical design environment within which the procedure is developed as a vertical application. In addition, we present a solution for the shape correction of the tool’s axial cross-section by considering the existence of singular points on the profile of the helical surface to be generated where multiple normals to the surface exist.  相似文献   
5.
Earth observation data processing and storing can be done nowadays only using distributed systems. Experiments dealing with a large amount of data are possible within the timeframe of a lesson and can give trainees the freedom to innovate. Following these trends and ideas, we have built a proof-of-the-concept platform, named GiSHEO, for Earth observation educational tasks. It uses Grid computing technologies to analyze and store remote sensing data, and combines them with eLearning facilities. This paper provides an overview of the GiSHEO's platform architecture and of its technical and innovative solutions.  相似文献   
6.
3D graphical method for profiling gear hob tools   总被引:1,自引:1,他引:0  
This paper approaches the issue of profiling gear hob bounded by a cylindrical helical surface with constant pitch, reciprocally enveloping with an ordered surfaces curl. The process kinematics of generation reproduces the 3D gear between the worm and the wheel. This gear has crossing axes and it is used for the profiling of the primary peripheral surface of the gear hub in the intermediary surface method (the common rack-gear of the surfaces curl to be generated and the primary peripheral surface of the gear hob). An algorithm in the CATIA design environment is presented, based onto an original method for the determination of the reference rack-gear form—the rack-gear reciprocally enveloping with the surfaces curl, using the principle of the cylindrical helical motion decomposition in translation and rotation motions. Graphical and analytical profiling examples are presented for the gear hob for generation of a parallel spline shaft and for the generation of a toothed wheel with involute teeth. Solutions for the interference problems, problems due to the singular points onto the profiles, are presented.  相似文献   
7.
Two-stage oxidation using tracers of the oxidizing medium The mechanism of scaling can be determined using a two stage oxidation method; according to this method an isotope is added to the oxidizing medium in the second stage of the oxidation. If the isotope is radioactive, the result is evaluated by autoradiography (e. g. S, Cl, Br), otherwise mass spectroscopy is used (e. g. oxygen). Depending on the nature of the diffusion processes – diffusion of metal through the scale to the surface, or diffusion of the attacking medium through the scale to the core metal – one obtains typical concentration gradients of the isotope within the scale layer; beyond that, information is obtained concerning diffusion paths (pores, lattice defects). Experiments described include sulfidation of Ni, CuZn, Ag.  相似文献   
8.
In this paper, we address the issue of computing fast lower bounds for the Bin Packing problem, i.e., bounds that have a computational complexity dominated by the complexity of ordering the items by non-increasing values of their volume. We introduce new classes of fast lower bounds with improved asymptotic worst-case performance compared to well-known results for similar computational effort. Experimental results on a large set of problem instances indicate that the proposed bounds reduce both the deviation from the optimum and the computational effort.  相似文献   
9.
This article presents a series of preliminary results regarding the electrodeposition of bismuth, tellurium, and bismuth telluride films at 60 °C from ionic liquids, containing a mixture of choline chloride and oxalic acid (ChCl–OxA). Ten millimolar concentration solutions of BiCl3 and TeO2 were used as precursors in this supporting electrolyte. Cyclic voltammetry and electrochemical impedance spectroscopy techniques were used to demonstrate the deposition processes on Pt and Cu electrodes. Long-time electrolyses (30–120 min) performed at 60 °C with potential control (between ?0.22 and ?0.37 V vs. Ag reference electrode) have resulted in films deposited on copper substrate. Film surfaces were studied by scanning electron microscopy and analyzed by energy dispersive X-ray spectroscopy. The results of this study show that ChCl–OxA ionic liquid may be considered as a promising substitute of aqueous baths for Bi, Te or Bi2Te3 film plating.  相似文献   
10.
With the exponential growth of malware in the last 5 years, the number of polymorphic malware increased as well. The aim of this paper is to describe the evolution throughout a year of four major malware families (FakeAlert, Sirefef, ZBot and Vundo). The analysis has been made in terms of polymorphic mechanisms with regards to the polymorphic mechanisms (such as changes in the packer module, changes in the geometry of file, variation of version information from the resource directory or different methods used to modify the icon of one file) which have been used in order to avoid their detection by anti-malware systems. The malware files were collected every week throughout one year’s time. For each family we have recorded the new variants and the updates that were added to the old ones in order to avoid detection. We have managed to examine more than 1,000 new versions of such files. The current article includes an additional study case. The latter focuses on the methods that have been used by the FakeAlert malware family in order to modify their icons.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号