首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   25篇
工业技术   286篇
  2024年   2篇
  2023年   5篇
  2022年   10篇
  2021年   18篇
  2020年   16篇
  2019年   14篇
  2018年   25篇
  2017年   20篇
  2016年   24篇
  2015年   15篇
  2014年   13篇
  2013年   35篇
  2012年   15篇
  2011年   16篇
  2010年   14篇
  2009年   7篇
  2008年   7篇
  2007年   4篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   5篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1997年   2篇
  1983年   1篇
  1982年   2篇
  1980年   1篇
排序方式: 共有286条查询结果,搜索用时 15 毫秒
1.
Given a set S of sites and a set O of weighted objects, an optimal location query finds the location(s) where introducing a new site maximizes the total weight of the objects that are closer to the new site than to any other site. With such a query, for instance, a franchise corporation (e.g., McDonald’s) can find a location to open a new store such that the number of potential store customers (i.e., people living close to the store) is maximized. Optimal location queries are computationally complex to compute and require efficient solutions that scale with large datasets. Previously, two specific approaches have been proposed for efficient computation of optimal location queries. However, they both assume p-norm distance (namely, L1 and L2/Euclidean); hence, they are not applicable where sites and objects are located on spatial networks. In this article, we focus on optimal network location (ONL) queries, i.e., optimal location queries in which objects and sites reside on a spatial network. We introduce two complementary approaches, namely EONL (short for Expansion-based ONL) and BONL (short for Bound-based ONL), which enable efficient computation of ONL queries with datasets of uniform and skewed distributions, respectively. Moreover, with an extensive experimental study we verify and compare the efficiency of our proposed approaches with real world datasets, and we demonstrate the importance of considering network distance (rather than p-norm distance) with ONL queries.  相似文献   
2.
Crystalline α- and γ-Al2O3 exhibit in many applications high wear resistance, chemical resistance, and hot hardness, making them interesting materials for production engineering. To synthesize α-Al2O3 with high coating thickness of s ≥ 10 μm, chemical vapor deposition at temperatures T > 1000 °C is well established. However, there are almost no studies dealing with the synthesis of thick α-Al2O3 by physical vapor deposition (PVD) at high temperatures T > 700 °C. High-temperature deposition of thick coatings can be realized by means of the dense hollow cathode plasma, combined with the transport function of the plasma gas in high-speed (HS) PVD. Herein, crystalline α- and γ-Al2O3 films are deposited on cemented carbides at substrate temperatures T s ≈ 570 °C and T s ≈ 780 °C by HS-PVD. These coatings exhibit a thickness up to s = 20 μm. Moreover, phase analysis presents α-phases in coatings synthesized at substrate temperature of T s ≈ 780 °C with significant higher hardness than films by T s ≈ 570 °C. These release the potential of HS-PVD to synthesize α-Al2O3 coatings with high thickness. Thereby, a higher thickness of these coatings is beneficial for the wear protection of turning and die casting tools.  相似文献   
3.
A facile method for the synthesis of thermotropic liquid crystalline cholesteryl cetyl ether (CCE) was carried out from cholesterol and cetyl alcohol using montmorillonite K-10 as an acid catalyst. The aim of this study was to investigate the use of liquid crystalline blends of CCE and cholesteryl oleyl carbonate (COC) with appropriate crystal to smectic phase temperature (T c?Cs) just above body temperature as a temperature-modulated drug permeation system. Using 30/70?mol ratio of COC/CCE, a mixture of desirable phase transition temperature was obtained. The phase transition behavior of COC/CCE binary liquid crystalline mixture was established by differential scanning calorimetry and polarizing optical microsopy. The COC/CCE-embedded cellulose nitrate membrane was used by an in vitro drug penetration studies. Paracetamol and mesalazine were chosen as hydrophobic and hydrophilic drug models, respectively. Paracetamol permeability through the membrane was higher at temperatures above the phase transition of liquid crystal (LC) blends (39?°C) than its permeability below the phase transition temperature of liquid crystal blends (30?°C). The drug penetration through LC-embedded cellulose membrane was influenced by the pore size of the membrane and therefore the adsorbed amount of LC. There was no penetration of mesalazine through that membrane presumably, due to the differences in hydrophilicity of LC-embedded membrane and permeated drug.  相似文献   
4.
5.
6.
The qualitative properties of processed cheese (PC) fortified with different levels of asparagus powder (AP) (0.5%, 1% and 1.5% wt/wt) were evaluated during storage. AP decreased the pH and lipolysis indexes and increased the phenolic content, antioxidant activity and proteolysis of the processed cheeses. AP made the structure of the cheese more elastic, increased the rigidity and decreased the spreadability compared with the control sample, which corresponded to the results obtained using dynamic oscillatory rheometry. The results showed that AP as a rich source of bioactive components could be used for the fortification of processed cheeses.  相似文献   
7.
City logistics is one of the significant branches of supply chain management, dealing with the logistics and transportation activities in urban areas. This research area has recently appropriated an exponential growth of publications. This paper presents a bibliometric analysis along with a systematic literature review to organise the results of surveying more than 370 papers and research works published since 2010. We identify the top contributing research topics. The most common keywords used in the city logistics literature are referred to in order to propose six research categories identifying the main innovative research perspectives.  相似文献   
8.
In traditional approach, failure mode and effects analysis determines the risk priories of failure modes through the risk priority number which is determined by multiplication of three risk factors namely, failure occurrence (O), failure severity (S) and failure detection ability (D). In this approach, different weights of risk factors were not taken into consideration so that the three risk factors were assumed to have the same weight. This may not be realistic in real applications. In this paper we treat the risk factors as fuzzy variables and evaluate them using fuzzy linguistic terms and fuzzy ratings. As a result, fuzzy risk priority numbers (FRPNs) are proposed for prioritization of failure modes. The FRPNs are defined as fuzzy geometric means of the fuzzy ratings for O, S and D and can be computed using alpha-level sets and linear programming models. A numerical example is provided to examine the results of this model.  相似文献   
9.
In recent years, due to their straightforward structure and efficiency, the chaos-based cryptographic algorithms have become a good candidate for image encryption. However, they still suffer from many weaknesses, such as insensitivity to the plain image, weak key streams, small key space, non-resistance to some attacks and failure to meet some security criteria. For this purpose in this paper, a novel hybrid image encryption algorithm named Hyper-chaotic Feeded GA (HFGA) is proposed to fill the gaps in two stages; initial encryption by using a hyper-chaotic system, and then outputs reinforcement by employing a customized Genetic Algorithm (GA). By applying an innovative technique, called gene-labelling, the proposed algorithm not only optimizes the preliminary encrypted images in terms of security criteria but also allows the legal receiver to easily and securely decrypt the optimized cipher image. In fact, in the first stage, besides unpredictable random sequences generated by a hyper-chaotic system, a new sensitive diffusion function is proposed which makes the algorithm resistant to differential attacks. In the second stage, the generated cipher images, which are labeled in a special way, will be used as the initial population of a GA which enhances randomness of the cipher images. The results of several experiments and statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for fast image encrypting as well as providing robustness against some well-known statistical attacks.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号