首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   157篇
  免费   4篇
  国内免费   1篇
工业技术   162篇
  2023年   2篇
  2022年   3篇
  2021年   7篇
  2020年   2篇
  2019年   2篇
  2018年   10篇
  2017年   9篇
  2016年   10篇
  2015年   8篇
  2014年   12篇
  2013年   19篇
  2012年   12篇
  2011年   11篇
  2010年   10篇
  2009年   4篇
  2008年   8篇
  2007年   11篇
  2006年   4篇
  2005年   4篇
  2004年   4篇
  2003年   2篇
  2002年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1994年   1篇
  1992年   1篇
排序方式: 共有162条查询结果,搜索用时 0 毫秒
1.
The paper argues that an effective solution to information and knowledge management (KM) needs of practitioners in the construction industry can be found in the provision of an adapted knowledge environment that makes use of user profiling and document summarization techniques based on information retrieval sciences. The conceptualization of the domain through ontology takes a pivotal role in the proposed knowledge environment and provides a semantic referential to ensure relevance, accuracy, and completeness of information. A set of KM services articulated around the selected ontology have been developed, using the Web services model, tested, and validated in real organizational settings. This provided the basis for formulating recommendations and key success factors for any KM project development.  相似文献   
2.
The migration from circuit-switched networks to packet-switched networks necessitates the investigation of related issues such as service delivery, QoS, security, and service fraud and misuse. The latter can be seen as a combination of accounting and security aspects. In traditional telecommunication networks, fraud accounts for annual losses at an average of 3%–5% of the operators’ revenue and still increasing at a rate of more than 10% yearly. It is also expected that in VoIP networks, the situation will be worse due to the lack of strong built-in security mechanisms, and the use of open standards. This paper discusses the fraud problem in VoIP networks and evaluates the related available solutions.  相似文献   
3.
The problem of reconstructing a pattern of an object from its approximate discrete orthogonal projections in a 2-dimensional grid, may have no solution because the inaccuracy in the measurements of the projections may generate an inconsistent problem. To attempt to overcome this difficulty, one seeks to reconstruct a pattern with projection values having possibly some bounded differences with the given projection values and minimizing the sum of the absolute differences.

This paper addresses the problem of reconstructing a pattern with a difference at most equal to +1 or −1 between each of its projection values and the corresponding given projection value. We deal with the case of patterns which have to be horizontally and vertically convex and the case of patterns which have to be moreover connected, the so-called convex polyominoes. We show that in both cases, the problem of reconstructing a pattern can be transformed into a Satisfiability (SAT) Problem. This is done in order to take advantage of the recent advances in the design of solvers for the SAT Problem. We show, experimentally, that by adding two important features to CSAT (an efficient SAT solver), optimal patterns can be found if there exist feasible ones. These two features are: first, a method that extracts in linear time an optimal pattern from a set of feasible patterns grouped in a generic pattern (obtaining a generic pattern may be exponential in the worst case) and second, a method that computes actively a lower bound of the sum of absolute differences that can be obtained from a partially defined pattern. This allows to prune the search tree if this lower bound exceeds the best sum of absolute differences found so far.  相似文献   

4.
5.
Tea is the second most consumed beverage in the world and its consumption has been associated with numerous potential health benefits. Factors such as fermentation methods, geographical origin and season can affect the primary and secondary metabolite composition of tea. In this study, a hydrophilic interaction liquid chromatography (HILIC) method coupled to high resolution mass spectrometry in both positive and negative ionisation modes was developed and optimised. The method when combined with principal component analysis to analyse three different types of tea, successfully distinguished samples into different categories, and provided evidence of the metabolites which differed between them. The accurate mass and high resolution attributes of the mass spectrometric data were utilised and relative quantification data were extracted post-data acquisition on 18 amino acids, showing significant differences in amino acid concentrations between tea types and countries. This study highlights the potential of HILIC chromatography combined with non-targeted mass spectrometric methods to provide a comprehensive understanding of polar metabolites in plant extracts.  相似文献   
6.
Contamination of public water ways with sewage represents a serious environmental and health risk. We monitored pollution of the river Thames by enumerating the indicator organism Escherichia coli. Samples were taken from a site in central London near Waterloo Bridge in different seasons. E. coli were quantified using a membrane filtration method, and correlated with the tidal variations of the river and meteorological data on rainfall and temperature. More frequent and severe incidents of pollution occurred in the autumn. Heavy rainfall resulted in sharp peaks of E. coli contamination that implies a potential increase of numbers of pathogenic micro‐organisms. Sixty percent of all samples were found to be in excess of the accepted upper limit of pollution set by European Union (EU) legislation for bathing water. This study demonstrated that frequent sewage pollution of the Thames results in high numbers of E. coli and incidents of detectable levels of pathogenic bacteria demonstrating the need for regular monitoring of bacterial pollution.  相似文献   
7.
8.
The deteriorated area of the multicrystalline silicon (mc‐Si) ingots grown by directional solidification, commonly known as the Red Zone, is usually removed before wafering. This area, characterized by poor minority carrier lifetime, is located on the sides, at the top, and the bottom of the mc‐Si ingots. In this study, the effect of internal gettering by oxygen precipitates and structural defects has been investigated on the bottom zone of a mc‐Si ingot. Nucleation and growth of oxygen precipitates as well as low temperature annealing were studied. Photoluminescence imaging, lifetime mapping, and interstitial iron measurements performed by μ‐PCD reveal a considerable reduction of the bottom Red Zone. An improvement of lifetime from below 1 µs to about 20 µs and a reduction of interstitial iron concentration from 1.32 × 1013 at/cm3 to 8.4 × 1010 at/cm3 are demonstrated in this paper. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
9.
Peer-to-peer (P2P) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting these networks from intruders and attackers is a real challenge. One of the constant threats on P2P networks is the propagation of active worms. Recent events show that active worms can spread automatically and flood the Internet in a very short period of time. Therefore, P2P systems can be a potential vehicle for active worms to achieve fast worm propagation in the Internet. Nowadays, BitTorrent is becoming more and more popular, mainly due its fair load distribution mechanism. Unfortunately, BitTorrent is particularly vulnerable to topology aware active worms. In this paper we analyze the impact of a new worm propagation threat on BitTorrent. We identify the BitTorrent vulnerabilities it exploits, the characteristics that accelerate and decelerate its propagation, and develop a mathematical model of their propagation. We also provide numerical analysis results. This will help the design of efficient detection and containment systems.  相似文献   
10.

Apart from the the increasing demand of smartphones in human-to-human (H2H) communications, the introduction of machine-to-machine (M2M) devices poses significant challenges to wireless cellular networks. In order to offer the ability to connect billion of devices to propel the society into a new era of connectivity in our homes, officies and smart cities, we design novel radio resource sharing algorithms in a H2H/M2M coexistence case to accommodate M2M communications while not severely degrading existing H2H services. We propose group-based M2M communications that share the same spectrum with H2H communications through device-to-device (D2D) communication, as one of the technology components of 5G architecture. First, we formulate radio resource sharing problem as a sum-rate maximization, problem for which the optimal solution is non-deterministic polynomial-time hard (NP-hard). To overcome the computational complexity of the optimal solution, we model the resource sharing problem as a bipartite graph, then propose a novel interference-aware graph-based resource sharing scheme using a fixed M2M transmit power. To further enhance the protection of H2H services, we introduce an adaptive power control mechanism into the interference-aware graph-based resource sharing scheme. M2M transmit power is efficiently adjusted using one among the two following alternative controllers, namely, either the proportional integral derivative (PID) or the fuzzy logic. The latter is proposed within the aim to assure the desired quality-of-service (QoS) of H2H users and increase the efficiency of M2M spectrum usage. In both cases (fixed and adaptive), a centralized and a semi-distributed instantiations are given. Simulation results show that adaptive M2M radio resource sharing scheme using fuzzy logic is the one that achieves the best compromise. In fact, it guarantees H2H performance in terms of throughput and fairness while maximizing the efficiency of M2M spectrum usage. Simulation results also show that in spite of its quite good performance, semi-distributed M2M resource sharing instantiation achieves them with a decline of up to 10% in terms of H2H throughput compared to the centralized instantiation. This is achieved through a markedly lower communication overhead.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号