首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   751篇
  免费   51篇
  国内免费   2篇
电工技术   1篇
综合类   1篇
化学工业   261篇
金属工艺   32篇
机械仪表   19篇
建筑科学   23篇
矿业工程   5篇
能源动力   34篇
轻工业   55篇
无线电   46篇
一般工业技术   133篇
冶金工业   22篇
原子能技术   1篇
自动化技术   171篇
  2024年   5篇
  2023年   7篇
  2022年   20篇
  2021年   112篇
  2020年   26篇
  2019年   24篇
  2018年   45篇
  2017年   38篇
  2016年   46篇
  2015年   27篇
  2014年   54篇
  2013年   57篇
  2012年   52篇
  2011年   56篇
  2010年   46篇
  2009年   31篇
  2008年   26篇
  2007年   18篇
  2006年   23篇
  2005年   21篇
  2004年   19篇
  2003年   12篇
  2002年   4篇
  2001年   7篇
  2000年   3篇
  1999年   6篇
  1998年   2篇
  1997年   4篇
  1995年   3篇
  1987年   2篇
  1985年   1篇
  1983年   1篇
  1980年   1篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1969年   1篇
排序方式: 共有804条查询结果,搜索用时 468 毫秒
11.
Verification of identity based on the analysis of dynamic signatures is an important problem of biometrics. The effectiveness of the verification significantly increases when the dynamic characteristics of signature (e.g. velocity of the pen) are considered. These characteristics are individual for each user and difficult to imitate. The effectiveness of the verification can be further improved by using partitioning. In this paper we propose a new method which uses partitioning. In our method partitions represent areas of high and low speed of signature and high and low pen?s pressure. All selected partitions are used by our algorithm, but more important in the classification process are these partitions, in which the signatures of the user acquired during training phase are more stable. Moreover, final classification is interpretable. In this paper we present the simulation results of the proposed method for the two databases: SVC2004 and BioSecure Database.  相似文献   
12.
Video transmission and analysis is often utilized in applications outside of the entertainment sector, and generally speaking this class of video is used to perform specific tasks. Examples of these applications include security and public safety. The Quality of Experience (QoE) concept for video content used for entertainment differs significantly from the QoE of surveillance video used for recognition tasks. This is because, in the latter case, the subjective satisfaction of the user depends on achieving a given functionality. Recognizing the growing importance of video in delivering a range of public safety services, we focused on developing critical quality thresholds in license plate recognition tasks based on videos streamed in constrained networking conditions. Since the number of surveillance cameras is still growing it is obvious that automatic systems will be used to do the tasks. Therefore, the presented research includes also analysis of automatic recognition algorithms.  相似文献   
13.
14.
15.
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all.  相似文献   
16.
The problem of computing the chromatic number of a P 5-free graph (a graph which contains no path on 5 vertices as an induced subgraph) is known to be NP-hard. However, we show that for every fixed integer k, there exists a polynomial-time algorithm determining whether or not a P 5-free graph admits a k-coloring, and finding one, if it does.  相似文献   
17.
In Darwin’s Dangerous Idea, Daniel Dennett claims that evolution is algorithmic. On Dennett’s analysis, evolutionary processes are trivially algorithmic because he assumes that all natural processes are algorithmic. I will argue that there are more robust ways to understand algorithmic processes that make the claim that evolution is algorithmic empirical and not conceptual. While laws of nature can be seen as compression algorithms of information about the world, it does not follow logically that they are implemented as algorithms by physical processes. For that to be true, the processes have to be part of computational systems. The basic difference between mere simulation and real computing is having proper causal structure. I will show what kind of requirements this poses for natural evolutionary processes if they are to be computational.  相似文献   
18.
Teresa  Marcin   《Neurocomputing》2009,72(13-15):3034
This paper presents neural estimators of the mechanical state variables of the electrical drive system with elastic joints. The non-measurable state variables, as the torsional torque and the load machine speed are estimated using multilayer feed-forward neural networks. The main stages of the design methodology of these neural estimators are presented. The optimal brain damage method is implemented for the structure optimization of each neural network. Then signals estimated by neural estimators are tested in the electrical drive control structure with additional feedbacks from the estimated shaft torque and the difference between the motor and the load speeds. The simulation results show good accuracy of both presented neural estimators for the wide range of changes of the reference speed and the load torque. The simulation results are then verified by laboratory experiments.  相似文献   
19.
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes execute a concurrent program that occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed algorithm to control entries and exits to/from the shared resource (also called a critical section), in such a way that at any time, there is at most one process accessing it. In our considerations, the shared resource is the shared communication channel itself (multiple access channel), and the main challenge arises because the channel is also the only mean of communication between these processes. We consider both the classic and a slightly weaker version of mutual exclusion, called \(\varepsilon \)-mutual-exclusion, where for each period of a process staying in the critical section the probability that there is some other process in the critical section is at most \(\varepsilon \). We show that there are channel settings, where the classic mutual exclusion is not feasible even for randomized algorithms, while the \(\varepsilon \)-mutual-exclusion is. In more relaxed channel settings, we prove an exponential gap between the makespan complexity of the classic mutual exclusion problem and its weaker \(\varepsilon \)-exclusion version. We also show how to guarantee fairness of mutual exclusion algorithms, i.e., that each process that wants to enter the critical section will eventually succeed.  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号