首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   363篇
  免费   23篇
  国内免费   42篇
电工技术   1篇
综合类   9篇
化学工业   14篇
金属工艺   2篇
机械仪表   3篇
建筑科学   3篇
矿业工程   1篇
能源动力   4篇
轻工业   9篇
水利工程   1篇
无线电   81篇
一般工业技术   15篇
自动化技术   285篇
  2024年   2篇
  2023年   19篇
  2022年   18篇
  2021年   23篇
  2020年   23篇
  2019年   5篇
  2018年   18篇
  2017年   32篇
  2016年   32篇
  2015年   23篇
  2014年   50篇
  2013年   19篇
  2012年   29篇
  2011年   26篇
  2010年   23篇
  2009年   22篇
  2008年   9篇
  2007年   15篇
  2006年   8篇
  2005年   1篇
  2003年   4篇
  2002年   5篇
  2001年   2篇
  2000年   3篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1990年   1篇
  1988年   2篇
  1987年   3篇
  1986年   6篇
排序方式: 共有428条查询结果,搜索用时 21 毫秒
1.
1-read/1-write (1R1W) register file (RF) is a popular memory configuration in modern feature rich SoCs requiring significant amount of embedded memory. A memory compiler is constructed using the 8T RF bitcell spanning a range of instances from 32 b to 72 Kb. An 8T low-leakage bitcell of 0.106 μm2 is used in a 14 nm FinFET technology with a 70 nm contacted gate pitch for high-density (HD) two-port (TP) RF memory compiler which achieves 5.66 Mb/mm2 array density for a 72 Kb array which is the highest reported density in 14 nm FinFET technology. The density improvement is achieved by using techniques such as leaf-cell optimization (eliminating transistors), better architectural planning, top level connectivity through leaf-cell abutment and minimizing the number of unique leaf-cells. These techniques are fully compatible with memory compiler usage over the required span. Leakage power is minimized by using power-switches without degrading the density mentioned above. Self-induced supply voltage collapse technique is applied for write and a four stack static keeper is used for read Vmin improvement. Fabricated test chips using 14 nm process have demonstrated 2.33 GHz performance at 1.1 V/25 °C operation. Overall Vmin of 550 mV is achieved with this design at 25 °C. The inbuilt power-switch improves leakage power by 12x in simulation. Approximately 8% die area of a leading 14 nm SoC in commercialization is occupied by these compiled RF instances.  相似文献   
2.
Harmful algal blooms, which are considered a serious environmental problem nowadays, occur in coastal waters in many parts of the world. They cause acute ecological damage and ensuing economic losses, due to fish kills and shellfish poisoning as well as public health threats posed by toxic blooms. Recently, data-driven models including machine-learning (ML) techniques have been employed to mimic dynamics of algal blooms. One of the most important steps in the application of a ML technique is the selection of significant model input variables. In the present paper, we use two extensively used ML techniques, artificial neural networks (ANN) and genetic programming (GP) for selecting the significant input variables. The efficacy of these techniques is first demonstrated on a test problem with known dependence and then they are applied to a real-world case study of water quality data from Tolo Harbour, Hong Kong. These ML techniques overcome some of the limitations of the currently used techniques for input variable selection, a review of which is also presented. The interpretation of the weights of the trained ANN and the GP evolved equations demonstrate their ability to identify the ecologically significant variables precisely. The significant variables suggested by the ML techniques also indicate chlorophyll-a (Chl-a) itself to be the most significant input in predicting the algal blooms, suggesting an auto-regressive nature or persistence in the algal bloom dynamics, which may be related to the long flushing time in the semi-enclosed coastal waters. The study also confirms the previous understanding that the algal blooms in coastal waters of Hong Kong often occur with a life cycle of the order of 1–2 weeks.  相似文献   
3.
4.
The integrated data collection system hasn't changed much over the years. Their growth is dominated by digital filtering, and they get a new avionics bus. Time division multiplexing is still used to communicate with the system's data collector. These schemes make use of commands and data buses. While this method works, it has many drawbacks. These shortcomings are overwhelming the strict system architecture, system bandwidth limits, and expertise to only obtain an avionics bus, otherwise system bandwidth and one-way flow of data and control. This lead for high-end video recorders. To quietly monitor our actions and valuable information provides important warnings. However, it is usually completed by a device with this small processing power, which tracks the device, stores the data of the user's data, and is limited in processing. Therefore, it is important to store and process user data in the cloud to track 5 G network activity. This article proposes a simple 5G network gateway solution for custom user monitoring equipment. Collects charge data on Network 5G and Charging-aware multi-mode based routing protocol (CMRP). The CMRP routing mechanism is not yet stable, but the changes depend on the state of the energy charge sensor. This cannot be complemented by energy-efficient sensors and routing protocols that consume less energy.  相似文献   
5.
Recently, as one of the most popular exemplar-based clustering algorithms, affinity propagation has attracted a great amount of attention in various fields. The advantages of affinity propagation include the efficiency, insensitivity to cluster initialization and capability of finding clusters with less error. However, one shortcoming of the affinity propagation algorithm is that, the clustering results generated by affinity propagation strongly depend on the selection of exemplar preferences, which is a challenging model selection task. To tackle this problem, this paper investigates the clustering stability of affinity propagation for automatically selecting appropriate exemplar preferences. The basic idea is to define a novel stability measure for affinity propagation, based on which we can select exemplar preferences that generate the most stable clustering results. Consequently, the proposed approach is termed stability-based affinity propagation (SAP). Experimental results conducted on extensive real-world datasets have validated the effectiveness of the proposed SAP algorithm.  相似文献   
6.
通过比较SVG和Canvas两种绘图机制,辨析了使用Canvas在网页中绘图方案的优缺点。使用一个在线写字本案例,论述了Canvas捕获用户的鼠标事件根据用户输入来绘图的过程。最后总结了Canvas绘图的特性以及应用前景。  相似文献   
7.
申宇铭  文习明  王驹 《计算机科学》2014,41(12):206-210,215
表达能力和推理复杂性是一个逻辑的两个重要特征,也是一对相互制约的关系。解释之间的互模拟关系是从语义的角度刻画逻辑表达能力的一个有效途径,其代表性的结果是命题模态逻辑表达能力的刻画定理-van Benthem刻画定理。文中给出了描述逻辑FL0(含构造子:原子概念、顶概念、概念交、全称量词约束)的模拟关系,建立了FL0中概念和术语公理集的表达能力刻画定理,即一阶逻辑公式与FL0概念和术语公理集等价的充分必要条件。上述结果为寻求表达能力与推理复杂性之间的最佳平衡提供了有效的支持。  相似文献   
8.
ObjectiveThis paper proposed a new approach for inner-knuckle-print (IKP) recognition. In traditional IKP recognition systems, the region of interest (ROI) is extracted from the image of the whole hand and the directions of the fingers being imaged are not restricted. The result maybe incorrect because that the shape and surface of the fingers may vary greatly. Moreover, if the direction of the finger being imaged is not restricted, there may be severe rotation transform between intra-class IKPs. To overcome these drawbacks, we develop a new data acquisition scheme as well as an efficient personal authentication algorithm.MethodsThe new scheme is designed to capture the image of the inner surface of the middle knuckles of the middle and ring fingers. The fingers being imaged are kept horizontal with two pegs, so that the rotation angle between different images obtained from the same hand can be minimized. The new personal authentication algorithm consists of the next four steps. Firstly, two regions of interest (ROI), each of which contains the inner surface of a knuckle, are cropped from the original image. Secondly, line features are extracted from the ROIs based on the combination of Gabor filtering and derivative line detection method. Then, binary line images are matched by using a cross-correlation-based method. Finally, the input data is classified through score level fusion.ResultsTo evaluate the proposed IKP recognition system, a finger image database which includes 2000 images from 100 volunteers is established. The images are captured on two separate occasions, at an interval of around two months. Most of the volunteers are not familiar with the image acquisition process. The experimental results show that the proposed system achieves high recognition rate and it works in real time. Moreover, the proposed line feature extraction method outperforms traditional Gabor filter based line detection method and derivative line detection method in accuracy.ConclusionThe proposed IKP system is robust and accurate. It may promote the application and popularization of IKP recognition.  相似文献   
9.
着重对近几年自然图像抠图研究新进展进行综述,针对近年来基于启发式优化的抠图研究以及基于深度学习的抠图研究新成果对抠图研究工作进行重新分类和梳理,分析不同类型自然图像抠图研究主要的方法并整理其中的关键问题,介绍常用的自然图像抠图评价指标。最后通过实例分析总结了当前自然图像抠图研究面临的挑战,并对未来的研究前景进行了探讨。  相似文献   
10.
李改  李磊 《自动化学报》2015,41(2):405-418
单类协同过滤(One-class collaborative filtering, OCCF)问题是当前的一大研究热点.之前的研究所提出的算法对噪声数据很敏感,因为训练数据中的噪声数据将给训练过程带来巨大影响,从而导致算法的不准确性.文中引入了Sigmoid成对损失函数和Fidelity成对损失函数,这两个函数具有很好的灵活性,能够和当前最流行的基于矩阵分解(Matrix factorization, MF)的协同过滤算法和基于最近邻(K-nearest neighbor, KNN)的协同过滤算法很好地融合在一起,进而提出了两个鲁棒的单类协同排序算法,解决了之前此类算法对噪声数据的敏感性问题.基于Bootstrap抽样的随机梯度下降法用于优化学习过程.在包含有大量噪声数据点的实际数据集上实验验证,本文提出的算法在各个评价指标下均优于当前最新的单类协同排序算法.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号