首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   344篇
  免费   12篇
化学工业   40篇
金属工艺   6篇
机械仪表   44篇
建筑科学   5篇
能源动力   3篇
轻工业   19篇
无线电   52篇
一般工业技术   49篇
冶金工业   39篇
原子能技术   5篇
自动化技术   94篇
  2023年   6篇
  2022年   5篇
  2021年   23篇
  2020年   8篇
  2019年   13篇
  2018年   9篇
  2017年   16篇
  2016年   28篇
  2015年   14篇
  2014年   13篇
  2013年   24篇
  2012年   15篇
  2011年   25篇
  2010年   12篇
  2009年   6篇
  2008年   10篇
  2007年   14篇
  2006年   4篇
  2005年   5篇
  2004年   9篇
  2003年   10篇
  2002年   6篇
  2001年   7篇
  2000年   7篇
  1999年   8篇
  1998年   16篇
  1997年   8篇
  1996年   7篇
  1995年   7篇
  1994年   2篇
  1993年   2篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1982年   1篇
  1979年   3篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
排序方式: 共有356条查询结果,搜索用时 281 毫秒
1.
Ten sesquiterpenoids, including seven new ones, have been isolated from an undescribed sponge of the genus Dysidea. Compounds 1-8 are sesquiterpenoids of the drimane class, while 9 and 10 are 12-norsesquiterpenoids of the same structural class. The structures of novel compounds have been determined by combined spectroscopic methods. These compounds exhibited moderate antimicrobial and enzyme inhibitory (Na+/K(+)-ATPase and PLA2) activities.  相似文献   
2.
Dominant features for the content-based image retrieval usually have high-dimensionality. So far, many researches have been done to index such values to support fast retrieval. Still, many existing indexing schemes are suffering from performance degradation due to the curse of dimensionality problem. As an alternative, heuristic algorithms have been proposed to calculate the answer with ??high probability?? at the cost of accuracy. In this paper, we propose a new hash tree-based indexing structure called tertiary hash tree for indexing high-dimensional feature data. Tertiary hash tree provides several advantages compared to the traditional extendible hash structure in terms of resource usage and search performance. Through extensive experiments, we show that our proposed index structure achieves outstanding performance.  相似文献   
3.
Protein phosphorylation is one of the most studied post-translational modifications (PTMs). Despite the remarkable advances in phosphoproteomics, a chemically less-stable subset of the phosphosites, which we call the crypto-phosphoproteome, has remained underexplored due to technological challenges. In this Viewpoint, we briefly summarize the current understanding of these elusive protein phosphorylations and identify the missing pieces for future studies.  相似文献   
4.
Users who are familiar with the existing keyword-based search have problems of not being able to configure the formal query because they don’t have generic knowledge on knowledge base when using the semantic-based retrieval system. User wants the search results which are more accurate and match the user’s search intents with the existing keyword-based search and the same search keyword without the need to recognize what technology the currently used retrieval system is based on to provide the search results. In order to do the semantic analysis of the ambiguous search keyword entered by users who are familiar with the existing keyword-based search, ontological knowledge base constructed based on refined meta-data is necessary, and the keyword semantic analysis technique which reflects user’s search intents from the well-established knowledge base and can generate accurate search results is necessary. In this paper, therefore, by limiting the knowledge base construction to multimedia contents meta-data, the applicable prototype has been implemented and its performance in the same environment as Smart TV has been evaluated. Semantic analysis of user’s search keyword is done, evaluated and recommended through the proposed ontological knowledge base framework so that accurate search results that match user’s search intents can be provided.  相似文献   
5.
Mobile video quality assessment plays an essential role in multimedia systems and services. In the case of scalable video coding, which enables dynamic adaptation based on terminal capabilities and heterogeneous network, variable resolution is one of the most prominent types of video distortions. In this paper, we propose a new hybrid spatial and temporal distortion metric for evaluating video streaming quality with variable spatio-temporal resolution. The key idea is to project video sequence into feature domain and calculate the distortion of content information from the projected principal component matrix and its eigenvectors. This metric can measures the degree of content information degradation especially in spatio-temporal resolution scalable video. The performance of the proposed metric is evaluated and compared to some state-of-the-art quality evaluation metrics in the literature. Our results show that the proposed metric achieves good correlations with the subjective evaluations of the EPFL scale video database.  相似文献   
6.
With the proliferation of healthcare data, the cloud mining technology for E-health services and applications has become a hot research topic. While on the other hand, these rapidly evolving cloud mining technologies and their deployment in healthcare systems also pose potential threats to patient’s data privacy. In order to solve the privacy problem in the cloud mining technique, this paper proposes a semi-supervised privacy-preserving clustering algorithm. By employing a small amount of supervised information, the method first learns a Large Margin Nearest Cluster metric using convex optimization. Then according to the trained metric, the method imposes multiplicative perturbation on the original data, which can change the distribution shape of the original data and thus protect the privacy information as well as ensuring high data usability. The experimental results on the brain fiber dataset provided by the 2009 PBC demonstrated that the proposed method could not only protect data privacy towards secure attacks, but improve the clustering purity.  相似文献   
7.
In ubiquitous computing environments, providing appropriate services and information to users at the right place in the right way is challenging for many reasons: different user interests, heterogeneous devices and services, dynamic networks, information overload, or differing privacy levels, for example. Agent technology is a paradigm expected to play an increasing role in complex computing environments, and due to the increasing popularity of social networking services, we expect to see the convergence of agent and social web technologies. The goal of this theme issue is to bring together state-of-the-art research contributions that examine the convergence of agent technologies and social networks for ubiquitous computing.  相似文献   
8.
9.
As recent Internet threats are evolving more rapidly than ever before, one of the major challenges in designing an intrusion detection system is to provide early and accurate detection of emerging threats. In this study, a novel framework is developed for fully unsupervised training and online anomaly detection. The framework is designed so that an initial model is constructed and then it gradually evolves according to the current state of online data without any human intervention. In the framework, a self-organizing map (SOM) that is seamlessly combined with K-means clustering is transformed into an adaptive and dynamic algorithm suitable for real-time processing. The performance of the proposed approach is evaluated through experiments using the well-known KDD Cup 1999 data set and further experiments using the honeypot data recently collected from Kyoto University. It is shown that the proposed approach can significantly increase the detection rate while the false alarm rate remains low. In particular, it is capable of detecting new types of attacks at the earliest possible time.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号