全文获取类型
收费全文 | 451篇 |
免费 | 23篇 |
专业分类
电工技术 | 20篇 |
综合类 | 1篇 |
化学工业 | 52篇 |
金属工艺 | 2篇 |
机械仪表 | 5篇 |
建筑科学 | 12篇 |
能源动力 | 17篇 |
轻工业 | 59篇 |
水利工程 | 5篇 |
武器工业 | 1篇 |
无线电 | 61篇 |
一般工业技术 | 53篇 |
冶金工业 | 47篇 |
原子能技术 | 2篇 |
自动化技术 | 137篇 |
出版年
2023年 | 1篇 |
2022年 | 10篇 |
2021年 | 13篇 |
2020年 | 7篇 |
2019年 | 8篇 |
2018年 | 14篇 |
2017年 | 15篇 |
2016年 | 10篇 |
2015年 | 9篇 |
2014年 | 17篇 |
2013年 | 30篇 |
2012年 | 31篇 |
2011年 | 23篇 |
2010年 | 31篇 |
2009年 | 26篇 |
2008年 | 20篇 |
2007年 | 24篇 |
2006年 | 15篇 |
2005年 | 20篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 12篇 |
2001年 | 10篇 |
2000年 | 8篇 |
1999年 | 10篇 |
1998年 | 17篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 9篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1973年 | 2篇 |
排序方式: 共有474条查询结果,搜索用时 15 毫秒
1.
2.
3.
In previous work, an algorithm for matching geometric features was developed. Although the method worked well, it was demanding in computational resources when applied to large problems. The authors now present methods for reducing the computational requirements, without significantly affecting the reliability of the algorithm 相似文献
4.
Agile software development methodologies are increasingly adopted by organizations because they focus on the client’s needs, thus safeguarding business value for the final product. At the same time, as the economy and society move toward globalization, more organizations shift to distributed development of software projects. From this perspective, while adopting agile techniques seems beneficial, there are still a number of challenges that need to be addressed; among these notable is the effective cooperation between the stakeholders and the geographically distributed development team. In addition, data collection and validation for requirements engineering demands efficient processing techniques in order to handle the volume of data as well as to manage different inconsistencies, when the data are collected using online tools. In this paper, we present “PBURC,” a patterns-based, unsupervised requirements clustering framework, which makes use of machine-learning methods for requirements validation, being able to overcome data inconsistencies and effectively determine appropriate requirements clusters for optimal definition of software development sprints. 相似文献
5.
We propose a computer-based framework for the formal verification of collaboration patterns in healthcare teams. In this, the patterns are constructed diagrammatically as compositions of keystones that are viewed as abstract processes. The approach provides mechanisms for ensuring that safety properties are enforced and exceptional events are handled systematically. Additionally, a fully verified, executable model is obtained as an end product, enabling a simulation of its associated collaboration scenarios. 相似文献
6.
With the proliferation of wireless sensor networks and mobile technologies in general, it is possible to provide improved medical services and also to reduce costs as well as to manage the shortage of specialized personnel. Monitoring a person’s health condition using sensors provides a lot of benefits but also exposes personal sensitive information to a number of privacy threats. By recording user-related data, it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user. One solution is to protect the patient’s privacy by making difficult a linkage between specific measurements with a patient’s identity. In this paper we present a privacy-preserving architecture which builds upon the concept of k-anonymity; we present a clustering-based anonymity scheme for effective network management and data aggregation, which also protects user’s privacy by making an entity indistinguishable from other k similar entities. The presented algorithm is resource aware, as it minimizes energy consumption with respect to other more costly, cryptography-based approaches. The system is evaluated from an energy-consuming and network performance perspective, under different simulation scenarios. 相似文献
7.
Athanasios C. Rakitzis Philippe Castagliola Petros E. Maravelakis 《Quality and Reliability Engineering International》2016,32(5):1837-1851
In this work, we propose and study general inflated probability distributions that can be used for modelling and monitoring unusual count data. The considered models extend the well‐known zero‐inflated Poisson distribution because they allow the excess of values, other than zero. Four simple upper‐sided control schemes are considered for the monitoring of count data based on the proposed general inflated Poisson distributions, and their performance is evaluated under various out‐of‐control situations. The usefulness of the considered models and techniques is illustrated via two real‐data examples, while practical guidelines are provided as well. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
8.
In this paper, we propose novel elastic graph matching (EGM) algorithms for face recognition assisted by the availability of 3D facial geometry. More specifically, we conceptually extend the EGM algorithm in order to exploit the 3D nature of human facial geometry for face recognition/verification. In order to achieve that, first we extend the matching module of the EGM algorithm in order to capitalize on the 2.5D facial data. Furthermore, we incorporate the 3D geometry into the multiscale analysis used and build a novel geodesic multiscale morphological pyramid of dilations/erosions in order to fill the graph jets. We show that the proposed advances significantly enhance the performance of EGM algorithms. We demonstrate the efficiency of the proposed advances in the face recognition/verification problem using photometric stereo. 相似文献
9.
We present an algorithm for the reconstruction of images from irregularly placed samples, using linear splines with control points on a hexagonal grid. Several spline approximations are computed for different transformations of the control point grid (e.g. translations and rotations). These approximations are then merged together after compensation of the transformations, yielding a high-quality invariant image reconstruction. Evaluations show that the use of hexagonal grids of the “invariance by integration” principle improves reconstruction quality. An application to image coding is also presented. 相似文献
10.
Dimitris Vassis Petros Belsis Christos Skourlas Grammati Pantziou 《Personal and Ubiquitous Computing》2010,14(6):563-573
Advances on sensor technology, wireless environments and data mining introduce new possibilities in the healthcare sector,
realizing the anytime-anywhere access to medical information. Towards this direction, integration of packet-switched networks
and sensor devices can be effective in deploying assistive environments, such as home monitoring for elderly or patients.
In this paper we describe a policy-based architecture that utilizes wireless sensor devices, advanced network topologies and
software agents to enable remote monitoring of patients and elderly people; through the aforementioned technologies we achieve
continuous monitoring of a patient’s condition and we can proceed when necessary with proper actions. We also present a software
framework and network architecture that realizes the provision of remote medical services, in compliance with the imposed
security and privacy requirements. A proof of concept prototype is also deployed, along with an evaluation of the overall
architecture’s performance. 相似文献