首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   451篇
  免费   23篇
电工技术   20篇
综合类   1篇
化学工业   52篇
金属工艺   2篇
机械仪表   5篇
建筑科学   12篇
能源动力   17篇
轻工业   59篇
水利工程   5篇
武器工业   1篇
无线电   61篇
一般工业技术   53篇
冶金工业   47篇
原子能技术   2篇
自动化技术   137篇
  2023年   1篇
  2022年   10篇
  2021年   13篇
  2020年   7篇
  2019年   8篇
  2018年   14篇
  2017年   15篇
  2016年   10篇
  2015年   9篇
  2014年   17篇
  2013年   30篇
  2012年   31篇
  2011年   23篇
  2010年   31篇
  2009年   26篇
  2008年   20篇
  2007年   24篇
  2006年   15篇
  2005年   20篇
  2004年   15篇
  2003年   11篇
  2002年   12篇
  2001年   10篇
  2000年   8篇
  1999年   10篇
  1998年   17篇
  1997年   12篇
  1996年   10篇
  1995年   9篇
  1994年   4篇
  1993年   4篇
  1991年   1篇
  1990年   2篇
  1989年   4篇
  1988年   3篇
  1987年   3篇
  1986年   4篇
  1985年   3篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1973年   2篇
排序方式: 共有474条查询结果,搜索用时 15 毫秒
1.
2.
3.
In previous work, an algorithm for matching geometric features was developed. Although the method worked well, it was demanding in computational resources when applied to large problems. The authors now present methods for reducing the computational requirements, without significantly affecting the reliability of the algorithm  相似文献   
4.
Agile software development methodologies are increasingly adopted by organizations because they focus on the client’s needs, thus safeguarding business value for the final product. At the same time, as the economy and society move toward globalization, more organizations shift to distributed development of software projects. From this perspective, while adopting agile techniques seems beneficial, there are still a number of challenges that need to be addressed; among these notable is the effective cooperation between the stakeholders and the geographically distributed development team. In addition, data collection and validation for requirements engineering demands efficient processing techniques in order to handle the volume of data as well as to manage different inconsistencies, when the data are collected using online tools. In this paper, we present “PBURC,” a patterns-based, unsupervised requirements clustering framework, which makes use of machine-learning methods for requirements validation, being able to overcome data inconsistencies and effectively determine appropriate requirements clusters for optimal definition of software development sprints.  相似文献   
5.
We propose a computer-based framework for the formal verification of collaboration patterns in healthcare teams. In this, the patterns are constructed diagrammatically as compositions of keystones that are viewed as abstract processes. The approach provides mechanisms for ensuring that safety properties are enforced and exceptional events are handled systematically. Additionally, a fully verified, executable model is obtained as an end product, enabling a simulation of its associated collaboration scenarios.  相似文献   
6.
With the proliferation of wireless sensor networks and mobile technologies in general, it is possible to provide improved medical services and also to reduce costs as well as to manage the shortage of specialized personnel. Monitoring a person’s health condition using sensors provides a lot of benefits but also exposes personal sensitive information to a number of privacy threats. By recording user-related data, it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user. One solution is to protect the patient’s privacy by making difficult a linkage between specific measurements with a patient’s identity. In this paper we present a privacy-preserving architecture which builds upon the concept of k-anonymity; we present a clustering-based anonymity scheme for effective network management and data aggregation, which also protects user’s privacy by making an entity indistinguishable from other k similar entities. The presented algorithm is resource aware, as it minimizes energy consumption with respect to other more costly, cryptography-based approaches. The system is evaluated from an energy-consuming and network performance perspective, under different simulation scenarios.  相似文献   
7.
In this work, we propose and study general inflated probability distributions that can be used for modelling and monitoring unusual count data. The considered models extend the well‐known zero‐inflated Poisson distribution because they allow the excess of values, other than zero. Four simple upper‐sided control schemes are considered for the monitoring of count data based on the proposed general inflated Poisson distributions, and their performance is evaluated under various out‐of‐control situations. The usefulness of the considered models and techniques is illustrated via two real‐data examples, while practical guidelines are provided as well. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
8.
In this paper, we propose novel elastic graph matching (EGM) algorithms for face recognition assisted by the availability of 3D facial geometry. More specifically, we conceptually extend the EGM algorithm in order to exploit the 3D nature of human facial geometry for face recognition/verification. In order to achieve that, first we extend the matching module of the EGM algorithm in order to capitalize on the 2.5D facial data. Furthermore, we incorporate the 3D geometry into the multiscale analysis used and build a novel geodesic multiscale morphological pyramid of dilations/erosions in order to fill the graph jets. We show that the proposed advances significantly enhance the performance of EGM algorithms. We demonstrate the efficiency of the proposed advances in the face recognition/verification problem using photometric stereo.  相似文献   
9.
We present an algorithm for the reconstruction of images from irregularly placed samples, using linear splines with control points on a hexagonal grid. Several spline approximations are computed for different transformations of the control point grid (e.g. translations and rotations). These approximations are then merged together after compensation of the transformations, yielding a high-quality invariant image reconstruction. Evaluations show that the use of hexagonal grids of the “invariance by integration” principle improves reconstruction quality. An application to image coding is also presented.  相似文献   
10.
Advances on sensor technology, wireless environments and data mining introduce new possibilities in the healthcare sector, realizing the anytime-anywhere access to medical information. Towards this direction, integration of packet-switched networks and sensor devices can be effective in deploying assistive environments, such as home monitoring for elderly or patients. In this paper we describe a policy-based architecture that utilizes wireless sensor devices, advanced network topologies and software agents to enable remote monitoring of patients and elderly people; through the aforementioned technologies we achieve continuous monitoring of a patient’s condition and we can proceed when necessary with proper actions. We also present a software framework and network architecture that realizes the provision of remote medical services, in compliance with the imposed security and privacy requirements. A proof of concept prototype is also deployed, along with an evaluation of the overall architecture’s performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号