全文获取类型
收费全文 | 374篇 |
免费 | 14篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 57篇 |
金属工艺 | 2篇 |
机械仪表 | 2篇 |
建筑科学 | 8篇 |
能源动力 | 6篇 |
轻工业 | 12篇 |
水利工程 | 2篇 |
石油天然气 | 2篇 |
无线电 | 60篇 |
一般工业技术 | 54篇 |
冶金工业 | 32篇 |
自动化技术 | 150篇 |
出版年
2023年 | 2篇 |
2022年 | 7篇 |
2021年 | 7篇 |
2020年 | 4篇 |
2019年 | 4篇 |
2018年 | 8篇 |
2017年 | 6篇 |
2016年 | 15篇 |
2015年 | 14篇 |
2014年 | 10篇 |
2013年 | 18篇 |
2012年 | 13篇 |
2011年 | 16篇 |
2010年 | 14篇 |
2009年 | 21篇 |
2008年 | 22篇 |
2007年 | 20篇 |
2006年 | 22篇 |
2005年 | 15篇 |
2004年 | 15篇 |
2003年 | 10篇 |
2002年 | 12篇 |
2001年 | 5篇 |
2000年 | 8篇 |
1999年 | 8篇 |
1998年 | 10篇 |
1997年 | 13篇 |
1996年 | 7篇 |
1995年 | 8篇 |
1994年 | 4篇 |
1993年 | 7篇 |
1992年 | 2篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1979年 | 4篇 |
1978年 | 3篇 |
1976年 | 2篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有391条查询结果,搜索用时 21 毫秒
11.
Abstract. A proper coloring of the edges of a graph G is called acyclic if there is no two-colored cycle in G . The acyclic edge chromatic number of G , denoted by a'(G) , is the least number of colors in an acyclic edge coloring of G . For certain graphs G , a'(G)\geq Δ(G)+2 where Δ(G) is the maximum degree in G . It is known that a'(G)≤ Δ + 2 for almost all Δ -regular graphs, including all Δ -regular graphs whose girth is at least cΔ log Δ . We prove that determining the acyclic edge chromatic number of an arbitrary graph is an NP-complete problem. For graphs
G with sufficiently large girth in terms of Δ(G) , we present deterministic polynomial-time algorithms that color the edges of G acyclically using at most Δ(G)+2 colors. 相似文献
12.
The effects of an educational electronic book (e-book) on 149 five- to six-year-old kindergarteners’ emergent literacy levels were researched in two SES groups: low (LSES) (79 children) vs. middle (MSES) (70 children). In each SES group, children were randomly assigned to four groups. Three groups were assigned to work individually in one of three e-book activity modes: “Read story only”, “Read with dictionary”, or “Read and play” during three similar activity sessions and the fourth group served as a control which received the regular program of the kindergarten. Pre- and post-intervention emergent literacy measures included word meaning, word recognition, and phonological awareness. Results show that word meaning of children from both middle and low SES improved following the educational e-book activity, regardless of mode. Second, LSES children’s emergent literacy levels showed relatively greater improvement rates than did those of the MSES children. Third, children in the “Read with dictionary” and “Read and play” activity modes showed more improvement in their emergent literacy levels than did those in the “Read story only” mode. Implications for future research and for education are discussed. 相似文献
13.
Shamir L 《International Journal of Computer Vision》2008,79(3):225-230
Face datasets are considered a primary tool for evaluating the efficacy of face recognition methods. Here we show that in
many of the commonly used face datasets, face images can be recognized accurately at a rate significantly higher than random
even when no face, hair or clothes features appear in the image. The experiments were done by cutting a small background area
from each face image, so that each face dataset provided a new image dataset which included only seemingly blank images. Then,
an image classification method was used in order to check the classification accuracy. Experimental results show that the
classification accuracy ranged between 13.5% (color FERET) to 99% (YaleB). These results indicate that the performance of
face recognition methods measured using face image datasets may be biased. Compilable source code used for this experiment
is freely available for download via the Internet. 相似文献
14.
Mutually orthogonal pattern distortions are handled by an adaptive optical recognition system. A double-channel system is presented that implements pattern recognition with rotation, scale, and shift invariance. The recognition process is based on a two-stage operation: An object-independent determination of one distortion parameter (the scale, in the example presented here) is performed, and then the recognition is completed by a shift- and rotation-invariant optical correlator that is adapted to the measured parameter. Thus, complete invariance to three distortion parameters is achieved by the combination of two channels. The overall process is performed efficiently and can be executed in real time. 相似文献
15.
Derandomized graph products 总被引:1,自引:0,他引:1
Berman and Schnitger gave a randomized reduction from approximating MAX-SNP problems within constant factors arbitrarily close to 1 to approximating clique within a factor ofn
(for some ). This reduction was further studied by Blum, who gave it the namerandomized graph products. We show that this reduction can be made deterministic (derandomized), using random walks on expander graphs. The main technical contribution of this paper is in proving a lower bound for the probability that all steps of a random walk stay within a specified set of vertices of a graph. (Previous work was mainly concerned with upper bounds for this probability.) This lower bound extends also to the case where different sets of vertices are specified for different time steps of the walk. 相似文献
16.
The control algorithm based on the uncertainty and disturbance estimator (UDE) is a robust control strategy and has received wide attention in recent years. In this paper, the two‐degree‐of‐freedom nature of UDE‐based controllers is revealed. The set‐point tracking response is determined by the reference model, whereas the disturbance response and robustness are determined by the error feedback gain and the filter introduced to estimate the uncertainty and disturbances. It is also revealed that the error dynamics of the system is determined by two filters, of which one is determined by the error feedback gain and the other is determined by the filter introduced to estimate the uncertainty and disturbances. The design of these two filters are decoupled in the frequency domain. Moreover, after introducing the UDE‐based control, the Laplace transform can be applied to some time‐varying systems for analysis and design because all the time‐varying parts are lumped into a signal. It has been shown that, in addition to the known advantages over the time‐delay control, the UDE‐based control also brings better performance than the time‐delay control under the same conditions. Design examples and simulation results are given to demonstrate the findings. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
17.
Alon Lerner Yiorgos Chrysanthou Ariel Shamir Daniel Cohen‐Or 《Computer Graphics Forum》2010,29(7):2197-2206
Many times, even if a crowd simulation looks good in general, there could be some specific individual behaviors which do not seem correct. Spotting such problems manually can become tedious, but ignoring them may harm the simulation's credibility. In this paper we present a data‐driven approach for evaluating the behaviors of individuals within a simulated crowd. Based on video‐footage of a real crowd, a database of behavior examples is generated. Given a simulation of a crowd, an analog analysis is performed on it, defining a set of queries, which are matched by a similarity function to the database examples. The results offer a possible objective answer to the question of how similar are the simulated individual behaviors to real observed behaviors. Moreover, by changing the video input one can change the context of evaluation. We show several examples of evaluating simulated crowds produced using different techniques and comprising of dense crowds, sparse crowds and flocks. 相似文献
18.
Matching with don't-cares and a small number of mismatches 总被引:1,自引:0,他引:1
In matching with don't-cares and k mismatches we are given a pattern of length m and a text of length n, both of which may contain don't-cares (a symbol that matches all symbols), and the goal is to find all locations in the text that match the pattern with at most k mismatches, where k is a parameter. We present new algorithms that solve this problem using a combination of convolutions and a dynamic programming procedure. We give randomized and deterministic solutions that run in time O(nk2logm) and O(nk3logm), respectively, and are faster than the most efficient extant methods for small values of k. Our deterministic algorithm is the first to obtain an O(polylog(k)⋅nlogm) running time. 相似文献
19.
The Meteor Automatic Metric for Machine Translation evaluation, originally developed and released in 2004, was designed with the explicit goal of producing sentence-level scores which correlate well with human judgments of translation quality. Several key design decisions were incorporated into Meteor in support of this goal. In contrast with IBM’s Bleu, which uses only precision-based features, Meteor uses and emphasizes recall in addition to precision, a property that has been confirmed by several metrics as being critical for high correlation with human judgments. Meteor also addresses the problem of reference translation variability by utilizing flexible word matching, allowing for morphological variants and synonyms to be taken into account as legitimate correspondences. Furthermore, the feature ingredients within Meteor are parameterized, allowing for the tuning of the metric’s free parameters in search of values that result in optimal correlation with human judgments. Optimal parameters can be separately tuned for different types of human judgments and for different languages. We discuss the initial design of the Meteor metric, subsequent improvements, and performance in several independent evaluations in recent years. 相似文献
20.
A major problem in using iterative number generators of the form xi=f(xi−1) is that they can enter unexpectedly short cycles. This is hard to analyze when the generator is designed, hard to detect in real time when the generator is used, and can have devastating cryptanalytic implications. In this paper we define a measure of security, called sequence diversity, which generalizes the notion of cycle-length for noniterative generators. We then introduce the class of counter-assisted generators and show how to turn any iterative generator (even a bad one designed or seeded by an adversary) into a counter-assisted generator with a provably high diversity, without reducing the quality of generators which are already cryptographically strong. 相似文献