首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8755篇
  免费   487篇
  国内免费   10篇
电工技术   119篇
综合类   5篇
化学工业   2252篇
金属工艺   137篇
机械仪表   296篇
建筑科学   339篇
矿业工程   18篇
能源动力   358篇
轻工业   1554篇
水利工程   120篇
石油天然气   44篇
武器工业   2篇
无线电   451篇
一般工业技术   1306篇
冶金工业   848篇
原子能技术   62篇
自动化技术   1341篇
  2024年   32篇
  2023年   92篇
  2022年   297篇
  2021年   400篇
  2020年   253篇
  2019年   276篇
  2018年   354篇
  2017年   370篇
  2016年   390篇
  2015年   268篇
  2014年   354篇
  2013年   685篇
  2012年   554篇
  2011年   674篇
  2010年   452篇
  2009年   476篇
  2008年   426篇
  2007年   352篇
  2006年   299篇
  2005年   203篇
  2004年   172篇
  2003年   170篇
  2002年   147篇
  2001年   102篇
  2000年   114篇
  1999年   108篇
  1998年   302篇
  1997年   218篇
  1996年   139篇
  1995年   97篇
  1994年   60篇
  1993年   55篇
  1992年   25篇
  1991年   23篇
  1990年   25篇
  1989年   23篇
  1988年   20篇
  1987年   16篇
  1986年   17篇
  1985年   20篇
  1984年   24篇
  1983年   25篇
  1982年   14篇
  1981年   16篇
  1980年   15篇
  1979年   12篇
  1978年   11篇
  1977年   17篇
  1976年   27篇
  1971年   7篇
排序方式: 共有9252条查询结果,搜索用时 15 毫秒
71.
Robots must be able to adapt their motor behavior to unexpected situations in order to safely move among humans. A necessary step is to be able to predict failures, which result in behavior abnormalities and may cause irrecoverable damage to the robot and its surroundings, i.e. humans. In this paper we build a predictive model of sensor traces that enables early failure detection by means of a skill memory. Specifically, we propose an architecture based on a biped locomotion solution with improved robustness due to sensory feedback, and extend the concept of Associative Skill Memories (ASM) to periodic movements by introducing several mechanisms into the training workflow, such as linear interpolation and regression into a Dynamical Motion Primitive (DMP) system such that representation becomes time invariant and easily parameterizable. The failure detection mechanism applies statistical tests to determine the optimal operating conditions. Both training and failure testing were conducted on a DARwIn-OP inside a simulation environment to assess and validate the failure detection system proposed. Results show that the system performance in terms of the compromise between sensitivity and specificity is similar with and without the proposed mechanism, while achieving a significant data size reduction due to the periodic approach taken.  相似文献   
72.
Instead of traditional (multi-class) learning approaches that assume label independency, multi-label learning approaches must deal with the existing label dependencies and relations. Many approaches try to model these dependencies in the process of learning and integrate them in the final predictive model, without making a clear difference between the learning process and the process of modeling the label dependencies. Also, the label relations incorporated in the learned model are not directly visible and can not be (re)used in conjunction with other learning approaches. In this paper, we investigate the use of label hierarchies in multi-label classification, constructed in a data-driven manner. We first consider flat label sets and construct label hierarchies from the label sets that appear in the annotations of the training data by using a hierarchical clustering approach. The obtained hierarchies are then used in conjunction with hierarchical multi-label classification (HMC) approaches (two local model approaches for HMC, based on SVMs and PCTs, and two global model approaches, based on PCTs for HMC and ensembles thereof). The experimental results reveal that the use of the data-derived label hierarchy can significantly improve the performance of single predictive models in multi-label classification as compared to the use of a flat label set, while this is not preserved for the ensemble models.  相似文献   
73.
Real-time interactive multimedia communications are becoming increasingly useful for education, business, e-commerce and e-government, providing an enriched user experience in teleconferencing, e-meetings, distance training and product demonstrations. Large corporations are usually located at several sites, so real-time multipoint sessions within corporations are especially difficult. IP multicast is available or feasible within each site of an organization. Thus, corporate networks can be considered as various multicast-capable networks interconnected through a wide area network without multicast connectivity. This paper proposes a resilient self-managed overlay network to support real-time multipoint interactive sessions within corporate networks. The proposed overlay takes advantage of the configuration of corporate networks to self-organize and provide an efficient media delivery service, making use of multicast communications wherever available. Various self-healing techniques are implemented allowing for the continuity of ongoing sessions in spite of network disruptions and entity failures. Extensive simulations and tests have been carried out to assess the performance and resilience of the overlay facing several types of disruptions.  相似文献   
74.
In the context of fault detection and isolation of linear parameter‐varying systems, a challenging task appears when the dynamics and the available measurements render the model unobservable, which invalidates the use of standard set‐valued observers. Two results are obtained in this paper, namely, using a left‐coprime factorization, one can achieve set‐valued estimates with ultimately bounded hyper‐volume and convergence dependent on the slowest unobservable mode; and by rewriting the set‐valued observer equations and taking advantage of a coprime factorization, it is possible to have a low‐complexity fault detection and isolation method. Performance is assessed through simulation, illustrating, in particular, the detection time for various types of faults. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
75.
Compromising legitimate accounts has been the most used strategy to spread malicious content on OSN (Online Social Network). To address this problem, we propose a pure text mining approach to check if an account has been compromised based on its posts content. In the first step, the proposed approach extracts the writing style from the user account. The second step comprehends the k-Nearest Neighbors algorithm (k-NN) to evaluate the post content and identify the user. Finally, Baseline Updating (third step) consists of a continuous updating of the user baseline to support the current trends and seasonality issues of user’s posts. Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed method is stable and can detect the compromised accounts. An important observation is the Baseline Updating contribution, which leads to an enhancement of accuracy superior of 60 %. Regarding average accuracy, the developed method achieved results over 93 %.  相似文献   
76.
Dataflow programs are widely used. Each program is a directed graph where nodes are computations and edges indicate the flow of data. In prior work, we reverse-engineered legacy dataflow programs by deriving their optimized implementations from a simple specification graph using graph transformations called refinements and optimizations. In MDE speak, our derivations were PIM-to-PSM mappings. In this paper, we show how extensions complement refinements, optimizations, and PIM-to-PSM derivations to make the process of reverse engineering complex legacy dataflow programs tractable. We explain how optional functionality in transformations can be encoded, thereby enabling us to encode product lines of transformations as well as product lines of dataflow programs. We describe the implementation of extensions in the \(\mathtt{ReFlO}\) tool and present two non-trivial case studies as evidence of our work’s generality.  相似文献   
77.
This paper addresses the problem of stabilizing to a desired equilibrium point an eye-in-hand system, which consists of a single camera mounted on a rigid body free to move on . It is assumed that there is a collection of landmarks fixed in the environment and that the image coordinates of those landmarks are provided to the system by an on-board CCD camera. The proposed method addresses not only the problem of stabilization but also that of maintaining feature visibility along the system’s trajectory. The resulting solution consists of a feedback control law based on the current and desired image coordinates and reconstructed attitude and depth ratio information, which guarantees that (i) the desired equilibrium point is an almost global attractor; (ii) a set of necessary conditions for feature visibility holds throughout the system’s trajectories; and (iii) the image of a predefined feature point is kept inside the camera’s field of view.  相似文献   
78.
This paper discusses methods for content-based image retrieval (CBIR) systems based on relevance feedback according to two active learning paradigms, named greedy and planned. In greedy methods, the system aims to return the most relevant images for a query at each iteration. In planned methods, the most informative images are returned during a few iterations and the most relevant ones are only presented afterward. In the past, we proposed a greedy approach based on optimum-path forest classification (OPF) and demonstrated its gain in effectiveness with respect to a planned method based on support-vector machines and another greedy approach based on multi-point query. In this work, we introduce a planned approach based on the OPF classifier and demonstrate its gain in effectiveness over all methods above using more image databases. In our tests, the most informative images are better obtained from images that are classified as relevant, which differs from the original definition. The results also indicate that both OPF-based methods require less user involvement (efficiency) to satisfy the user's expectation (effectiveness), and provide interactive response times.  相似文献   
79.
We develop optimal approximation estimates for T-splines in the case of geometries obtained by gluing two standard tensor product patches. We derive results both for the T-spline space in the parametric domain and the mapped T-NURBS in the physical one. A set of numerical tests in complete accordance with the theoretical developments is also presented.  相似文献   
80.
In the last few decades the continuous monitoring of complex dynamic systems has become an increasingly important issue across diverse engineering areas. This paper presents a pattern recognition based system that uses visual-based efficient invariants features for continuous monitoring of induction motors. The procedures presented here are based on the image identification of the 3-D current state space patterns that allow the identification of distinct fault types and, furthermore, their corresponding severity. This automatic fault detection system deals with time-variant electric currents and is based on the identification of three-phase stator currents specified patterns. Several simulation and experimental results are also presented in order to verify the effectiveness of the proposed methodology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号