首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1170篇
  免费   109篇
  国内免费   2篇
电工技术   14篇
综合类   2篇
化学工业   363篇
金属工艺   17篇
机械仪表   25篇
建筑科学   38篇
矿业工程   4篇
能源动力   55篇
轻工业   112篇
水利工程   10篇
石油天然气   1篇
无线电   124篇
一般工业技术   222篇
冶金工业   43篇
原子能技术   9篇
自动化技术   242篇
  2023年   22篇
  2022年   65篇
  2021年   86篇
  2020年   51篇
  2019年   32篇
  2018年   59篇
  2017年   47篇
  2016年   45篇
  2015年   46篇
  2014年   69篇
  2013年   89篇
  2012年   106篇
  2011年   86篇
  2010年   75篇
  2009年   63篇
  2008年   50篇
  2007年   53篇
  2006年   30篇
  2005年   30篇
  2004年   21篇
  2003年   22篇
  2002年   18篇
  2001年   7篇
  2000年   4篇
  1999年   9篇
  1998年   17篇
  1997年   10篇
  1996年   8篇
  1995年   7篇
  1994年   8篇
  1993年   8篇
  1992年   4篇
  1991年   3篇
  1990年   3篇
  1989年   3篇
  1987年   2篇
  1986年   1篇
  1985年   3篇
  1984年   4篇
  1983年   3篇
  1982年   2篇
  1981年   2篇
  1980年   2篇
  1979年   2篇
  1978年   1篇
  1976年   2篇
  1974年   1篇
排序方式: 共有1281条查询结果,搜索用时 15 毫秒
11.
Human activity recognition is a challenging problem for context-aware systems and applications. Research in this field has mainly adopted techniques based on supervised learning algorithms, but these systems suffer from scalability issues with respect to the number of considered activities and contextual data. In this paper, we propose a solution based on the use of ontologies and ontological reasoning combined with statistical inferencing. Structured symbolic knowledge about the environment surrounding the user allows the recognition system to infer which activities among the candidates identified by statistical methods are more likely to be the actual activity that the user is performing. Ontological reasoning is also integrated with statistical methods to recognize complex activities that cannot be derived by statistical methods alone. The effectiveness of the proposed technique is supported by experiments with a complete implementation of the system using commercially available sensors and an Android-based handheld device as the host for the main activity recognition module.  相似文献   
12.
In this paper, a framework for the automatic synthesis of hybrid fuzzy/numerical controllers is proposed. The methodology is based on model checking and on a very precise analysis of a system. This allows one to synthesize optimal numerical controllers and then use them to consistently improve fuzzy controllers. Moreover, we present a new approach that integrates the numerical and the fuzzy components and automatically outputs a hybrid controller. Such a hybrid controller exploits the optimality of numerical controllers and the robustness of fuzzy ones, and it is very compact and fast to read thanks to the use of OBDDs. We apply our methodology to two benchmark problems, the dc motor and the inverted pendulum. The results show that the hybrid controller can handle linear as well as nonlinear systems outperforming both the numerical and the fuzzy controllers.  相似文献   
13.
14.
A P2P strategy for QoS discovery and SLA negotiation in Grid environment   总被引:1,自引:0,他引:1  
In recent years, Grid systems and Peer to Peer networks are the most commonly-used solutions to achieve the same goal: the sharing of resources and services in heterogeneous, dynamic, distributed environments. Many studies have proposed hybrid approaches that try to conjugate the advantages of the two models. This paper proposes an architecture that integrates the P2P interaction model in Grid environments, so as to build an open cooperative model wherein Grid entities are composed in a decentralized way. In particular, this paper focuses on a QoS aware discovery algorithm for P2P Grid systems, analyzing protocol and explaining techniques used to improve its performance.  相似文献   
15.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.  相似文献   
16.
We analyze generalization in XCSF and introduce three improvements. We begin by showing that the types of generalizations evolved by XCSF can be influenced by the input range. To explain these results we present a theoretical analysis of the convergence of classifier weights in XCSF which highlights a broader issue. In XCSF, because of the mathematical properties of the Widrow-Hoff update, the convergence of classifier weights in a given subspace can be slow when the spread of the eigenvalues of the autocorrelation matrix associated with each classifier is large. As a major consequence, the system's accuracy pressure may act before classifier weights are adequately updated, so that XCSF may evolve piecewise constant approximations, instead of the intended, and more efficient, piecewise linear ones. We propose three different ways to update classifier weights in XCSF so as to increase the generalization capabilities of XCSF: one based on a condition-based normalization of the inputs, one based on linear least squares, and one based on the recursive version of linear least squares. Through a series of experiments we show that while all three approaches significantly improve XCSF, least squares approaches appear to be best performing and most robust. Finally we show how XCSF can be extended to include polynomial approximations.  相似文献   
17.
In this paper we discuss reasoning about reasoning in a multiple agent scenario. We consider agents that are perfect reasoners, loyal, and that can take advantage of both the knowledge and ignorance of other agents. The knowledge representation formalism we use is (full) first order predicate calculus, where different agents are represented by different theories, and reasoning about reasoning is realized via a meta-level representation of knowledge and reasoning. The framework we provide is pretty general: we illustrate it by showing a machine checked solution to the three wisemen puzzle. The agents' knowledge is organized into units: the agent's own knowledge about the world and its knowledge about other agents are units containing object-level knowledge; a unit containing meta-level knowledge embodies the reasoning about reasoning and realizes the link among units. In the paper we illustrate the meta-level architecture we propose for problem solving in a multi-agent scenario; we discuss our approach in relation to the modal one and we compare it with other meta-level architectures based on logic. Finally, we look at a class of applications that can be effectively modeled by exploiting the meta-level approach to reasoning about knowledge and reasoning.  相似文献   
18.
We present a decidability result for the model checking of a certain class of properties that can be conveniently expressed as ground formulae of a first-order temporal fragment. The decidability result is obtained by importing into the context of model-checking problems some techniques developed for the combination of decision procedures for the satisfiability of constraints. The general decidability result is then specialized for checking properties of particular interest, such as liveness and safety, and, for the latter case, a more optimized algorithm has been proposed.  相似文献   
19.
Evaluation of patient satisfaction has become an important indicator for assessing health care quality. Fresenius Medical Care (FME) as a global provider of dialysis services through its NephroCare network has a strong interest in monitoring patient satisfaction.The aim of the paper is to test and validate a methodology for detecting a residual area of low satisfaction in dialysis patients.The FME Patient Satisfaction Programme questionnaire was distributed to haemodialysis (HD) patients treated in 335 centers of its network. It contained 79 questions covering various satisfaction aspects regarding Dialysis Unit, Dialysis Arrangement, Nurses, Doctors, etc.To analyse the data provided by the questionnaire, the Self-Organising Map (SOM) method was used. SOM is a neural network model for clustering and projecting high-dimensional data into a low-dimensional space, preserving topological relationships of original high-dimensional data spaces.10,632 HD patients completed the questionnaire. Mean age was 63.05 ± 14.93 years with 56.69% males. Response rate was 66%. Overall level of satisfaction was 1.99 (range from ?3 to +3). On average patients were very satisfied with all issues. Nevertheless, a group of patients, around 60 years old, balanced gender ratio, whose level of satisfaction was lower than 1, were highlighted.In the NephroCare clinics patient satisfaction with service is rather high. While traditional analysis usually stops here, the SOM method allows identification of areas of potential improvement for specific patient groups.  相似文献   
20.
We present a compact modular apparatus with a flexible design that will be operated at the DiProI beamline of the Fermi@Elettra free electron laser (FEL) for performing static and time-resolved coherent diffraction imaging experiments, taking advantage of the full coherence and variable polarization of the short seeded FEL pulses. The apparatus has been assembled and the potential of the experimental setup is demonstrated by commissioning tests with coherent synchrotron radiation. This multipurpose experimental station will be open to general users after installation at the Fermi@Elettra free electron laser in 2011.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号