首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   476篇
  免费   18篇
电工技术   6篇
综合类   1篇
化学工业   97篇
金属工艺   17篇
机械仪表   9篇
建筑科学   18篇
矿业工程   8篇
能源动力   51篇
轻工业   23篇
水利工程   5篇
石油天然气   1篇
无线电   53篇
一般工业技术   56篇
冶金工业   8篇
原子能技术   1篇
自动化技术   140篇
  2024年   2篇
  2023年   5篇
  2022年   17篇
  2021年   20篇
  2020年   20篇
  2019年   12篇
  2018年   19篇
  2017年   17篇
  2016年   21篇
  2015年   13篇
  2014年   20篇
  2013年   51篇
  2012年   30篇
  2011年   43篇
  2010年   23篇
  2009年   21篇
  2008年   27篇
  2007年   19篇
  2006年   13篇
  2005年   20篇
  2004年   11篇
  2003年   11篇
  2002年   12篇
  2001年   7篇
  2000年   2篇
  1999年   4篇
  1998年   5篇
  1997年   7篇
  1996年   6篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   3篇
  1990年   4篇
  1989年   1篇
  1987年   2篇
  1985年   1篇
排序方式: 共有494条查询结果,搜索用时 15 毫秒
41.
The water activities of the mixed aqueous electrolyte NaCl–BaCl2(aq) are measured at total molalities from 0.25 mol kg−1 to about saturation for different ionic strength fractions (y) of NaCl with y=0.33,0.50,0.67. The results allow the deduction of osmotic coefficients. The experimental results are compared with the predictions of the Zdanovskii, Stokes, and Robinson (ZSR), Kusik and Meissner (KM), Robinson and Stokes (RS), Lietzke and Stoughton (LSII), Reilly, Wood, and Robinson (RWR), and Pitzer models. From these measurements, the Pitzer mixing ionic parameters are determined and used to predict the solute activity coefficients in the mixture. The excess Gibbs energy is also determined.  相似文献   
42.
This paper presents a performance study of a one-dimensional search algorithm for solving general high-dimensional optimization problems. The proposed approach is a hybrid between a line search algorithm of Glover (The 3-2-3, stratified split and nested interval line search algorithms. Research report, OptTek Systems, Boulder, CO, 2010) and an improved variant of a global method of Gardeux et al. (Unidimensional search for solving continuous high-dimensional optimization problems. In: ISDA ’09: Proceedings of the 2009 ninth international conference on intelligent systems design and applications, IEEE Computer Society, Washington, DC, USA, pp 1096–1101, 2009) that uses line search algorithms as subroutines. The resulting algorithm, called EM323, was tested on 19 scalable benchmark functions, with a view to observing how optimization techniques for continuous optimization problems respond with increasing dimension. To this end, we report the algorithm’s performance on the 50, 100, 200, 500 and 1,000-dimension versions of each function. Computational results are given comparing our method with three leading evolutionary algorithms. Statistical analysis discloses that our method outperforms the other methods by a significant margin.  相似文献   
43.
Regularization, Scale-Space, and Edge Detection Filters   总被引:2,自引:0,他引:2  
Computational vision often needs to deal with derivatives ofdigital images. Such derivatives are not intrinsic properties ofdigital data; a paradigm is required to make them well-defined.Normally, a linear filtering is applied. This can be formulated interms of scale-space, functional minimization, or edge detectionfilters. The main emphasis of this paper is to connect these theoriesin order to gain insight in their similarities and differences. We donot want, in this paper, to take part in any discussion of how edgedetection must be performed, but will only link some of the current theories. We take regularization (or functional minimization) as astarting point, and show that it boils down to Gaussian scale-space ifwe require scale invariance and a semi-group constraint to besatisfied. This regularization implies the minimization of afunctional containing terms up to infinite order of differentiation.If the functional is truncated at second order, the Canny-Deriche filter arises. It is also shown that higher dimensional regularizationboils down to a rotated version of the one dimensional case, whenCartesian invariance is imposed and the image is vanishing at theborders. This means that the results from 1D regularization can beeasily generalized to higher dimensions. Finally we show how anefficient implementation of regularization of order n can be made byrecursive filtering using 2n multiplications and additions peroutput element without introducing any approximation.  相似文献   
44.
ABSTRACT

Near Field Communication (NFC) technology has been used recently for electronic payment between an Automated Teller Machine (ATM) and a Smartphone. It is threatened by several attacks that can steal the user personal data like the password or the Personal Identification Number (PIN). In this paper, we present Dynamic Array PIN (DAP), a novel approach for user authentication on a Smartphone that uses NFC electronic payment with an ATM. Our analysis and experimentation prove that this technique protects against thirteen different attacks and is cost-effective in terms of required hardware, authentication time, computing power and storage space.  相似文献   
45.
In this article, an extension of the spatial filter method to study Fabry‐Perot antennas with homogeneous or inhomogeneous partially reflecting surface (PRS) of finite size is proposed. This tool was subsequently validated through the study of different Fabry‐Perot antennas, with homogeneous PRS and inhomogeneous GRadient‐INdex (GRIN) PRS that present very high side lobe level (SLL). Since they are due to structure truncation, a new inhomogeneous PRS to reduce the SLL is designed with the new analytical tool. The new inhomogeneous PRS for Fabry‐Perot antenna is characterized by simulations and measurements. Compared to the homogeneous PRS antenna, the proposed PRS allows a SLL reduction of 5 dB without decreasing the 14 dBi directivity.  相似文献   
46.
Almost all binarization methods have a few parameters that require setting. However, they do not usually achieve their upper-bound performance unless the parameters are individually set and optimized for each input document image. In this work, a learning framework for the optimization of the binarization methods is introduced, which is designed to determine the optimal parameter values for a document image. The framework, which works with any binarization method, has a standard structure, and performs three main steps: (i) extracts features, (ii) estimates optimal parameters, and (iii) learns the relationship between features and optimal parameters. First, an approach is proposed to generate numerical feature vectors from 2D data. The statistics of various maps are extracted and then combined into a final feature vector, in a nonlinear way. The optimal behavior is learned using support vector regression (SVR). Although the framework works with any binarization method, two methods are considered as typical examples in this work: the grid-based Sauvola method, and Lu’s method, which placed first in the DIBCO’09 contest. The experiments are performed on the DIBCO’09 and H-DIBCO’10 datasets, and combinations of these datasets with promising results.  相似文献   
47.
Thermodynamic properties of the mixed aqueous electrolyte systems of the lithium and cesium chlorides and sodium and cesium chlorides have been studied by the hygrometric method at 298.15 K. The water activities of these systems were measured at total molalities from 0.3 mol kg−1 to saturation for different ionic strength fractions y of CsCl for the systems CsCl–LiCl(aq) and CsCl–NaCl(aq) with y=0.33, 0.50 and 0.67. The results allow the deduction of osmotic coefficients. The experimental results are compared with calculations made using the Zdanovskii–Stokes–Robinson (ZSR), Kusik and Meissner (KM), Robinson and Stokes (RS), Lietzke and Stoughton (LSII), Reilly, Wood and Robinson (RWR) rules, and the Pitzer model. From these measurements, the Pitzer mixing ionic parameters are determined and used to obtain the solute activity coefficients of the mixture for different ionic strength fractions y.  相似文献   
48.
An indulgent algorithm is a distributed algorithm that tolerates asynchronous periods of the network when process crash detection is unreliable. This paper presents a tight bound on the time complexity of indulgent consensus algorithms. We consider a round-based eventually synchronous model, and we show that any t-resilient consensus algorithm in this model, requires at least t+2 rounds for a global decision even in runs that are synchronous. We contrast our lower bound with the well-known t+1 round tight bound on consensus in the synchronous model. We then prove the bound to be tight by exhibiting a new t-resilient consensus algorithm in the eventually synchronous model that reaches a global decision at round t+2 in every synchronous run. Our new algorithm is in this sense significantly faster than the most efficient indulgent algorithm we know of, which requires 2t+2 rounds in synchronous runs. Our lower bound applies to round-based consensus algorithms with unreliable failure detectors such as ⋄ P and ⋄ S, and our matching algorithm can be adapted to such failure detectors. This work is partially supported by the Swiss National Science Foundation (project number 510-207).  相似文献   
49.
In this paper, a fractional order control law is proposed and implemented for the evaluation of trajectory tracking performance of a rotary flexible-joint system. A state feedback based fractional integral control scheme is used in this proposed method. In this scheme, state feedback is responsible for stabilizing the system. The compensator, in series with the fractional integrator leads to obtain a similar closed-loop transient response like Bode’s ideal transfer function. The effectiveness of the proposed controller in tracking and being robust against parameter uncertainties is demonstrated through simulation. In addition, to show the usefulness of the proposed control scheme, the fractional controller is compared to an integer state feedback control by simulation and through experimentation on the Quanser’s rotary flexible-joint system.  相似文献   
50.
In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号