首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2413篇
  免费   163篇
  国内免费   3篇
电工技术   33篇
综合类   1篇
化学工业   691篇
金属工艺   46篇
机械仪表   86篇
建筑科学   95篇
矿业工程   5篇
能源动力   108篇
轻工业   321篇
水利工程   25篇
石油天然气   18篇
无线电   137篇
一般工业技术   371篇
冶金工业   94篇
原子能技术   13篇
自动化技术   535篇
  2024年   2篇
  2023年   22篇
  2022年   78篇
  2021年   126篇
  2020年   93篇
  2019年   120篇
  2018年   95篇
  2017年   105篇
  2016年   116篇
  2015年   90篇
  2014年   118篇
  2013年   223篇
  2012年   172篇
  2011年   202篇
  2010年   131篇
  2009年   110篇
  2008年   120篇
  2007年   105篇
  2006年   79篇
  2005年   56篇
  2004年   61篇
  2003年   51篇
  2002年   41篇
  2001年   32篇
  2000年   19篇
  1999年   21篇
  1998年   23篇
  1997年   21篇
  1996年   15篇
  1995年   12篇
  1994年   11篇
  1993年   13篇
  1992年   10篇
  1991年   13篇
  1989年   12篇
  1988年   7篇
  1987年   10篇
  1986年   5篇
  1985年   5篇
  1983年   3篇
  1982年   3篇
  1981年   5篇
  1980年   4篇
  1979年   6篇
  1978年   2篇
  1975年   2篇
  1972年   1篇
  1966年   1篇
  1961年   1篇
  1949年   1篇
排序方式: 共有2579条查询结果,搜索用时 484 毫秒
41.
42.
The evaluation of unsupervised outlier detection algorithms is a constant challenge in data mining research. Little is known regarding the strengths and weaknesses of different standard outlier detection models, and the impact of parameter choices for these algorithms. The scarcity of appropriate benchmark datasets with ground truth annotation is a significant impediment to the evaluation of outlier methods. Even when labeled datasets are available, their suitability for the outlier detection task is typically unknown. Furthermore, the biases of commonly-used evaluation measures are not fully understood. It is thus difficult to ascertain the extent to which newly-proposed outlier detection methods improve over established methods. In this paper, we perform an extensive experimental study on the performance of a representative set of standard k nearest neighborhood-based methods for unsupervised outlier detection, across a wide variety of datasets prepared for this purpose. Based on the overall performance of the outlier detection methods, we provide a characterization of the datasets themselves, and discuss their suitability as outlier detection benchmark sets. We also examine the most commonly-used measures for comparing the performance of different methods, and suggest adaptations that are more suitable for the evaluation of outlier detection results.  相似文献   
43.
Multi-stream automatic speech recognition (MS-ASR) has been confirmed to boost the recognition performance in noisy conditions. In this system, the generation and the fusion of the streams are the essential parts and need to be designed in such a way to reduce the effect of noise on the final decision. This paper shows how to improve the performance of the MS-ASR by targeting two questions; (1) How many streams are to be combined, and (2) how to combine them. First, we propose a novel approach based on stream reliability to select the number of streams to be fused. Second, a fusion method based on Parallel Hidden Markov Models is introduced. Applying the method on two datasets (TIMIT and RATS) with different noises, we show an improvement of MS-ASR.  相似文献   
44.
This paper investigates stability of nonlinear control systems under intermittent information. Following recent results in the literature, we replace the traditional periodic paradigm, where the up‐to‐date information is transmitted and control laws are executed in a periodic fashion, with the event‐triggered paradigm. Building on the small gain theorem, we develop input–output triggered control algorithms yielding stable closed‐loop systems. In other words, based on the currently available (but outdated) measurements of the outputs and external inputs of a plant, a mechanism triggering when to obtain new measurements and update the control inputs is provided. Depending on the noise in the environment, the developed algorithm yields stable, asymptotically stable, and ‐stable (with bias) closed‐loop systems. Control loops are modeled as interconnections of hybrid systems for which novel results on ‐stability are presented. The prediction of a triggering event is achieved by employing ‐gains over a finite horizon. By resorting to convex programming, a method to compute ‐gains over a finite horizon is devised. Finally, our approach is successfully applied to a trajectory tracking problem for unicycles. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
45.
In this paper, we address the problem of designing a control law based on sensor measurements that provides global asymptotic stabilization to a reference trajectory defined on the . The proposed control law is a function of the angular velocity, of vector measurements characterizing the position of some given landmarks, and of their rate of change. We provide sufficient conditions for the existence of synergistic potential functions on SO(3) which are pivotal in the generation of a suitable hybrid control law. We also provide sufficient conditions on the geometry of the landmarks to solve the given problem. Finally, the proposed solution is simulated and compared with a continuous feedback control law. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
46.
The customer relationship focus for banks is in development of main competencies and strategies of building strong profitable customer relationships through considering and managing the customer impression, influence on the culture of the bank, satisfactory treatment, and assessment of valued relationship building. Artificial neural networks (ANNs) are used after data segmentation and classification, where the designed model register records into two class sets, that is, the training and testing sets. ANN predicts new customer behavior from previously observed customer behavior after executing the process of learning from existing data. This article proposes an ANN model, which is developed using a six‐step procedure. The back‐propagation algorithm is used to train the ANN by adjusting its weights to minimize the difference between the current ANN output and the desired output. An evaluation process is conducted to determine whether the ANN has learned how to perform. The training process is halted periodically, and its performance is tested until an acceptable result is obtained. The principles underlying detection software are grounded in classical statistical decision theory.  相似文献   
47.
48.
The transmission of information has gone through various stages of evolution throughout its history. A stage before that of the electric telegraph was the so-called aerial/optical telegraph. It was developed towards the end of the 18th century and was in service until the middle of the 19th century. Chappe's system was widely used in France, and was the first to be in consistent use. However, a new and technologically superior system was developed soon afterwards which superseded it. Its inventor was Agustín de Betancourt, considered by some authors one of the founders of the Theory of Machines and Mechanisms, who, together with the distinguished clockmaker Breguet, presented it to the French Authorities in the turbulent decade of the 1790s.This article presents a historical review of this telegraph and analyzes its technical characteristics. It presents analytically, numerically and graphically some of the statements made about the telegraph, and corrects other subsequent observations. Lastly, a detailed reconstruction of the telegraph is made using different advanced CAD techniques, which provide an accurate static and dynamic view of each of its parts.  相似文献   
49.
This report describes the design of a modular, massive-parallel, neural-network (NN)-based vector quantizer for real-time video coding. The NN is a self-organizing map (SOM) that works only in the training phase for codebook generation, only at the recall phase for real-time image coding, or in both phases for adaptive applications. The neural net can be learned using batch or adaptive training and is controlled by an inside circuit, finite-state machine-based hard controller. The SOM is described in VHDL and implemented on electrically (FPGA) and mask (standard-cell) programmable devices.  相似文献   
50.
In glueless shared-memory multiprocessors where cache coherence is usually maintained using a directory-based protocol, the fast access to the on-chip components (caches and network router, among others) contrasts with the much slower main memory. Unfortunately, directory-based protocols need to obtain the sharing status of every memory block before coherence actions can be performed. This information has traditionally been stored in main memory, and therefore these cache coherence protocols are far from being optimal. In this work, we propose two alternative designs for the last-level private cache of glueless shared-memory multiprocessors: the lightweight directory and the SGluM cache. Our proposals completely remove directory information from main memory and store it in the home node’s L2 cache, thus reducing both the number of accesses to main memory and the directory memory overhead. The main characteristics of the lightweight directory are its simplicity and the significant improvement in the execution time for most applications. Its drawback, however, is that the performance of some particular applications could be degraded. On the other hand, the SGluM cache offers more modest improvements in execution time for all the applications by adding some extra structures that cope with the cases in which the lightweight directory fails.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号