首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   403篇
  免费   18篇
  国内免费   1篇
电工技术   7篇
综合类   1篇
化学工业   118篇
金属工艺   8篇
机械仪表   11篇
建筑科学   12篇
能源动力   20篇
轻工业   33篇
水利工程   5篇
石油天然气   4篇
无线电   18篇
一般工业技术   97篇
冶金工业   7篇
自动化技术   81篇
  2024年   3篇
  2023年   13篇
  2022年   20篇
  2021年   31篇
  2020年   12篇
  2019年   13篇
  2018年   16篇
  2017年   18篇
  2016年   24篇
  2015年   18篇
  2014年   10篇
  2013年   44篇
  2012年   27篇
  2011年   20篇
  2010年   15篇
  2009年   31篇
  2008年   16篇
  2007年   12篇
  2006年   14篇
  2005年   8篇
  2004年   9篇
  2003年   2篇
  2002年   10篇
  2001年   8篇
  2000年   5篇
  1999年   7篇
  1998年   5篇
  1997年   4篇
  1996年   2篇
  1991年   1篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1979年   1篇
排序方式: 共有422条查询结果,搜索用时 15 毫秒
41.
There is significant interest in the network management and industrial security community about the need to identify the “best” and most relevant features for network traffic in order to properly characterize user behaviour and predict future traffic. The ability to eliminate redundant features is an important Machine Learning (ML) task because it helps to identify the best features in order to improve the classification accuracy as well as to reduce the computational complexity related to the construction of the classifier. In practice, feature selection (FS) techniques can be used as a preprocessing step to eliminate irrelevant features and as a knowledge discovery tool to reveal the “best” features in many soft computing applications. In this paper, we investigate the advantages and disadvantages of such FS techniques with new proposed metrics (namely goodness, stability and similarity). We continue our efforts toward developing an integrated FS technique that is built on the key strengths of existing FS techniques. A novel way is proposed to identify efficiently and accurately the “best” features by first combining the results of some well-known FS techniques to find consistent features, and then use the proposed concept of support to select a smallest set of features and cover data optimality. The empirical study over ten high-dimensional network traffic data sets demonstrates significant gain in accuracy and improved run-time performance of a classifier compared to individual results produced by some well-known FS techniques.  相似文献   
42.
In complex product design environments, new product development (NPD) becomes all about trade-offs and therefore trade-off management gets an important responsibility for designers. Correspondingly, in these environments, customer co-creation in NPD requires multi-issue negotiation with issue trade-offs. However, there is no study researching customer co-creation in NPD through multi-issue negotiation with issue trade-offs according to our best knowledge. This study presents a framework for customer co-creation in NPD through a multi-issue negotiation mechanism, namely; Modified Even-Swaps, to fill this gap. This mechanism uses a modified version of Even-Swaps method, that finds differences among alternatives and utilizes the differences for assessing the value of multi-issue offers, and that includes a fuzzy-inference-system for bargaining on several issues simultaneously. In the proposed framework, customers are represented by “lead-user”. Thus, negotiation is performed between lead-user and designer. In order to show how the framework works, an illustrative example is also presented.  相似文献   
43.
Unmanned Aircraft (UA) have become an integral part of the present-day joint air operations. UA have potential to be employed across the full spectrum of Air Force functions. On the other hand, UA technology could be a subject of an asymmetric use by state actors in high or low density conflict, and/or by non-state actors in many ways including terrorism, drug smuggling, and limited attack with unconventional payloads i.e. biological or chemical agents. Therefore countering the threat associated with the hostile UA use could be necessary in the future. First part of the research revealed that UA can be a threat in the future. In the second part of the research, the SWOT (Strengths-Weaknesses-Opportunities-Threats) analysis supplemented with the Tree analysis (SWOT+Tree) provided a broader look for investigating the factors related to hostile UA use analytically. In literature, there is little information about the concepts for CUAOPS. The final goal of the paper is to find possible solutions and means for a better understanding of the nature of CUAOPS.  相似文献   
44.
45.
Mapping quality of the self-organising maps (SOMs) is sensitive to the map topology and initialisation of neurons. In this article, in order to improve the convergence of the SOM, an algorithm based on split and merge of clusters to initialise neurons is introduced. The initialisation algorithm speeds up the learning process in large high-dimensional data sets. We also develop a topology based on this initialisation to optimise the vector quantisation error and topology preservation of the SOMs. Such an approach allows to find more accurate data visualisation and consequently clustering problem. The numerical results on eight small-to-large real-world data sets are reported to demonstrate the performance of the proposed algorithm in the sense of vector quantisation, topology preservation and CPU time requirement.  相似文献   
46.
The weather in Baghdad, Iraq is hot dry in the summer while water is plentiful and cheap. These are conditions which encourage the use of evaporative cooling. A building with one space in it was used to test the effect of a roof pond which was ventilated mechanically for summer cooling. Thermal measurements were taken for the room in normal conditions without a pond, with a lone pond and no mechanical ventilation, and then finally with mechanically forced ventilation. The results showed a marked improvement in the space temperature with a significant reduction during the peak time outside temperatures at 3 O’clock reaching 6.0 °C between the room without the pond and with a ventilated one and 6.5° at 18:00 during peak inside temperatures. The study also showed that improvements would be better in real-life conditions where exterior wall area is less than the test room.  相似文献   
47.
Zinc containing oil based polyesteramide resins were synthesized by condensation polymerization reaction between castor/soyabean oil derived castor/soyabean fatty amide diol (HECA/HESA), Zn (OH)2 and adipic acid. The conventional spectroscopic techniques such as FTIR, 1HNMR, 13CNMR have been used to establish the structure of the polymers. Standard laboratory methods were used to study the physicochemical characteristics like acid value, hydroxyl value, saponification value, iodine value, specific gravity, and viscosity. The thermal behaviour of the polymers was analyzed by using thermo gravimetric analysis (TGA) and differential scanning calorimetry (DSC). In vitro antifungal (anticandidial) activity of the polymers was studied against C. albicans ATCC-10261, C. glabrata ATCC-90030 and C. tropicalis ATCC-750, respectively. Antibacterial activity against Gram positive (S. subtillis) and Gram negative bacteria (E. coli and S. typhi) was also examined. For more accuracy, growth curve studies were carried out with the polymer SZ showing higher biological activity against E. coli by using conventional spectrophotometer. The result showed that the polymers have potent anticandidial and antibacterial activities.  相似文献   
48.
49.
50.
The human motion data collected using wearables like smartwatches can be used for activity recognition and emergency event detection. This is especially applicable in the case of elderly or disabled people who live self-reliantly in their homes. These sensors produce a huge volume of physical activity data that necessitates real-time recognition, especially during emergencies. Falling is one of the most important problems confronted by older people and people with movement disabilities. Numerous previous techniques were introduced and a few used webcam to monitor the activity of elderly or disabled people. But, the costs incurred upon installation and operation are high, whereas the technology is relevant only for indoor environments. Currently, commercial wearables use a wireless emergency transmitter that produces a number of false alarms and restricts a user’s movements. Against this background, the current study develops an Improved Whale Optimization with Deep Learning-Enabled Fall Detection for Disabled People (IWODL-FDDP) model. The presented IWODL-FDDP model aims to identify the fall events to assist disabled people. The presented IWODL-FDDP model applies an image filtering approach to pre-process the image. Besides, the EfficientNet-B0 model is utilized to generate valuable feature vector sets. Next, the Bidirectional Long Short Term Memory (BiLSTM) model is used for the recognition and classification of fall events. Finally, the IWO method is leveraged to fine-tune the hyperparameters related to the BiLSTM method, which shows the novelty of the work. The experimental analysis outcomes established the superior performance of the proposed IWODL-FDDP method with a maximum accuracy of 97.02%.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号