首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   448篇
  免费   26篇
电工技术   20篇
综合类   1篇
化学工业   52篇
金属工艺   2篇
机械仪表   5篇
建筑科学   12篇
能源动力   17篇
轻工业   59篇
水利工程   5篇
武器工业   1篇
无线电   61篇
一般工业技术   53篇
冶金工业   47篇
原子能技术   2篇
自动化技术   137篇
  2023年   1篇
  2022年   10篇
  2021年   13篇
  2020年   7篇
  2019年   8篇
  2018年   14篇
  2017年   15篇
  2016年   10篇
  2015年   9篇
  2014年   17篇
  2013年   30篇
  2012年   31篇
  2011年   23篇
  2010年   31篇
  2009年   26篇
  2008年   20篇
  2007年   24篇
  2006年   15篇
  2005年   20篇
  2004年   15篇
  2003年   11篇
  2002年   12篇
  2001年   10篇
  2000年   8篇
  1999年   10篇
  1998年   17篇
  1997年   12篇
  1996年   10篇
  1995年   9篇
  1994年   4篇
  1993年   4篇
  1991年   1篇
  1990年   2篇
  1989年   4篇
  1988年   3篇
  1987年   3篇
  1986年   4篇
  1985年   3篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1973年   2篇
排序方式: 共有474条查询结果,搜索用时 15 毫秒
11.
Soft computing continuously gains interest in many fields of academic and industrial domain; among the most notable characteristics for using soft computing methodological tools is the ability to handle with vague and imprecise data in decision making processes. Similar conditions are often encountered in requirements engineering. In this paper, we introduce the PriS approach, a security and privacy requirements engineering framework which aims at incorporating privacy requirements early in the system development process. Specifically, PriS provides a set of concepts for modelling privacy requirements in the organisation domain and a systematic way-of-working for translating these requirements into system models. The conceptual model of PriS uses a goal hierarchy structure. Every privacy requirement is either applied or not on every goal. To this end every privacy requirement is a variable that can take two values [0,1] on every goal meaning that the requirements constraints the goal (value 1) or not (value 0). Following this way of working PriS ends up suggesting a number of implementation techniques based on the privacy requirements constraining the respective goals. Taking into account that the mapping of privacy variables to a crisp set consisting of two values [0,1] is constraining, we extend also the PriS framework so as to be able to address the degree of participation of every privacy requirement towards achieving the generic goal of privacy. Therefore, we propose a fuzzification of privacy variables that maps the expression of the degree of participation of each privacy variable to the [0,1] interval. We also present a mathematical framework that allows the concurrent management of combined independent preferences towards the necessity of a privacy measure; among the advantages of the presented extended framework is the scalability of the approach in such a way that the results are not limited by the number of independent opinions or by the number of factors considered while reasoning for a specific selection of privacy measures.  相似文献   
12.
In this paper, we propose novel elastic graph matching (EGM) algorithms for face recognition assisted by the availability of 3D facial geometry. More specifically, we conceptually extend the EGM algorithm in order to exploit the 3D nature of human facial geometry for face recognition/verification. In order to achieve that, first we extend the matching module of the EGM algorithm in order to capitalize on the 2.5D facial data. Furthermore, we incorporate the 3D geometry into the multiscale analysis used and build a novel geodesic multiscale morphological pyramid of dilations/erosions in order to fill the graph jets. We show that the proposed advances significantly enhance the performance of EGM algorithms. We demonstrate the efficiency of the proposed advances in the face recognition/verification problem using photometric stereo.  相似文献   
13.
We present an algorithm for the reconstruction of images from irregularly placed samples, using linear splines with control points on a hexagonal grid. Several spline approximations are computed for different transformations of the control point grid (e.g. translations and rotations). These approximations are then merged together after compensation of the transformations, yielding a high-quality invariant image reconstruction. Evaluations show that the use of hexagonal grids of the “invariance by integration” principle improves reconstruction quality. An application to image coding is also presented.  相似文献   
14.
We consider spatiotemporal systems and study their l and l2 robustness properties in the presence of spatiotemporal perturbations. In particular, we consider spatially invariant nominal models and provide necessary and sufficient conditions for system robustness for the cases when the underlying perturbations are linear spatiotemporal varying, and nonlinear spatiotemporal invariant, unstructured or structured. It turns out that these conditions are analogous to the scaled small gain condition (which is equivalent to a spectral radius condition and a linear matrix inequality for the l and l2 cases, respectively) derived for standard linear time‐invariant models subject to time‐varying linear and time‐invariant nonlinear perturbations. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
15.
Advances on sensor technology, wireless environments and data mining introduce new possibilities in the healthcare sector, realizing the anytime-anywhere access to medical information. Towards this direction, integration of packet-switched networks and sensor devices can be effective in deploying assistive environments, such as home monitoring for elderly or patients. In this paper we describe a policy-based architecture that utilizes wireless sensor devices, advanced network topologies and software agents to enable remote monitoring of patients and elderly people; through the aforementioned technologies we achieve continuous monitoring of a patient’s condition and we can proceed when necessary with proper actions. We also present a software framework and network architecture that realizes the provision of remote medical services, in compliance with the imposed security and privacy requirements. A proof of concept prototype is also deployed, along with an evaluation of the overall architecture’s performance.  相似文献   
16.
Collaborative and content-based filtering are the major methods in recommender systems that predict new items that users would find interesting. Each method has advantages and shortcomings of its own and is best applied in specific situations. Hybrid approaches use elements of both methods to improve performance and overcome shortcomings. In this paper, we propose a hybrid approach based on content-based and collaborative filtering, implemented in MoRe, a movie recommendation system. We also provide empirical comparison of the hybrid approach to the base methods of collaborative and content-based filtering and draw useful conclusions upon their performance.  相似文献   
17.
The paper presents computer-aided methods that allocate a dental implant and suggest its size, during the pre-operative planning stage, in conformance with introduced optimization criteria and established clinical requirements. Based on computed tomography data of the jaw and prosthesis anatomy, single tooth cases are planned for the best-suited implant insertion at a user-defined region. An optimum implantation axis line is produced and cylindrical implants of various candidate sizes are then automatically positioned, while their occlusal end is leveled to bone ridge, and evaluated. Radial safety margins are used for the assessment of the implant safety distance from neighboring anatomical structures and bone quantity and quality are estimated and taken into consideration. A case study demonstrates the concept and allows for its discussion.  相似文献   
18.
Affine parameter estimation from the trace transform   总被引:2,自引:0,他引:2  
In this paper, we assume that we are given the images of two segmented objects, one of which may be an affinely distorted version of the other, and wish to recover the values of the parameters of the affine transformation between the two images. The images may also differ by the overall level of illumination. The multiplicative constant of such difference may also be recovered. We present a generic theoretical framework to solve this problem. In terms of this framework, other proposed methods may be interpreted. We show how, in this framework, one can recover the affine parameters in a way that is robust to various effects, such as occlusion and illumination variation. The proposed method is generic enough to be applicable also to matching two images that do not depict the same scene or object.  相似文献   
19.
Abstract

The present paper tries to estimate the surface water resources potential in some of the major Aegean islands in an effort to provide a means for the continuous development of the region, and, by extension, for similar areas around the world. The islands have to confront the challenge of surviving in a semiarid environment under the constraints of uneven water resources distribution both in space and time. In addition to these, tourism development, industrialization and highly water consumptive life styles have exacerbated perennial problems in water resources and water resources management. The framework of the present effort has a two-prong emphasis. In the first part, a simulation model is presented, which tries to estimate the potential surface runoff under physical, structural organizational, and institutional constraints. The methodology and the premises of the simulation process are delineated. In the second part, the results of the model's application in distinct cases are demarcated. The final product, namely the model and the resulting runoff coefficients, are presented in the form of a standard, which may provide practitioners in the field as well as decisionmakers the means for an initial reference in pertinent developmental efforts. Finally, the conclusions and recommendations raise the question of ecosystem resilience and point towards the urgent and continuous need for the application of integrated water resources management principles.  相似文献   
20.
It is argued that robotic platforms are the way forward towards building intelligent systems, where multiple sensors and manipulation are used for cognitive processes. It is also argued that the cue for developing the right architecture for such a system is human language.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号