全文获取类型
收费全文 | 923篇 |
免费 | 51篇 |
专业分类
电工技术 | 8篇 |
综合类 | 1篇 |
化学工业 | 177篇 |
金属工艺 | 10篇 |
机械仪表 | 12篇 |
建筑科学 | 34篇 |
矿业工程 | 1篇 |
能源动力 | 49篇 |
轻工业 | 55篇 |
水利工程 | 10篇 |
石油天然气 | 3篇 |
无线电 | 137篇 |
一般工业技术 | 125篇 |
冶金工业 | 59篇 |
原子能技术 | 1篇 |
自动化技术 | 292篇 |
出版年
2023年 | 7篇 |
2022年 | 33篇 |
2021年 | 40篇 |
2020年 | 29篇 |
2019年 | 25篇 |
2018年 | 33篇 |
2017年 | 40篇 |
2016年 | 45篇 |
2015年 | 27篇 |
2014年 | 53篇 |
2013年 | 63篇 |
2012年 | 45篇 |
2011年 | 69篇 |
2010年 | 59篇 |
2009年 | 56篇 |
2008年 | 42篇 |
2007年 | 57篇 |
2006年 | 32篇 |
2005年 | 23篇 |
2004年 | 18篇 |
2003年 | 13篇 |
2002年 | 15篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 12篇 |
1998年 | 24篇 |
1997年 | 14篇 |
1996年 | 11篇 |
1995年 | 6篇 |
1994年 | 10篇 |
1993年 | 11篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
排序方式: 共有974条查询结果,搜索用时 31 毫秒
31.
Vasiliki L. KakaliPanagiotis G. Sarigiannidis Georgios I. Papadimitriou Andreas S. Pomportsis 《Computers & Mathematics with Applications》2011,62(1):474-485
A new machine learning framework is introduced in this paper, based on the hidden Markov model (HMM), designed to provide scheduling in dynamic wireless push systems. In realistic wireless systems, the clients’ intentions change dynamically; hence a cognitive scheduling scheme is needed to estimate the desirability of the connected clients. The proposed scheduling scheme is enhanced with self-organized HMMs, supporting the network with an estimated expectation of the clients’ intentions, since the system’s environment characteristics alter dynamically and the base station (server side) has no a priori knowledge of such changes. Compared to the original pure scheme, the proposed machine learning framework succeeds in predicting the clients’ information desires and overcomes the limitation of the original static scheme, in terms of mean delay and system efficiency. 相似文献
32.
In this paper, we consider the robust interpretation of Metric Temporal Logic (MTL) formulas over signals that take values in metric spaces. For such signals, which are generated by systems whose states are equipped with non-trivial metrics, for example continuous or hybrid, robustness is not only natural, but also a critical measure of system performance. Thus, we propose multi-valued semantics for MTL formulas, which capture not only the usual Boolean satisfiability of the formula, but also topological information regarding the distance, ε, from unsatisfiability. We prove that any other signal that remains ε-close to the initial one also satisfies the same MTL specification under the usual Boolean semantics. Finally, our framework is applied to the problem of testing formulas of two fragments of MTL, namely Metric Interval Temporal Logic (MITL) and closed Metric Temporal Logic (clMTL), over continuous-time signals using only discrete-time analysis. The motivating idea behind our approach is that if the continuous-time signal fulfills certain conditions and the discrete-time signal robustly satisfies the temporal logic specification, then the corresponding continuous-time signal should also satisfy the same temporal logic specification. 相似文献
33.
Temporal logic motion planning for dynamic robots 总被引:1,自引:0,他引:1
In this paper, we address the temporal logic motion planning problem for mobile robots that are modeled by second order dynamics. Temporal logic specifications can capture the usual control specifications such as reachability and invariance as well as more complex specifications like sequencing and obstacle avoidance. Our approach consists of three basic steps. First, we design a control law that enables the dynamic model to track a simpler kinematic model with a globally bounded error. Second, we built a robust temporal logic specification that takes into account the tracking errors of the first step. Finally, we solve the new robust temporal logic path planning problem for the kinematic model using automata theory and simple local vector fields. The resulting continuous time trajectory is provably guaranteed to satisfy the initial user specification. 相似文献
34.
This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as “Notopia”) and psychological aspects of hacking, from which emerges a central question of how humans perceive and manipulate their cyber-identities. Concealing (real and cyber) identities is typical in hacking. With our progressive acculturation with identity-less and place-less modes of existence, our cyber-identities through time may be studied from within John Locke’s criterion of “memory” and the spatial-geographical criterion of identity. 相似文献
35.
Fuzzy distributed cooperative tracking for a swarm of unmanned aerial vehicles with heterogeneous goals 总被引:1,自引:0,他引:1
Georgios P. Kladis Prathyush P. Menon Christopher Edwards 《International journal of systems science》2016,47(16):3803-3811
This article proposes a systematic analysis for a tracking problem which ensures cooperation amongst a swarm of unmanned aerial vehicles (UAVs), modelled as nonlinear systems with linear and angular velocity constraints, in order to achieve different goals. A distributed Takagi–Sugeno (TS) framework design is adopted for the representation of the nonlinear model of the dynamics of the UAVs. The distributed control law which is introduced is composed of both node and network level information. Firstly, feedback gains are synthesised using a parallel distributed compensation (PDC) control law structure, for a collection of isolated UAVs; ignoring communications among the swarm. Then secondly, based on an alternation-like procedure, the resulting feedback gains are used to determine Lyapunov matrices which are utilised at network level to incorporate into the control law, the relative differences in the states of the vehicles, and to induce cooperative behaviour. Eventually stability is guaranteed for the entire swarm. The control synthesis is performed using tools from linear control theory: in particular the design criteria are posed as linear matrix inequalities (LMIs). An example based on a UAV tracking scenario is included to outline the efficacy of the approach. 相似文献
36.
Lighting design is an essential process in computer cinematography, games, architectural design and various other applications for correctly illuminating or highlighting parts of a scene and enhancing storytelling. When targeting specific illumination goals and constraints, this process can be tedious and counter-intuitive even for experienced users and thus automatic, goal-driven methods have emerged for the estimation of a lighting configuration to match the desired result. We present a general automatic approach to such an inverse lighting design problem, where the number of light sources along with their position and emittance are computed given a set of user-specified lighting goals. To this end, we employ a special hierarchical light clustering that operates in the lighting goal coverage domain and overcomes limitations of previous approaches in environments with high occlusion or structural complexity. Our approach is independent of the underlying light transport model and can quickly converge to usable solutions. We validate our results and provide comparative evaluation with the current state of the art. 相似文献
37.
Radu Horaud Miles Hansard Georgios Evangelidis Clément Ménier 《Machine Vision and Applications》2016,27(7):1005-1020
Time-of-flight (TOF) cameras are sensors that can measure the depths of scene points, by illuminating the scene with a controlled laser or LED source and then analyzing the reflected light. In this paper, we will first describe the underlying measurement principles of time-of-flight cameras, including: (1) pulsed-light cameras, which measure directly the time taken for a light pulse to travel from the device to the object and back again, and (2) continuous-wave-modulated light cameras, which measure the phase difference between the emitted and received signals, and hence obtain the travel time indirectly. We review the main existing designs, including prototypes as well as commercially available devices. We also review the relevant camera calibration principles, and how they are applied to TOF devices. Finally, we discuss the benefits and challenges of combined TOF and color camera systems. 相似文献
38.
Ouzounis GK Wilkinson MH 《IEEE transactions on pattern analysis and machine intelligence》2011,33(2):224-239
In this paper, we present a new method for attribute filtering, combining contrast and structural information. Using hyperconnectivity based on k-flat zones, we improve the ability of attribute filters to retain internal details in detected objects. Simultaneously, we improve the suppression of small, unwanted detail in the background. We extend the theory of attribute filters to hyperconnectivity and provide a fast algorithm to implement the new method. The new version is only marginally slower than the standard Max-Tree algorithm for connected attribute filters, and linear in the number of pixels or voxels. It is two orders of magnitude faster than anisotropic diffusion. The method is implemented in the form of a filtering rule suitable for handling both increasing (size) and nonincreasing (shape) attributes. We test this new framework on nonincreasing shape filters on both 2D images from astronomy, document processing, and microscopy, and 3D CT scans, and show increased robustness to noise while maintaining the advantages of previous methods. 相似文献
39.
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security when compared to 2G systems, UMTS still has weaknesses that can lead to security incidents. In this paper, we investigate the vulnerabilities of the UMTS security architecture that can be exploited by a malicious individual to mount Denial of Service (DoS) attacks. Our focus is on signaling-oriented attacks above the physical layer. We describe and analyze several novel attacks that can be triggered against both core UMTS architecture as well as hybrid UMTS/WLAN realms. An additional contribution of this paper is the presentation of an extensive survey of similar attacks in UMTS and related protocol infrastructures such as IP Multimedia Subsystem (IMS). Finally, we offer some suggestions that would provide greater tolerance to the system against DoS attacks. 相似文献