全文获取类型
收费全文 | 708篇 |
免费 | 19篇 |
专业分类
电工技术 | 8篇 |
化学工业 | 180篇 |
金属工艺 | 1篇 |
机械仪表 | 17篇 |
建筑科学 | 10篇 |
矿业工程 | 1篇 |
能源动力 | 19篇 |
轻工业 | 33篇 |
水利工程 | 4篇 |
无线电 | 93篇 |
一般工业技术 | 68篇 |
冶金工业 | 43篇 |
原子能技术 | 4篇 |
自动化技术 | 246篇 |
出版年
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 10篇 |
2020年 | 3篇 |
2019年 | 9篇 |
2018年 | 16篇 |
2017年 | 8篇 |
2016年 | 25篇 |
2015年 | 19篇 |
2014年 | 32篇 |
2013年 | 44篇 |
2012年 | 46篇 |
2011年 | 56篇 |
2010年 | 46篇 |
2009年 | 48篇 |
2008年 | 48篇 |
2007年 | 39篇 |
2006年 | 40篇 |
2005年 | 23篇 |
2004年 | 28篇 |
2003年 | 24篇 |
2002年 | 25篇 |
2001年 | 15篇 |
2000年 | 12篇 |
1999年 | 12篇 |
1998年 | 20篇 |
1997年 | 9篇 |
1996年 | 7篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1990年 | 2篇 |
1989年 | 7篇 |
1987年 | 2篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1973年 | 2篇 |
1942年 | 2篇 |
1941年 | 1篇 |
1936年 | 1篇 |
1935年 | 2篇 |
排序方式: 共有727条查询结果,搜索用时 15 毫秒
61.
Similarity search is a core module of many data analysis tasks, including search by example, classification, and clustering. For time series data, Dynamic Time Warping (DTW) has been proven a very effective similarity measure, since it minimizes the effects of shifting and distortion in time. However, the quadratic cost of DTW computation to the length of the matched sequences makes its direct application on databases of long time series very expensive. We propose a technique that decomposes the sequences into a number of segments and uses cheap approximations thereof to compute fast lower bounds for their warping distances. We present several, progressively tighter bounds, relying on the existence or not of warping constraints. Finally, we develop an index and a multi-step technique that uses the proposed bounds and performs two levels of filtering to efficiently process similarity queries. A thorough experimental study suggests that our method consistently outperforms state-of-the-art methods for DTW similarity search. 相似文献
62.
Reverse nearest neighbors in large graphs 总被引:3,自引:0,他引:3
Man Lung Yiu Dimitris Papadias Nikos Mamoulis Yufei Tao 《Knowledge and Data Engineering, IEEE Transactions on》2006,18(4):540-553
A reverse nearest neighbor (RNN) query returns the data objects that have a query point as their nearest neighbor (NN). Although such queries have been studied quite extensively in Euclidean spaces, there is no previous work in the context of large graphs. In this paper, we provide a fundamental lemma, which can be used to prune the search space while traversing the graph in search for RNN. Based on it, we develop two RNN methods; an eager algorithm that attempts to prune network nodes as soon as they are visited and a lazy technique that prunes the search space when a data point is discovered. We study retrieval of an arbitrary number k of reverse nearest neighbors, investigate the benefits of materialization, cover several query types, and deal with cases where the queries and the data objects reside on nodes or edges of the graph. The proposed techniques are evaluated in various practical scenarios involving spatial maps, computer networks, and the DBLP coauthorship graph. 相似文献
63.
Reference structure tomography 总被引:1,自引:0,他引:1
Brady DJ Pitsianis NP Sun X 《Journal of the Optical Society of America. A, Optics, image science, and vision》2004,21(7):1140-1147
Reference structure tomography (RST) uses multidimensional modulations to encode mappings between radiating objects and measurements. RST may be used to image source-density distributions, estimate source parameters, or classify sources. The RST paradigm permits scan-free multidimensional imaging, data-efficient and computation-efficient source analysis, and direct abstraction of physical features. We introduce the basic concepts of RST and illustrate the use of RST for multidimensional imaging based on a geometric radiation model. 相似文献
64.
Searching efficient plans for emergency rescue through simulation: the case of a metro fire 总被引:2,自引:0,他引:2
In this paper we present the way we modelled and simulated a metro system in the case of a tunnel fire, and discuss the ways this simulation may support the search for efficient rescue plans. The metro system was modelled as a complex adaptive system, comprising four interacting and co-evolving subsystems: (i) the fire and the released smoke, (ii) the group of passengers, (iii) the technological system, and (iv) the metro personnel. Based on this model, an agent-based simulation was developed. This simulation provides an appropriate dynamic representation of the designers problem space, enabling him (i) to apprehend the critical dependencies and invariants of the system under consideration, (ii) to identify the features that should characterise the designed emergency rescue plans, and (iii) to assess their efficiency. To demonstrate the usefulness of the adopted approach for the design of an efficient emergency rescue plan, the results of two experiments exploring alternative sequences of the metro personnels actions under different circumstances are presented. 相似文献
65.
Manolis Maragoudakis Aristomenis Thanopoulos Nikos Fakotakis 《Intelligent Systems, IEEE》2007,22(1):67-77
When you've called a voice portal for any kind of information retrieval, chances are that an automated system guided the entire interaction. It might have correctly identified your goal, but probably only after asking too many questions. MeteoBayes is a meteorological information dialogue system that lets you use natural language to direct the interaction. Based on Bayesian networks, MeteoBayes' inference engine attempts to identify user intentions by consulting its past dialogue repository. For unfamiliar words, MeteoBayes has an unknown-term disambiguation module that learns word similarities from texts to avoid unnecessary system inquiries, thus speeding up the understanding process 相似文献
66.
Nikos Chatzichrisafis Vassilios Diakoloukas Vassilios Digalakis Costas Harizakis 《IEEE transactions on audio, speech, and language processing》2007,15(3):928-938
The porting of a speech recognition system to a new language is usually a time-consuming and expensive process since it requires collecting, transcribing, and processing a large amount of language-specific training sentences. This work presents techniques for improved cross-language transfer of speech recognition systems to new target languages. Such techniques are particularly useful for target languages where minimal amounts of training data are available. We describe a novel method to produce a language-independent system by combining acoustic models from a number of source languages. This intermediate language-independent acoustic model is used to bootstrap a target-language system by applying language adaptation. For our experiments, we use acoustic models of seven source languages to develop a target Greek acoustic model. We show that our technique significantly outperforms a system trained from scratch when less than 8 h of read speech is available 相似文献
67.
P-type NiO thin films have been developed on high resistivity Si and SiO2 substrates by a pulsed laser deposition technique using an ArF? 193 nm excimer laser at deposition temperature of 300 °C and in 40 Pa partial oxygen pressure. Structures based on such NiO films as host material in the form of Au-NiO Schottky diodes have been subsequently developed under vacuum. In a different procedure, an n-SnO2 layer has been deposited by a CVD technique on a NiO film to produce a p/n heterojunction. The sensing properties of all above structures have been tested upon exposure to a H2 flow in air ambient gas at various operating temperature ranging from 30 to 180 °C. For the NiO films, the optimum temperature was about 150 °C exhibiting a sensitivity of 94%. After surface sensitization of NiO by Au the NiO films showed an H2 response at operating temperature of 30 °C. The sensitivity of p-NiO/n-SnO2 heterojunction devices was extracted from I-V measurements in air and under H2 flow mixed in air. In this case a dramatic increase of the sensitivity was achieved at operating temperature of 30 °C for a forward bias of 0,2 V. 相似文献
68.
Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs. 相似文献
69.
Nikos Komninos Dimitrios D. Vergados Christos Douligeris 《International Journal of Communication Systems》2007,20(12):1391-1406
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
70.
Alexandros Tsilfidis Iosif Mporas John Mourjopoulos Nikos Fakotakis 《Computer Speech and Language》2013,27(1):380-395
The performance of recent dereverberation methods for reverberant speech preprocessing prior to Automatic Speech Recognition (ASR) is compared for an extensive range of room and source-receiver configurations. It is shown that room acoustic parameters such as the clarity (C50) and the definition (D50) correlate well with the ASR results. When available, such room acoustic parameters can provide insight into reverberant speech ASR performance and potential improvement via dereverberation preprocessing. It is also shown that the application of a recent dereverberation method based on perceptual modelling can be used in the above context and achieve significant Phone Recognition (PR) improvement, especially under highly reverberant conditions. 相似文献