首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   708篇
  免费   19篇
电工技术   8篇
化学工业   180篇
金属工艺   1篇
机械仪表   17篇
建筑科学   10篇
矿业工程   1篇
能源动力   19篇
轻工业   33篇
水利工程   4篇
无线电   93篇
一般工业技术   68篇
冶金工业   43篇
原子能技术   4篇
自动化技术   246篇
  2023年   3篇
  2022年   4篇
  2021年   10篇
  2020年   3篇
  2019年   9篇
  2018年   16篇
  2017年   8篇
  2016年   25篇
  2015年   19篇
  2014年   32篇
  2013年   44篇
  2012年   46篇
  2011年   56篇
  2010年   46篇
  2009年   48篇
  2008年   48篇
  2007年   39篇
  2006年   40篇
  2005年   23篇
  2004年   28篇
  2003年   24篇
  2002年   25篇
  2001年   15篇
  2000年   12篇
  1999年   12篇
  1998年   20篇
  1997年   9篇
  1996年   7篇
  1995年   2篇
  1994年   3篇
  1993年   4篇
  1992年   3篇
  1990年   2篇
  1989年   7篇
  1987年   2篇
  1985年   3篇
  1984年   3篇
  1983年   3篇
  1981年   2篇
  1980年   1篇
  1979年   4篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1975年   1篇
  1973年   2篇
  1942年   2篇
  1941年   1篇
  1936年   1篇
  1935年   2篇
排序方式: 共有727条查询结果,搜索用时 15 毫秒
61.
Similarity search is a core module of many data analysis tasks, including search by example, classification, and clustering. For time series data, Dynamic Time Warping (DTW) has been proven a very effective similarity measure, since it minimizes the effects of shifting and distortion in time. However, the quadratic cost of DTW computation to the length of the matched sequences makes its direct application on databases of long time series very expensive. We propose a technique that decomposes the sequences into a number of segments and uses cheap approximations thereof to compute fast lower bounds for their warping distances. We present several, progressively tighter bounds, relying on the existence or not of warping constraints. Finally, we develop an index and a multi-step technique that uses the proposed bounds and performs two levels of filtering to efficiently process similarity queries. A thorough experimental study suggests that our method consistently outperforms state-of-the-art methods for DTW similarity search.  相似文献   
62.
Reverse nearest neighbors in large graphs   总被引:3,自引:0,他引:3  
A reverse nearest neighbor (RNN) query returns the data objects that have a query point as their nearest neighbor (NN). Although such queries have been studied quite extensively in Euclidean spaces, there is no previous work in the context of large graphs. In this paper, we provide a fundamental lemma, which can be used to prune the search space while traversing the graph in search for RNN. Based on it, we develop two RNN methods; an eager algorithm that attempts to prune network nodes as soon as they are visited and a lazy technique that prunes the search space when a data point is discovered. We study retrieval of an arbitrary number k of reverse nearest neighbors, investigate the benefits of materialization, cover several query types, and deal with cases where the queries and the data objects reside on nodes or edges of the graph. The proposed techniques are evaluated in various practical scenarios involving spatial maps, computer networks, and the DBLP coauthorship graph.  相似文献   
63.
Reference structure tomography   总被引:1,自引:0,他引:1  
Reference structure tomography (RST) uses multidimensional modulations to encode mappings between radiating objects and measurements. RST may be used to image source-density distributions, estimate source parameters, or classify sources. The RST paradigm permits scan-free multidimensional imaging, data-efficient and computation-efficient source analysis, and direct abstraction of physical features. We introduce the basic concepts of RST and illustrate the use of RST for multidimensional imaging based on a geometric radiation model.  相似文献   
64.
In this paper we present the way we modelled and simulated a metro system in the case of a tunnel fire, and discuss the ways this simulation may support the search for efficient rescue plans. The metro system was modelled as a complex adaptive system, comprising four interacting and co-evolving subsystems: (i) the fire and the released smoke, (ii) the group of passengers, (iii) the technological system, and (iv) the metro personnel. Based on this model, an agent-based simulation was developed. This simulation provides an appropriate dynamic representation of the designers problem space, enabling him (i) to apprehend the critical dependencies and invariants of the system under consideration, (ii) to identify the features that should characterise the designed emergency rescue plans, and (iii) to assess their efficiency. To demonstrate the usefulness of the adopted approach for the design of an efficient emergency rescue plan, the results of two experiments exploring alternative sequences of the metro personnels actions under different circumstances are presented.  相似文献   
65.
When you've called a voice portal for any kind of information retrieval, chances are that an automated system guided the entire interaction. It might have correctly identified your goal, but probably only after asking too many questions. MeteoBayes is a meteorological information dialogue system that lets you use natural language to direct the interaction. Based on Bayesian networks, MeteoBayes' inference engine attempts to identify user intentions by consulting its past dialogue repository. For unfamiliar words, MeteoBayes has an unknown-term disambiguation module that learns word similarities from texts to avoid unnecessary system inquiries, thus speeding up the understanding process  相似文献   
66.
The porting of a speech recognition system to a new language is usually a time-consuming and expensive process since it requires collecting, transcribing, and processing a large amount of language-specific training sentences. This work presents techniques for improved cross-language transfer of speech recognition systems to new target languages. Such techniques are particularly useful for target languages where minimal amounts of training data are available. We describe a novel method to produce a language-independent system by combining acoustic models from a number of source languages. This intermediate language-independent acoustic model is used to bootstrap a target-language system by applying language adaptation. For our experiments, we use acoustic models of seven source languages to develop a target Greek acoustic model. We show that our technique significantly outperforms a system trained from scratch when less than 8 h of read speech is available  相似文献   
67.
P-type NiO thin films have been developed on high resistivity Si and SiO2 substrates by a pulsed laser deposition technique using an ArF? 193 nm excimer laser at deposition temperature of 300 °C and in 40 Pa partial oxygen pressure. Structures based on such NiO films as host material in the form of Au-NiO Schottky diodes have been subsequently developed under vacuum. In a different procedure, an n-SnO2 layer has been deposited by a CVD technique on a NiO film to produce a p/n heterojunction. The sensing properties of all above structures have been tested upon exposure to a H2 flow in air ambient gas at various operating temperature ranging from 30 to 180 °C. For the NiO films, the optimum temperature was about 150 °C exhibiting a sensitivity of 94%. After surface sensitization of NiO by Au the NiO films showed an H2 response at operating temperature of 30 °C. The sensitivity of p-NiO/n-SnO2 heterojunction devices was extracted from I-V measurements in air and under H2 flow mixed in air. In this case a dramatic increase of the sensitivity was achieved at operating temperature of 30 °C for a forward bias of 0,2 V.  相似文献   
68.
Nikos  Dimitris  Christos   《Ad hoc Networks》2007,5(3):289-298
Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.  相似文献   
69.
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
70.
The performance of recent dereverberation methods for reverberant speech preprocessing prior to Automatic Speech Recognition (ASR) is compared for an extensive range of room and source-receiver configurations. It is shown that room acoustic parameters such as the clarity (C50) and the definition (D50) correlate well with the ASR results. When available, such room acoustic parameters can provide insight into reverberant speech ASR performance and potential improvement via dereverberation preprocessing. It is also shown that the application of a recent dereverberation method based on perceptual modelling can be used in the above context and achieve significant Phone Recognition (PR) improvement, especially under highly reverberant conditions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号