首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   292篇
  免费   3篇
  国内免费   1篇
电工技术   4篇
化学工业   47篇
金属工艺   7篇
机械仪表   7篇
建筑科学   11篇
能源动力   24篇
轻工业   14篇
水利工程   6篇
无线电   45篇
一般工业技术   67篇
冶金工业   8篇
原子能技术   4篇
自动化技术   52篇
  2024年   9篇
  2023年   5篇
  2022年   17篇
  2021年   20篇
  2020年   15篇
  2019年   14篇
  2018年   14篇
  2017年   16篇
  2016年   7篇
  2015年   11篇
  2014年   11篇
  2013年   18篇
  2012年   17篇
  2011年   18篇
  2010年   15篇
  2009年   20篇
  2008年   7篇
  2007年   15篇
  2006年   9篇
  2005年   8篇
  2004年   6篇
  2003年   6篇
  2002年   1篇
  2001年   3篇
  1999年   2篇
  1998年   2篇
  1997年   2篇
  1995年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1983年   1篇
排序方式: 共有296条查询结果,搜索用时 0 毫秒
51.
Many accounting and finance problems require ordinal multi-state classification decisions, (e.g., control risk, bond rating, financial distress, etc.), yet few decision support systems are available to aid decision makers in such tasks. In this study, we develop a Neural Network based decision support system (NN-DSS) to classify firms in four ordinal states of financial condition namely healthy, dividend reduction, debt default and bankrupt. The classification results of the NN-DSS model are compared with those of a Naïve model, a Multiple Discriminant Analysis (MDA) model, and an Ordinal Logistic Regression (OLGR) model. Four different evaluation criteria are used to compare the models, namely, simple classification accuracy, distance-weighted classification accuracy, expected cost of misclassification (ECM) and ranked probability score. Our study shows that NN-DSS models perform significantly better than the Naïve, MDA, and OLGR models on the ECM criteria, and provide better results than MDA and OLGR on other criteria, although not always significantly better. The effect of the proportion of firms of each state in the training set is also studied. A balanced training set leads to more uniform (less skewed) classification across all four states, whereas an unbalanced training set biases the classification results in favor of the state with the largest number of observations.  相似文献   
52.
53.
54.
A new paradigm, which models the relationships between handwriting and topic categories, in the context of medical forms, is presented. The ultimate goals are: (1) a robust method which categorizes medical forms into specified categories, and (2) the use of such information for practical applications such as an improved recognition of medical handwriting or retrieval of medical forms as in a search engine. Medical forms have diverse, complex and large lexicons consisting of English, Medical and Pharmacology corpus. Our technique shows that a few recognized characters, returned by handwriting recognition, can be used to construct a linguistic model capable of representing a medical topic category. This allows (1) a reduced lexicon to be constructed, thereby improving handwriting recognition performance, and (2) PCR (Pre-Hospital Care Report) forms to be tagged with a topic category and subsequently searched by information retrieval systems. We present an improvement of over 7% in raw recognition rate and a mean average precision of 0.28 over a set of 1,175 queries on a data set of unconstrained handwritten medical forms filled in emergency environments. This work was supported by the National Science Foundation.  相似文献   
55.
Onkar  G.V.V.  Manoj  Anurag   《Computer Networks》2009,53(16):2855-2869
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP-controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is well known that because of packet losses due to finite buffers at the AP, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno. The models are validated in comparison with NS2 simulations.  相似文献   
56.
When occlusion is minimal, a single camera is generally sufficient to detect and track objects. However, when the density of objects is high, the resulting occlusion and lack of visibility suggests the use of multiple cameras and collaboration between them so that an object is detected using information available from all the cameras in the scene.In this paper, we present a system that is capable of segmenting, detecting and tracking multiple people in a cluttered scene using multiple synchronized surveillance cameras located far from each other. The system is fully automatic, and takes decisions about object detection and tracking using evidence collected from many pairs of cameras. Innovations that help us tackle the problem include a region-based stereo algorithm capable of finding 3D points inside an object knowing only the projections of the object (as a whole) in two views, a segmentation algorithm using bayesian classification and the use of occlusion analysis to combine evidence from different camera pairs.The system has been tested using different densities of people in the scene. This helps us determine the number of cameras required for a particular density of people. Experiments have also been conducted to verify and quantify the efficacy of the occlusion analysis scheme.  相似文献   
57.
Most existing solutions to group security in Mobile Ad Hoc Networks (MANETs) rely on a multicast Core Based Tree (CBT) for key distribution. Such solutions, although suitable for systems with low mobility and static characteristics, are unsuitable for dynamic and sparse groups with changing neighborhoods. In this paper, we propose an entirely decentralized key generation mechanism, employing a central trusted entity only during initialization. Using our approach, keys can be established between group members with absolutely no prior communication. The solution relies on threshold cryptography and introduces a novel concept of Node-Group-Key (NGK) mapping. We have provided an extensive analytical model for the computations involved and communication costs and have also provided a lie detection mechanism. Simulation results show appreciable performance improvement and enhanced robustness.  相似文献   
58.
We experimentally reanalyzed the classic interaction between Pieris rapae, a specialist lepidopteran herbivore, and isothiocyanates (mustard oils) that are characteristic phytochemicals of the Brassicaceae. Previous investigations have suggested that P. rapae is unaffected by isothiocyanates. Using whole plants, root extracts, and a microencapsulated formulation of allyl isothiocyanate, we now show that isothiocyanates reduce herbivore survival and growth, and increase development time, each in a dose-dependent manner. Neither the substrate allyl glucosinolate, nor myrosinase, the enzyme that results in the breakdown of glucosinolates, negatively affected P. rapae. Thus, we present strong evidence for a role for isothiocyanates in plant resistance against the specialist herbivore P. rapae.  相似文献   
59.
The interest on microgrid has increased significantly triggered by the increasing demand of reliable, secure, efficient, clean, and sustainable electricity. More research and implementation of microgrid will be conducted in order to improve the maturity of microgrid technology. Among different aspects of microgrid, this paper focuses on controls of microgrid with energy storage. A comprehensive review on current control technology is given with a discussion on challenges of microgrid controls. Basic simulation results are also presented to enhance and support the analysis. Finally, research needs and roadmap for microgrid control are also described.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号