首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   717篇
  免费   53篇
  国内免费   2篇
电工技术   16篇
综合类   1篇
化学工业   144篇
金属工艺   25篇
机械仪表   22篇
建筑科学   29篇
矿业工程   1篇
能源动力   33篇
轻工业   28篇
水利工程   4篇
石油天然气   4篇
武器工业   1篇
无线电   118篇
一般工业技术   161篇
冶金工业   35篇
原子能技术   24篇
自动化技术   126篇
  2023年   16篇
  2022年   26篇
  2021年   31篇
  2020年   36篇
  2019年   25篇
  2018年   42篇
  2017年   37篇
  2016年   44篇
  2015年   24篇
  2014年   36篇
  2013年   41篇
  2012年   40篇
  2011年   63篇
  2010年   32篇
  2009年   42篇
  2008年   31篇
  2007年   22篇
  2006年   14篇
  2005年   13篇
  2004年   8篇
  2003年   8篇
  2002年   11篇
  2001年   11篇
  2000年   3篇
  1999年   7篇
  1998年   17篇
  1997年   8篇
  1996年   8篇
  1995年   11篇
  1994年   10篇
  1993年   9篇
  1992年   4篇
  1991年   3篇
  1990年   6篇
  1989年   4篇
  1988年   2篇
  1987年   1篇
  1986年   4篇
  1985年   2篇
  1984年   4篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1978年   3篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
排序方式: 共有772条查询结果,搜索用时 46 毫秒
31.
Intelligence has been an object of study for a long time. Different architectures try to capture and reproduce these aspects into artificial systems (or agents), but there is still no agreement on how to integrate them into a general framework. With this objective in mind, we propose an architectural methodology based on the idea of intentional configuration of behaviors. Behavior‐producing modules are used as basic control components that are selected and modified dynamically according to the intentions of the agent. These intentions are influenced by the situation perceived, knowledge about the world, and internal variables that monitor the state of the agent. The architectural methodology preserves the emergence of functionality associated with the behavior‐based paradigm in the more abstract levels involved in configuring the behaviors. Validation of this architecture is done using a simulated world for mobile robots, in which the agent must deal with various goals such as managing its energy and its well‐being, finding targets, and acquiring knowledge about its environment. Fuzzy logic, a topologic map learning algorithm, and activation variables with a propagation mechanism are used to implement the architecture for this agent.  相似文献   
32.
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime.  相似文献   
33.
The process of knowledge discovery in databases consists of several steps that are iterative and interactive. In each application, to go through this process the user has to exploit different algorithms and their settings that usually yield multiple models. Model selection, that is, the selection of appropriate models or algorithms to achieve such models, requires meta-knowledge of algorithm/model and model performance metrics. Therefore, model selection is usually a difficult task for the user. We believe that simplifying the process of model selection for the user is crucial to the success of real-life knowledge discovery activities. As opposed to most related work that aims to automate model selection, in our view model selection is a semiautomatic process, requiring an effective collaboration between the user and the discovery system. For such a collaboration, our solution is to give the user the ability to try various alternatives and to compare competing models quantitatively by performance metrics, and qualitatively by effective visualization. This paper presents our research on model selection and visualization in the development of a knowledge discovery system called D2MS. The paper addresses the motivation of model selection in knowledge discovery and related work, gives an overview of D2MS, and describes its solution to model selection and visualization. It then presents the usefulness of D2MS model selection in two case studies of discovering medical knowledge in hospital data—on meningitis and stomach cancer—using three data mining methods of decision trees, conceptual clustering, and rule induction.  相似文献   
34.
Detection of cross-channel anomalies   总被引:1,自引:1,他引:0  
The data deluge has created a great challenge for data mining applications wherein the rare topics of interest are often buried in the flood of major headlines. We identify and formulate a novel problem: cross-channel anomaly detection from multiple data channels. Cross-channel anomalies are common among the individual channel anomalies and are often portent of significant events. Central to this new problem is a development of theoretical foundation and methodology. Using the spectral approach, we propose a two-stage detection method: anomaly detection at a single-channel level, followed by the detection of cross-channel anomalies from the amalgamation of single-channel anomalies. We also derive the extension of the proposed detection method to an online settings, which automatically adapts to changes in the data over time at low computational complexity using incremental algorithms. Our mathematical analysis shows that our method is likely to reduce the false alarm rate by establishing theoretical results on the reduction of an impurity index. We demonstrate our method in two applications: document understanding with multiple text corpora and detection of repeated anomalies in large-scale video surveillance. The experimental results consistently demonstrate the superior performance of our method compared with related state-of-art methods, including the one-class SVM and principal component pursuit. In addition, our framework can be deployed in a decentralized manner, lending itself for large-scale data stream analysis.  相似文献   
35.
36.
37.
Mobile Networks and Applications - In this paper, we study the performance of a full-duplex (FD) relay system in vehicle-to-vehicle (V2V) communication. In this relay communication system, the...  相似文献   
38.
This article considers the design of interval functional observers to estimate a linear function of the state vector of time-delay systems subject to both input and output additive disturbances. Two novel functional observers are proposed and designed such that they bound the set of all admissible values of a linear function of the state vector at each instant of time. By contrast to interval observers currently available in the literature, both observers proposed in this article utilize multiple delayed output measurement and have a more general structure. This trade-off feature overcomes some drawbacks in previous work and enables interval functional observers to be designed for a wider class of time-delay systems. Conditions for the existence of interval functional observers are derived and an effective design algorithm for computing unknown observer matrices is provided. Two illustrative examples are given to show the advantages and effectiveness of our design method.  相似文献   
39.
Specific graphene architectures at the macroscopic scale are paramount for exploring new functions and practical uses of graphene. In this study, macroscopic, freestanding, and tubular graphene (TG) architectures were successfully fabricated through a versatile and robust process based on the annealing of cellulose acetate (CA) on Ni templates. These TG architectures can be obtained as woven tubes with diameters of approximately 50 μm; they possess high graphitic crystallinity, strong electrical conductivity, and favorable corrosion resistance. The effects of processing parameters, such as annealing temperature, annealing time, and amount of CA, on the graphene properties of these architectures were investigated and are discussed in this paper. The graphene properties were characterized through field emission scanning electron microscopy, high-resolution transmission electron microscopy, atomic force microscopy, Raman spectroscopy, four-point probe resistivity, and electrochemical measurements.  相似文献   
40.
Joint modeling of related data sources has the potential to improve various data mining tasks such as transfer learning, multitask clustering, information retrieval etc. However, diversity among various data sources might outweigh the advantages of the joint modeling, and thus may result in performance degradations. To this end, we propose a regularized shared subspace learning framework, which can exploit the mutual strengths of related data sources while being immune to the effects of the variabilities of each source. This is achieved by further imposing a mutual orthogonality constraint on the constituent subspaces which segregates the common patterns from the source specific patterns, and thus, avoids performance degradations. Our approach is rooted in nonnegative matrix factorization and extends it further to enable joint analysis of related data sources. Experiments performed using three real world data sets for both retrieval and clustering applications demonstrate the benefits of regularization and validate the effectiveness of the model. Our proposed solution provides a formal framework appropriate for jointly analyzing related data sources and therefore, it is applicable to a wider context in data mining.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号