全文获取类型
收费全文 | 717篇 |
免费 | 53篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 16篇 |
综合类 | 1篇 |
化学工业 | 144篇 |
金属工艺 | 25篇 |
机械仪表 | 22篇 |
建筑科学 | 29篇 |
矿业工程 | 1篇 |
能源动力 | 33篇 |
轻工业 | 28篇 |
水利工程 | 4篇 |
石油天然气 | 4篇 |
武器工业 | 1篇 |
无线电 | 118篇 |
一般工业技术 | 161篇 |
冶金工业 | 35篇 |
原子能技术 | 24篇 |
自动化技术 | 126篇 |
出版年
2023年 | 16篇 |
2022年 | 26篇 |
2021年 | 31篇 |
2020年 | 36篇 |
2019年 | 25篇 |
2018年 | 42篇 |
2017年 | 37篇 |
2016年 | 44篇 |
2015年 | 24篇 |
2014年 | 36篇 |
2013年 | 41篇 |
2012年 | 40篇 |
2011年 | 63篇 |
2010年 | 32篇 |
2009年 | 42篇 |
2008年 | 31篇 |
2007年 | 22篇 |
2006年 | 14篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2002年 | 11篇 |
2001年 | 11篇 |
2000年 | 3篇 |
1999年 | 7篇 |
1998年 | 17篇 |
1997年 | 8篇 |
1996年 | 8篇 |
1995年 | 11篇 |
1994年 | 10篇 |
1993年 | 9篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 1篇 |
排序方式: 共有772条查询结果,搜索用时 15 毫秒
31.
Intelligence has been an object of study for a long time. Different architectures try to capture and reproduce these aspects into artificial systems (or agents), but there is still no agreement on how to integrate them into a general framework. With this objective in mind, we propose an architectural methodology based on the idea of intentional configuration of behaviors. Behavior‐producing modules are used as basic control components that are selected and modified dynamically according to the intentions of the agent. These intentions are influenced by the situation perceived, knowledge about the world, and internal variables that monitor the state of the agent. The architectural methodology preserves the emergence of functionality associated with the behavior‐based paradigm in the more abstract levels involved in configuring the behaviors. Validation of this architecture is done using a simulated world for mobile robots, in which the agent must deal with various goals such as managing its energy and its well‐being, finding targets, and acquiring knowledge about its environment. Fuzzy logic, a topologic map learning algorithm, and activation variables with a propagation mechanism are used to implement the architecture for this agent. 相似文献
32.
Nguyen Quoc Dinh Author VitaeDong-Sung KimAuthor Vitae 《Computer Standards & Interfaces》2012,34(1):117-123
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime. 相似文献
33.
Tu Bao Ho Trong Dung Nguyen Hiroshi Shimodaira Masayuki Kimura 《Applied Intelligence》2003,19(1-2):125-141
The process of knowledge discovery in databases consists of several steps that are iterative and interactive. In each application, to go through this process the user has to exploit different algorithms and their settings that usually yield multiple models. Model selection, that is, the selection of appropriate models or algorithms to achieve such models, requires meta-knowledge of algorithm/model and model performance metrics. Therefore, model selection is usually a difficult task for the user. We believe that simplifying the process of model selection for the user is crucial to the success of real-life knowledge discovery activities. As opposed to most related work that aims to automate model selection, in our view model selection is a semiautomatic process, requiring an effective collaboration between the user and the discovery system. For such a collaboration, our solution is to give the user the ability to try various alternatives and to compare competing models quantitatively by performance metrics, and qualitatively by effective visualization. This paper presents our research on model selection and visualization in the development of a knowledge discovery system called D2MS. The paper addresses the motivation of model selection in knowledge discovery and related work, gives an overview of D2MS, and describes its solution to model selection and visualization. It then presents the usefulness of D2MS model selection in two case studies of discovering medical knowledge in hospital data—on meningitis and stomach cancer—using three data mining methods of decision trees, conceptual clustering, and rule induction. 相似文献
34.
Detection of cross-channel anomalies 总被引:1,自引:1,他引:0
Duc-Son Pham Budhaditya Saha Dinh Q. Phung Svetha Venkatesh 《Knowledge and Information Systems》2013,35(1):33-59
The data deluge has created a great challenge for data mining applications wherein the rare topics of interest are often buried in the flood of major headlines. We identify and formulate a novel problem: cross-channel anomaly detection from multiple data channels. Cross-channel anomalies are common among the individual channel anomalies and are often portent of significant events. Central to this new problem is a development of theoretical foundation and methodology. Using the spectral approach, we propose a two-stage detection method: anomaly detection at a single-channel level, followed by the detection of cross-channel anomalies from the amalgamation of single-channel anomalies. We also derive the extension of the proposed detection method to an online settings, which automatically adapts to changes in the data over time at low computational complexity using incremental algorithms. Our mathematical analysis shows that our method is likely to reduce the false alarm rate by establishing theoretical results on the reduction of an impurity index. We demonstrate our method in two applications: document understanding with multiple text corpora and detection of repeated anomalies in large-scale video surveillance. The experimental results consistently demonstrate the superior performance of our method compared with related state-of-art methods, including the one-class SVM and principal component pursuit. In addition, our framework can be deployed in a decentralized manner, lending itself for large-scale data stream analysis. 相似文献
35.
36.
37.
Nguyen Ba Cao Tran Xuan Nam Hoang Tran Manh Dung Le The 《Mobile Networks and Applications》2020,25(1):363-372
Mobile Networks and Applications - In this paper, we study the performance of a full-duplex (FD) relay system in vehicle-to-vehicle (V2V) communication. In this relay communication system, the... 相似文献
38.
Dinh Cong Huong Van Thanh Huynh Hieu Trinh 《International Journal of Adaptive Control and Signal Processing》2020,34(9):1281-1293
This article considers the design of interval functional observers to estimate a linear function of the state vector of time-delay systems subject to both input and output additive disturbances. Two novel functional observers are proposed and designed such that they bound the set of all admissible values of a linear function of the state vector at each instant of time. By contrast to interval observers currently available in the literature, both observers proposed in this article utilize multiple delayed output measurement and have a more general structure. This trade-off feature overcomes some drawbacks in previous work and enables interval functional observers to be designed for a wider class of time-delay systems. Conditions for the existence of interval functional observers are derived and an effective design algorithm for computing unknown observer matrices is provided. Two illustrative examples are given to show the advantages and effectiveness of our design method. 相似文献
39.
An T. Nguyen Wei-Cheng Lai Van Viet Tran Duc Dung Nguyen Hung-Chih Kan 《Energy Materials: Materials Science and Engineering for Energy Systems》2016,11(2):23-29
Specific graphene architectures at the macroscopic scale are paramount for exploring new functions and practical uses of graphene. In this study, macroscopic, freestanding, and tubular graphene (TG) architectures were successfully fabricated through a versatile and robust process based on the annealing of cellulose acetate (CA) on Ni templates. These TG architectures can be obtained as woven tubes with diameters of approximately 50 μm; they possess high graphitic crystallinity, strong electrical conductivity, and favorable corrosion resistance. The effects of processing parameters, such as annealing temperature, annealing time, and amount of CA, on the graphene properties of these architectures were investigated and are discussed in this paper. The graphene properties were characterized through field emission scanning electron microscopy, high-resolution transmission electron microscopy, atomic force microscopy, Raman spectroscopy, four-point probe resistivity, and electrochemical measurements. 相似文献
40.
Sunil Kumar Gupta Dinh Phung Brett Adams Svetha Venkatesh 《Data mining and knowledge discovery》2013,26(1):57-97
Joint modeling of related data sources has the potential to improve various data mining tasks such as transfer learning, multitask clustering, information retrieval etc. However, diversity among various data sources might outweigh the advantages of the joint modeling, and thus may result in performance degradations. To this end, we propose a regularized shared subspace learning framework, which can exploit the mutual strengths of related data sources while being immune to the effects of the variabilities of each source. This is achieved by further imposing a mutual orthogonality constraint on the constituent subspaces which segregates the common patterns from the source specific patterns, and thus, avoids performance degradations. Our approach is rooted in nonnegative matrix factorization and extends it further to enable joint analysis of related data sources. Experiments performed using three real world data sets for both retrieval and clustering applications demonstrate the benefits of regularization and validate the effectiveness of the model. Our proposed solution provides a formal framework appropriate for jointly analyzing related data sources and therefore, it is applicable to a wider context in data mining. 相似文献