首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1448篇
  免费   87篇
  国内免费   3篇
电工技术   14篇
综合类   2篇
化学工业   247篇
金属工艺   9篇
机械仪表   11篇
建筑科学   59篇
矿业工程   3篇
能源动力   57篇
轻工业   256篇
水利工程   16篇
石油天然气   3篇
无线电   168篇
一般工业技术   152篇
冶金工业   54篇
原子能技术   3篇
自动化技术   484篇
  2024年   3篇
  2023年   11篇
  2022年   28篇
  2021年   55篇
  2020年   21篇
  2019年   35篇
  2018年   45篇
  2017年   40篇
  2016年   62篇
  2015年   44篇
  2014年   80篇
  2013年   109篇
  2012年   105篇
  2011年   109篇
  2010年   91篇
  2009年   95篇
  2008年   99篇
  2007年   98篇
  2006年   82篇
  2005年   53篇
  2004年   51篇
  2003年   34篇
  2002年   30篇
  2001年   19篇
  2000年   17篇
  1999年   14篇
  1998年   24篇
  1997年   10篇
  1996年   11篇
  1995年   11篇
  1994年   5篇
  1993年   8篇
  1992年   8篇
  1991年   4篇
  1990年   3篇
  1989年   2篇
  1988年   5篇
  1987年   2篇
  1986年   4篇
  1985年   5篇
  1984年   2篇
  1983年   2篇
  1979年   2篇
排序方式: 共有1538条查询结果,搜索用时 204 毫秒
61.
In the Internet era, users’ fundamental privacy and anonymity rights have received significant research and regulatory attention. This is not only a result of the exponential growth of data that users generate when accomplishing their daily task by means of computing devices with advanced capabilities, but also because of inherent data properties that allow them to be linked with a real or soft identity. Service providers exploit these facts for user monitoring and identification, albeit impacting users’ anonymity, based mainly on personal identifiable information or on sensors that generate unique data to provide personalized services. In this paper, we report on the feasibility of user identification using general system features like memory, CPU and network data, as provided by the underlying operating system. We provide a general framework based on supervised machine learning algorithms both for distinguishing users and informing them about their anonymity exposure. We conduct a series of experiments to collect trial datasets for users’ engagement on a shared computing platform. We evaluate various well-known classifiers in terms of their effectiveness in distinguishing users, and we perform a sensitivity analysis of their configuration setup to discover optimal settings under diverse conditions. Furthermore, we examine the bounds of sampling data to eliminate the chances of user identification and thus promote anonymity. Overall results show that under certain configurations users’ anonymity can be preserved, while in other cases users’ identification can be inferred with high accuracy, without relying on personal identifiable information.  相似文献   
62.
63.
Many network applications rely on stochastic QoS guarantees. With respect to loss-related performance, the effective bandwidth/capacity theory has proved useful for calculating loss probabilities in queues with complex input and server processes and for formulating simple admission control tests to ensure associated QoS guarantees. This success has motivated the application of the theory for delay-related QoS too. However, up until now this application has been justified only heuristically for queues with variable service rate. The paper fills this gap by establishing rigorously that the effective bandwidth/capacity theory may be used for the asymptotically correct calculation and enforcement of delay tail-probabilities in systems with variable rate servers too. Subsequently, the paper applies the general results to IEEE 802.11 WLANs, by representing each IEEE 802.11 station as an On/Off server and employing the effective capacity function for this model. Comparison of analytical results with simulation validates the effectiveness of the On/Off IEEE 802.11 model for delay-related QoS, complementing earlier results on loss-related performance.  相似文献   
64.
65.
An improved version of the function estimation program GDF is presented. The main enhancements of the new version include: multi-output function estimation, capability of defining custom functions in the grammar and selection of the error function. The new version has been evaluated on a series of classification and regression datasets, that are widely used for the evaluation of such methods. It is compared to two known neural networks and outperforms them in 5 (out of 10) datasets.

Program summary

Title of program: GDF v2.0Catalogue identifier: ADXC_v2_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADXC_v2_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 98 147No. of bytes in distributed program, including test data, etc.: 2 040 684Distribution format: tar.gzProgramming language: GNU C++Computer: The program is designed to be portable in all systems running the GNU C++ compilerOperating system: Linux, Solaris, FreeBSDRAM: 200000 bytesClassification: 4.9Does the new version supersede the previous version?: YesNature of problem: The technique of function estimation tries to discover from a series of input data a functional form that best describes them. This can be performed with the use of parametric models, whose parameters can adapt according to the input data.Solution method: Functional forms are being created by genetic programming which are approximations for the symbolic regression problem.Reasons for new version: The GDF package was extended in order to be more flexible and user customizable than the old package. The user can extend the package by defining his own error functions and he can extend the grammar of the package by adding new functions to the function repertoire. Also, the new version can perform function estimation of multi-output functions and it can be used for classification problems.Summary of revisions: The following features have been added to the package GDF:
Multi-output function approximation. The package can now approximate any function . This feature gives also to the package the capability of performing classification and not only regression.
User defined function can be added to the repertoire of the grammar, extending the regression capabilities of the package. This feature is limited to 3 functions, but easily this number can be increased.
Capability of selecting the error function. The package offers now to the user apart from the mean square error other error functions such as: mean absolute square error, maximum square error. Also, user defined error functions can be added to the set of error functions.
More verbose output. The main program displays more information to the user as well as the default values for the parameters. Also, the package gives to the user the capability to define an output file, where the output of the gdf program for the testing set will be stored after the termination of the process.
Additional comments: A technical report describing the revisions, experiments and test runs is packaged with the source code.Running time: Depending on the train data.  相似文献   
66.
In this paper, we present the computational tools and a hardware prototype for 3D face recognition. Full automation is provided through the use of advanced multistage alignment algorithms, resilience to facial expressions by employing a deformable model framework, and invariance to 3D capture devices through suitable preprocessing steps. In addition, scalability in both time and space is achieved by converting 3D facial scans into compact metadata. We present our results on the largest known, and now publicly available, face recognition grand challenge 3D facial database consisting of several thousand scans. To the best of our knowledge, this is the highest performance reported on the FRGC v2 database for the 3D modality  相似文献   
67.
Affine parameter estimation from the trace transform   总被引:2,自引:0,他引:2  
In this paper, we assume that we are given the images of two segmented objects, one of which may be an affinely distorted version of the other, and wish to recover the values of the parameters of the affine transformation between the two images. The images may also differ by the overall level of illumination. The multiplicative constant of such difference may also be recovered. We present a generic theoretical framework to solve this problem. In terms of this framework, other proposed methods may be interpreted. We show how, in this framework, one can recover the affine parameters in a way that is robust to various effects, such as occlusion and illumination variation. The proposed method is generic enough to be applicable also to matching two images that do not depict the same scene or object.  相似文献   
68.
Ioannis Tsivintzelis 《Polymer》2007,48(20):5928-5939
Microcellular polystyrene (PS) foams and porous structures of the biodegradable poly(d,l-lactic acid) (Pd,lLA) were prepared with the batch foaming technique (pressure quench) using supercritical CO2 as blowing agent. The effect of pressure, temperature and depressurization rate on the final porous structure was investigated. The results revealed that the size of the pores decreases and their population density increases with pressure increase, or decrease of temperature, and/or increase of the depressurization rate. The results were correlated by combining nucleation theory with NRHB model in order to account for and emphasize the physical mechanism related to nucleation of bubbles inside the supersaturated polymer matrix. A satisfactory agreement between correlations and experimental data was obtained indicating that the nucleation theory yields quantitative correlations when variables such as sorption, degree of plasticization, and surface tension of the system polymer-supercritical fluid are accurately described.  相似文献   
69.
It is argued that robotic platforms are the way forward towards building intelligent systems, where multiple sensors and manipulation are used for cognitive processes. It is also argued that the cue for developing the right architecture for such a system is human language.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号