全文获取类型
收费全文 | 250篇 |
免费 | 15篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 30篇 |
金属工艺 | 8篇 |
机械仪表 | 1篇 |
建筑科学 | 13篇 |
能源动力 | 10篇 |
轻工业 | 21篇 |
水利工程 | 5篇 |
无线电 | 19篇 |
一般工业技术 | 26篇 |
冶金工业 | 7篇 |
自动化技术 | 124篇 |
出版年
2023年 | 3篇 |
2022年 | 8篇 |
2021年 | 6篇 |
2020年 | 7篇 |
2019年 | 7篇 |
2018年 | 7篇 |
2017年 | 3篇 |
2016年 | 7篇 |
2015年 | 9篇 |
2014年 | 6篇 |
2013年 | 26篇 |
2012年 | 13篇 |
2011年 | 15篇 |
2010年 | 19篇 |
2009年 | 21篇 |
2008年 | 20篇 |
2007年 | 21篇 |
2006年 | 10篇 |
2005年 | 10篇 |
2004年 | 11篇 |
2003年 | 4篇 |
2002年 | 6篇 |
2001年 | 3篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有265条查询结果,搜索用时 46 毫秒
31.
We present a model for anchoring categorical conceptual information which originates from physical perception and the web. The model is an extension of the anchoring framework which is used to create and maintain over time semantically grounded sensor information. Using the augmented anchoring framework that employs complex symbolic knowledge from a commonsense knowledge base, we attempt to ground and integrate symbolic and perceptual data that are available on the web. We introduce conceptual anchors which are representations of general, concrete conceptual terms. We show in an example scenario how conceptual anchors can be coherently integrated with perceptual anchors and commonsense information for the acquisition of novel concepts. 相似文献
32.
Panayiotis M. Papadopoulos Vasso Reppa Marios M. Polycarpou Christos G. Panayiotou 《IEEE/CAA Journal of Automatica Sinica》2020,7(3):638-655
The enormous energy use of the building sector and the requirements for indoor living quality that aim to improve occupants’ productivity and health, prioritize Smart Buildings as an emerging technology. The Heating, Ventilation and Air-Conditioning (HVAC) system is considered one of the most critical and essential parts in buildings since it consumes the largest amount of energy and is responsible for humans comfort. Due to the intermittent operation of HVAC systems, faults are more likely to occur, possibly increasing eventually building’s energy consumption and/or downgrading indoor living quality. The complexity and large scale nature of HVAC systems complicate the diagnosis of faults in a centralized framework. This paper presents a distributed intelligent fault diagnosis algorithm for detecting and isolating multiple sensor faults in large-scale HVAC systems. Modeling the HVAC system as a network of interconnected subsystems allows the design of a set of distributed sensor fault diagnosis agents capable of isolating multiple sensor faults by applying a combinatorial decision logic and diagnostic reasoning. The performance of the proposed method is investigated with respect to robustness, fault detectability and scalability. Simulations are used to illustrate the effectiveness of the proposed method in the presence of multiple sensor faults applied to a 83-zone HVAC system and to evaluate the sensitivity of the method with respect to sensor noise variance. 相似文献
33.
34.
Modeling Content for Semantic-Level Querying of Multimedia 总被引:2,自引:0,他引:2
Many semantic content-based models have been developed for modeling video and audio in order to enable information retrieval based on semantic content. The level of querying of the media depends upon the semantic aspects modeled. This paper proposes a semantic content-based model for semantic-level querying that makes full use of the explicit media structure, objects, spatial relationships between objects, events and actions involving objects, temporal relationships between events and actions, and integration between syntactic and semantic information. 相似文献
35.
36.
Xiaodong Zhang Marios Polycarpou Thomas Parisini 《International journal of control》2013,86(13):1295-1310
The design and analysis of fault diagnosis methodologies for non-linear systems has received significant attention recently. This paper presents a robust fault isolation scheme for a class of non-linear systems with unstructured modelling uncertainty and partial state measurement. The proposed fault diagnosis architecture consists of a fault detection and approximation estimator and a bank of isolation estimators. Each isolation estimator corresponds to a particular type of fault in the fault class. A fault isolation decision scheme is presented with guaranteed performance. If at least one component of the output estimation error of a particular fault isolation estimator exceeds the corresponding adaptive threshold at some finite time, then the occurrence of that type of fault can be excluded. Fault isolation is achieved if this is valid for all but one isolation estimator. Based on the class of non-linear systems under consideration, fault isolability conditions are rigorously investigated, characterizing the class of non-linear faults that are isolable by the proposed scheme. Moreover, the non-conservativeness of the fault isolability conditions is illustrated by deriving a subclass of nonlinear systems and faults for which this condition is also necessary for fault isolability. A simulation example of a simple robotic system is used to show the effectiveness of the robust fault isolation methodology. 相似文献
37.
Marios Belk Efi Papatheocharous Panagiotis Germanakos George Samaras 《Journal of Systems and Software》2013
This paper focuses on modeling users’ cognitive styles based on a set of Web usage mining techniques on user navigation patterns and clickstream data. Main aim is to investigate whether specific clustering techniques can group users of particular cognitive style using measures obtained from psychometric tests and content navigation behavior. Three navigation metrics are proposed and utilized to find identifiable groups of users that have similar navigation patterns in relation to their cognitive style. The proposed work has been evaluated with two user studies which entail a psychometric-based survey for extracting the users’ cognitive styles, combined with a real usage scenario of users navigating in a controlled Web 2.0 environment. A total of 106 participants of age between 17 and 25 participated in the study providing interesting insights with respect to cognitive styles and navigation behavior of users. Studies like the reported one can be useful for modeling users and assist adaptive Web 2.0 environments to organize and present information and functionalities in an adaptive format to diverse user groups. 相似文献
38.
Mitra S Savvides M Brockwell A 《IEEE transactions on pattern analysis and machine intelligence》2007,29(4):517-530
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. This paper introduces a novel statistical method of performance evaluation for these systems. Given a database of authentication results from an existing system, the method uses a hierarchical random effects model, along with Bayesian inference techniques yielding posterior predictive distributions, to predict performance in terms of error rates using various explanatory variables. By incorporating explanatory variables as well as random effects, the method allows for prediction of error rates when the authentication system is applied to potentially larger and/or different groups of subjects than those originally documented in the database. We also extend the model to allow for prediction of the probability of a false alarm on a "watch-list" as a function of the list size. We consider application of our methodology to three different face authentication systems: a filter-based system, a Gaussian mixture model (GMM)-based system, and a system based on frequency domain representation of facial asymmetry 相似文献
39.
Dimitrios Koukopoulos Marios Mavronicolas Sotiris Nikoletseas Paul Spirakis 《Theory of Computing Systems》2005,38(4):425-460
A packet-switching network is stable if the number of packets in the network remains bounded at all times. A very natural question that arises in the context of stability properties of such networks is how network structure precisely affects these properties. In this work we embark on a systematic study of this question in the context of Adversarial Queueing Theory, which assumes that packets are adversarially injected into the network. We consider size, diameter, maximum vertex degree, minimum number of disjoint paths that cover all edges of the network and network subgraphs as crucial structural parameters of the network, and we present a comprehensive collection of structural results, in the form of stability and instability bounds on injection rate of the adversary for various greedy protocols: —Increasing the size of a network may result in dropping its instability bound. This is shown through a novel, yet simple and natural, combinatorial construction of a size-parameterized network on which certain compositions of greedy protocols are running. The convergence of the drop to 0.5 is found to be fast with and proportional to the increase in size. —Maintaining the size of a network small may already suffice to drop its instability bound to a substantially low value. This is shown through a construction of a FIFO network with size 22, which becomes unstable at rate 0.704. This represents the current state-of-the-art trade-off between network size and instability bound. —The diameter, maximum vertex degree and minimum number of edge-disjoint paths that cover a network may be used as control parameters for the stability bound of the network. This is shown through an improved analysis of the stability bound of any arbitrary FIFO network, which takes these parameters into account. —How much can network subgraphs that are forbidden for stability affect the instability bound? Through improved combinatorial constructions of networks and executions, we improve the state-of-the-art instability bound induced by certain known forbidden subgraphs on networks running a certain greedy protocol. —Our results shed more light and contribute significantly to a finer understanding of the impact of structural parameters on stability and instability properties of networks. 相似文献
40.