全文获取类型
收费全文 | 922篇 |
免费 | 41篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 17篇 |
化学工业 | 251篇 |
金属工艺 | 11篇 |
机械仪表 | 12篇 |
建筑科学 | 31篇 |
矿业工程 | 3篇 |
能源动力 | 31篇 |
轻工业 | 97篇 |
水利工程 | 10篇 |
石油天然气 | 4篇 |
无线电 | 97篇 |
一般工业技术 | 131篇 |
冶金工业 | 30篇 |
自动化技术 | 239篇 |
出版年
2024年 | 1篇 |
2023年 | 8篇 |
2022年 | 34篇 |
2021年 | 25篇 |
2020年 | 24篇 |
2019年 | 32篇 |
2018年 | 38篇 |
2017年 | 26篇 |
2016年 | 35篇 |
2015年 | 28篇 |
2014年 | 31篇 |
2013年 | 57篇 |
2012年 | 75篇 |
2011年 | 59篇 |
2010年 | 45篇 |
2009年 | 41篇 |
2008年 | 50篇 |
2007年 | 60篇 |
2006年 | 45篇 |
2005年 | 25篇 |
2004年 | 38篇 |
2003年 | 16篇 |
2002年 | 22篇 |
2001年 | 13篇 |
2000年 | 10篇 |
1999年 | 13篇 |
1998年 | 6篇 |
1997年 | 14篇 |
1996年 | 9篇 |
1995年 | 7篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 8篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1977年 | 3篇 |
1976年 | 2篇 |
排序方式: 共有964条查询结果,搜索用时 0 毫秒
11.
12.
Nikolaos Gianniotis Christoph Schnörr Christian Molkenthin Sanjay Singh Bora 《Pattern Analysis & Applications》2016,19(2):475-485
Variational methods are employed in situations where exact Bayesian inference becomes intractable due to the difficulty in performing certain integrals. Typically, variational methods postulate a tractable posterior and formulate a lower bound on the desired integral to be approximated, e.g. marginal likelihood. The lower bound is then optimised with respect to its free parameters, the so-called variational parameters. However, this is not always possible as for certain integrals it is very challenging (or tedious) to come up with a suitable lower bound. Here, we propose a simple scheme that overcomes some of the awkward cases where the usual variational treatment becomes difficult. The scheme relies on a rewriting of the lower bound on the model log-likelihood. We demonstrate the proposed scheme on a number of synthetic and real examples, as well as on a real geophysical model for which the standard variational approaches are inapplicable. 相似文献
13.
Fotis N. Koumboulis Nikolaos D. Kouvakas Paraskevas N. Paraskevopoulos 《中国科学F辑(英文版)》2009,52(7):1084-1094
In the present paper the problem of disturbance rejection of single input-single output neutral time delay systems with multiple
measurable disturbances is solved via dynamic controllers. In particular, the general form of the controller matrices is presented,
while the necessary and sufficient conditions for the controller to be realizable are offered. The proposed technique is applied
to a test case neutral time delay central heating system. In particular, the nonlinear model of the plant and its linearized
approximation are presented. Based on the linearized model, a two-stage controller is designed in order to regulate the room
temperature and the boiler effluent temperature. The performance of the closed loop system is investigated through computational
experiments. 相似文献
14.
Nikos Nikolaou Michael Makridis Basilis Gatos Nikolaos Stamatopoulos Nikos Papamarkos 《Image and vision computing》2010
In this paper, we strive towards the development of efficient techniques in order to segment document pages resulting from the digitization of historical machine-printed sources. This kind of documents often suffer from low quality and local skew, several degradations due to the old printing matrix quality or ink diffusion, and exhibit complex and dense layout. To face these problems, we introduce the following innovative aspects: (i) use of a novel Adaptive Run Length Smoothing Algorithm (ARLSA) in order to face the problem of complex and dense document layout, (ii) detection of noisy areas and punctuation marks that are usual in historical machine-printed documents, (iii) detection of possible obstacles formed from background areas in order to separate neighboring text columns or text lines, and (iv) use of skeleton segmentation paths in order to isolate possible connected characters. Comparative experiments using several historical machine-printed documents prove the efficiency of the proposed technique. 相似文献
15.
Giorgos Sfikas Christophoros Nikou Nikolaos Galatsanos Christian Heinrich 《Journal of Mathematical Imaging and Vision》2010,36(2):91-110
Spatially varying mixture models are characterized by the dependence of their mixing proportions on location (contextual mixing proportions) and they have been widely used in image segmentation. In this work, Gauss-Markov random field (MRF) priors are employed
along with spatially varying mixture models to ensure the preservation of region boundaries in image segmentation. To preserve
region boundaries, two distinct models for a line process involved in the MRF prior are proposed. The first model considers
edge preservation by imposing a Bernoulli prior on the normally distributed local differences of the contextual mixing proportions. It is a discrete line process model whose parameters are computed by variational inference. The second model imposes Gamma
prior on the Student’s-t distributed local differences of the contextual mixing proportions. It is a continuous line process whose parameters are also automatically estimated by the Expectation-Maximization (EM) algorithm.
The proposed models are numerically evaluated and two important issues in image segmentation by mixture models are also investigated
and discussed: the constraints to be imposed on the contextual mixing proportions to be probability vectors and the MRF optimization
strategy in the frameworks of the standard and variational EM algorithm. 相似文献
16.
Arnaud Grasset Philippe Millet Philippe Bonnot Sami Yehia Wolfram Putzke-Roeming Fabio Campi Alberto Rosti Michael Huebner Nikolaos S. Voros Davide Rossi Henning Sahlbach Rolf Ernst 《International journal of parallel programming》2011,39(3):328-356
Reconfigurable computing offers a wide range of low cost and efficient solutions for embedded systems. The proper choice of the reconfigurable device, the granularity of its processing elements and its memory architecture highly depend on the type of application and their data flow. Existing solutions either offer fine grain FPGAs, which rely on a hardware synthesis flow and offer the maximum degree of flexibility, or coarser grain solutions, which are usually more suitable for a particular type of data flow and applications. In this paper, we present the MORPHEUS architecture, a versatile reconfigurable heterogeneous System-on-Chip targeting streaming applications. The presented architecture exploits different reconfigurable technologies at several computation granularities that efficiently address the different applications needs. In order to efficiently exploit the presented architecture, we implemented a complete software solution to map C applications to the reconfigurable architecture. In this paper, we describe the complete toolset and provide concrete use cases of the architecture. 相似文献
17.
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs. 相似文献
18.
Kalamaras Ilias Dimitriou Nikolaos Drosou Anastasios Tzovaras Dimitrios 《Multimedia Tools and Applications》2017,76(14):15923-15949
Multimedia Tools and Applications - Traditional multimedia search engines retrieve results based mostly on the query submitted by the user, or using a log of previous searches to provide... 相似文献
19.
The IP Multimedia Subsystem (IMS) seems to be the technology that will prevail in Next Generation Networks (NGNs), since the interworking environment and the service flexibility that this technology offers to the currently deployed wireless broadband technologies makes it appealing to users, service developers and network operators. In this paper we propose a heterogeneous network model based on the IMS that integrates the Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) technologies and provides guaranteed QoS. We present the complete signalling flow concerning the authorization, registration, session set up and vertical handoff processes, as well as, an analytic model for cost analysis of the proposed architecture. 相似文献
20.