全文获取类型
收费全文 | 166篇 |
免费 | 7篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 31篇 |
金属工艺 | 1篇 |
机械仪表 | 6篇 |
建筑科学 | 4篇 |
矿业工程 | 1篇 |
能源动力 | 7篇 |
轻工业 | 23篇 |
水利工程 | 3篇 |
无线电 | 14篇 |
一般工业技术 | 28篇 |
冶金工业 | 16篇 |
自动化技术 | 37篇 |
出版年
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 6篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 2篇 |
2017年 | 5篇 |
2016年 | 4篇 |
2015年 | 7篇 |
2014年 | 8篇 |
2013年 | 12篇 |
2012年 | 5篇 |
2011年 | 8篇 |
2010年 | 6篇 |
2009年 | 4篇 |
2008年 | 9篇 |
2007年 | 20篇 |
2006年 | 5篇 |
2005年 | 5篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 5篇 |
2001年 | 5篇 |
2000年 | 5篇 |
1999年 | 5篇 |
1998年 | 6篇 |
1997年 | 9篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1982年 | 1篇 |
排序方式: 共有173条查询结果,搜索用时 15 毫秒
151.
152.
The structure-forming process of Ca2+-induced whey protein isolate (WPI) gels was studied, at 24°C, in the presence of 10 and 120 m
CaCl2. Pre-heating WPI suspensions (10% protein) at 90°C dramatically increased specific viscosity, but did not change the number of accessible sulfhydryl groups, compared to pre-heating at 70°C. The most important factor governing the process appeared to be CaCl2 concentration, rather than the reactive sulfhydryl groups. At 10 m
CaCl2, the increase in aggregate size and network connectivity over time was achieved by clustering of adjacent aggregates. At 120 m
CaCl2, the increase in aggregate size and connectivity was by enlargement of the aggregates which formed connected paths and filled up interstitial spaces. 相似文献
153.
Proton-ligand stability constants (pKd) and metal-ligand stability constants for six oximes of 4-substituted-2-acetyl phenol in H2O: Dioxane (1:3) are obtained by the spectrophotometric method of Magnusson et al. as modified by Patel et al. 相似文献
154.
The approach of learning multiple “related” tasks simultaneously has proven quite successful in practice; however, theoretical
justification for this success has remained elusive. The starting point for previous work on multiple task learning has been
that the tasks to be learned jointly are somehow “algorithmically related”, in the sense that the results of applying a specific learning algorithm to these tasks are assumed to be similar. We offer an alternative approach, defining
relatedness of tasks on the basis of similarity between the example generating distributions that underlie these tasks.
We provide a formal framework for this notion of task relatedness, which captures a sub-domain of the wide scope of issues
in which one may apply a multiple task learning approach. Our notion of task similarity is relevant to a variety of real life
multitask learning scenarios and allows the formal derivation of generalization bounds that are strictly stronger than the
previously known bounds for both the learning-to-learn and the multitask learning scenarios. We give precise conditions under
which our bounds guarantee generalization on the basis of smaller sample sizes than the standard single-task approach.
Editors: Daniel Silver, Kristin Bennett, Richard Caruana.
A preliminary version of this paper appears in the proceedings of COLT’03, (Ben-David and Schuller 2003). 相似文献
155.
Shai Fine Laurent Fournier Avi Ziv 《International Journal on Software Tools for Technology Transfer (STTT)》2009,11(4):291-305
Reaching hard-to-reach coverage events is a difficult task that requires both time and expertise. Data-driven coverage directed
generation (CDG) can assist in the task when the coverage events are part of a structured coverage model, but is a priori
less useful when the target events are singular and not part of a model. We present a data-driven CDG technique based on Bayesian
networks that can improve the coverage of cross-product coverage models. To improve the capability of the system, we also
present virtual coverage models as a means for enabling data-driven CDG to reach singular events. A virtual coverage model
is a structured coverage model (e.g., cross-product coverage) defined around the target event, such that the target event
is a point in the structured model. The CDG system can exploit this structure to learn how to reach the target event from
covered points in the structured model. A case study using CDG and virtual coverage to reach a hard-to-reach event in a multi-processor
system demonstrates the usefulness of the proposed method. 相似文献
156.
A theory of learning from different domains 总被引:1,自引:0,他引:1
Shai Ben-David John Blitzer Koby Crammer Alex Kulesza Fernando Pereira Jennifer Wortman Vaughan 《Machine Learning》2010,79(1-2):151-175
Discriminative learning methods for classification perform well when training and test data are drawn from the same distribution. Often, however, we have plentiful labeled training data from a source domain but wish to learn a classifier which performs well on a target domain with a different distribution and little or no labeled training data. In this work we investigate two questions. First, under what conditions can a classifier trained from source data be expected to perform well on target data? Second, given a small amount of labeled target data, how should we combine it during training with the large amount of labeled source data to achieve the lowest target error at test time? We address the first question by bounding a classifier’s target error in terms of its source error and the divergence between the two domains. We give a classifier-induced divergence measure that can be estimated from finite, unlabeled samples from the domains. Under the assumption that there exists some hypothesis that performs well in both domains, we show that this quantity together with the empirical source error characterize the target error of a source-trained classifier. We answer the second question by bounding the target error of a model which minimizes a convex combination of the empirical source and target errors. Previous theoretical work has considered minimizing just the source error, just the target error, or weighting instances from the two domains equally. We show how to choose the optimal combination of source and target error as a function of the divergence, the sample sizes of both domains, and the complexity of the hypothesis class. The resulting bound generalizes the previously studied cases and is always at least as tight as a bound which considers minimizing only the target error or an equal weighting of source and target errors. 相似文献
157.
This study is concerned with the Boolean satisfiability (SAT) problem and its solution in setting a hybrid computational intelligence environment of genetic and fuzzy computing. In this framework, fuzzy sets realize an embedding principle meaning that original two-valued (Boolean) functions under investigation are extended to their continuous counterparts resulting in the form of fuzzy (multivalued) functions. In the sequel, the SAT problem is reformulated for the fuzzy functions and solved using a genetic algorithm (GA). It is shown that a GA, especially its recursive version, is an efficient tool for handling multivariable SAT problems. Thorough experiments revealed that the recursive version of the GA can solve SAT problems with more than 1000 variables 相似文献
158.
文中设计了雷达回波数据实时采集与分析的可视化软件,采用PCI50612数据采集卡进行二次开发,利用VC 编程技术以时域和频域图的方式实时显示模拟雷达回波以及分析结果,并保存数据供后期分析使用.具有连接方便、操作简单、高速大容量雷达数据采集等优点,对雷达回波数据的后期分析应用具有指导意义. 相似文献
159.
Shai Halevi 《Journal of Cryptology》1999,12(2):77-89
In this paper we address the problem of constructing commitment schemes where the sender is bounded to polynomial time and
the receiver may be all powerful. Many known constructions for such commitment schemes are based on the hardness of factoring
large integers. However, these schemes typically use integers of a special form and thus require a rather expensive initialization
procedure for establishing these special-form integers. In this paper we present a scheme which is based on the hardness of
factoring large integers but avoids the need of a complex initialization procedure.
Received 31 May 1996 and revised 26 December 1996 相似文献
160.
提出一种基于阵列传输结构的无线传感器网络安全定位算法(USA)。该算法主要解决水下无线传感器网络(UWSN)面临的一些安全威胁问题。以提高无线传感器网络安全性,特别是位置信息的安全性为设计目标。利用节点协作形成的阵列作为天线阵列进行相互通信,在不增加额外硬件成本的同时,还获得阵列天线给无线传感器网络带来的优势,如减小多径效应、提高接收端的信噪比、增加系统容量等。USA算法基于这种阵列结构使网络得到很高安全特性,特别是,对Wormhole攻击具有非常好的抵御性能。仿真实验证明该算法的有效性。 相似文献