首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   188篇
  免费   8篇
  国内免费   1篇
电工技术   4篇
化学工业   57篇
金属工艺   2篇
机械仪表   15篇
建筑科学   5篇
能源动力   4篇
轻工业   21篇
石油天然气   1篇
无线电   7篇
一般工业技术   21篇
冶金工业   20篇
自动化技术   40篇
  2022年   4篇
  2021年   8篇
  2020年   6篇
  2019年   2篇
  2017年   3篇
  2016年   2篇
  2015年   5篇
  2014年   6篇
  2013年   14篇
  2012年   7篇
  2011年   19篇
  2010年   10篇
  2009年   17篇
  2008年   9篇
  2007年   9篇
  2006年   9篇
  2005年   2篇
  2004年   9篇
  2003年   6篇
  2002年   6篇
  2001年   1篇
  2000年   5篇
  1999年   6篇
  1998年   11篇
  1997年   4篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1989年   1篇
  1983年   1篇
  1981年   2篇
  1980年   1篇
  1976年   2篇
  1975年   1篇
  1973年   1篇
排序方式: 共有197条查询结果,搜索用时 10 毫秒
41.
Query rewriting using views is a technique that allows a query to be answered efficiently by using pre-computed materialized views. It has many applications, such as data caching, query optimization, schema integration, etc. This issue has been studied extensively for relational databases and, as a result, the technology is maturing. For XML data, however, the work is inadequate. Recently, several frameworks have been proposed for query rewriting using views for XPath queries, with the requirement that a rewriting must be complete. In this paper, we study the problem of query rewriting using views for XPath queries without requiring that the rewriting be complete. This will increase its applicability since in many cases, complete rewritings using views do not exist. We give formal definitions for various concepts to formulate the problem, and then propose solutions. Our solutions are built under the framework for query containment. We look into the problem from both theoretic perspectives, and algorithmic approaches. Two methods to generate rewritings using views are proposed, with different characteristics in terms of generalities and efficiencies. The maximality properties of the rewritings generated by these methods are discussed.  相似文献   
42.
The authors examined the hypothesis that the interaction between the need for cognitive structure (NCS) and the ability to achieve cognitive structure (AACS) moderates the effect of stress on information processing. NCS is the preference for using cognitive structuring, as opposed to piecemeal processes, as a means to achieve certainty. AACS is the extent to which individuals are able to apply information processes that are consistent with their levels of NCS. The hypothesis was validated in 4 studies, which showed that stress increased high-AACS participants' use of cognitive structuring if they had high NCS and reduced it if they had low NCS. An opposite effect was found for low-AACS participants. The implications of these results for the understanding of the mechanisms responsible for the effect of stress on information processing are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
43.

Background  

Inadequate protein intake is known to be deleterious in animals. Using WHO consensus documents for human nutrient requirements, the protein:energy ratio (P:E) of an adequate diet is > 5%. Cassava has a very low protein content. This study tested the hypothesis that Nigerian and Kenyan children consuming cassava as their staple food are at greater risk for inadequate dietary protein intake than those children who consume less cassava.  相似文献   
44.
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the association of individuals to sensitive information. In this paper, we propose an (α, k)-anonymity model to protect both identifications and relationships to sensitive information in data. We discuss the properties of (α, k)-anonymity model. We prove that the optimal (α, k)-anonymity problem is NP-hard. We first present an optimal global-recoding method for the (α, k)-anonymity problem. Next we propose two scalable local-recoding algorithms which are both more scalable and result in less data distortion. The effectiveness and efficiency are shown by experiments. We also describe how the model can be extended to more general cases.  相似文献   
45.
The purpose of this study was to investigate the difference in the level of fatigue induced by high-speed maritime craft operation between the day- and night-shift officers. The demographic and work-related factors that contribute to fatigue were also explored. A total of 93 high-speed maritime craft officers participated in the survey, of whom 35 worked a day shift (Mean age=48.3 years) and 58 worked a night shift (Mean age=45.8 years). Fatigue experience was measured with the Chinese version of the Swedish Occupational Fatigue Inventory (SOFI-C) at the beginning, in the middle and at the end of the work shift. Information on age, work experience, perceived voyage difficulty and duty schedule was obtained. The study found that the night-shift officers seemed to manifest an overall higher level of perceived fatigue than the day-shift officers, while the day-shift officers demonstrated a fatigue carry-over effect across the two workdays. Besides the shift pattern, age, experience in operating high-speed maritime craft and perceived voyage difficulty were the significant factors contributing to the officers' fatigue experience. The finding that the fatigue experience associated with high-speed maritime craft operation has a rapid and accumulative nature suggests that different occupational safety and health guidelines should be devised for these two groups of officers.  相似文献   
46.
Finding typical instances is an effective approach to understand and analyze large data sets. In this paper, we apply the idea of typicality analysis from psychology and cognitive science to database query answering, and study the novel problem of answering top-k typicality queries. We model typicality in large data sets systematically. Three types of top-k typicality queries are formulated. To answer questions like “Who are the top-k most typical NBA players?”, the measure of simple typicality is developed. To answer questions like “Who are the top-k most typical guards distinguishing guards from other players?”, the notion of discriminative typicality is proposed. Moreover, to answer questions like “Who are the best k typical guards in whole representing different types of guards?”, the notion of representative typicality is used. Computing the exact answer to a top-k typicality query requires quadratic time which is often too costly for online query answering on large databases. We develop a series of approximation methods for various situations: (1) the randomized tournament algorithm has linear complexity though it does not provide a theoretical guarantee on the quality of the answers; (2) the direct local typicality approximation using VP-trees provides an approximation quality guarantee; (3) a local typicality tree data structure can be exploited to index a large set of objects. Then, typicality queries can be answered efficiently with quality guarantees by a tournament method based on a Local Typicality Tree. An extensive performance study using two real data sets and a series of synthetic data sets clearly shows that top-k typicality queries are meaningful and our methods are practical.  相似文献   
47.
Efficient Rule-Based Attribute-Oriented Induction for Data Mining   总被引:3,自引:0,他引:3  
Data mining has become an important technique which has tremendous potential in many commercial and industrial applications. Attribute-oriented induction is a powerful mining technique and has been successfully implemented in the data mining system DBMiner (Han et al. Proc. 1996 Int'l Conf. on Data Mining and Knowledge Discovery (KDD'96), Portland, Oregon, 1996). However, its induction capability is limited by the unconditional concept generalization. In this paper, we extend the concept generalization to rule-based concept hierarchy, which enhances greatly its induction power. When previously proposed induction algorithm is applied to the more general rule-based case, a problem of induction anomaly occurs which impacts its efficiency. We have developed an efficient algorithm to facilitate induction on the rule-based case which can avoid the anomaly. Performance studies have shown that the algorithm is superior than a previously proposed algorithm based on backtracking.  相似文献   
48.
产品设计中获取用户需求的研究及软件系统的开发   总被引:8,自引:0,他引:8  
用户需求被定义为产品使用用户用自己的语言表达的对产品的要求。它是企业正确制定产品设计战略的基础,是企业进行产品设计的依据和源头。本文介绍了产品设计中用户需求获取的关键技术和实现策略及相应的软件系统的开发。  相似文献   
49.
50.
Since the introduction of the concept of auditory scene analysis, there has been a paucity of work focusing on the theoretical explanation of how attention is allocated within a complex auditory scene. Here we examined signal detection in situations that promote either the fusion of tonal elements into a single sound object or the segregation of a mistuned element (i.e., harmonic) that “popped out” as a separate individuated auditory object and yielded the perception of concurrent sound objects. On each trial, participants indicated whether the incoming complex sound contained a brief gap or not. The gap (i.e., signal) was always inserted in the middle of one of the tonal elements. Our findings were consistent with an object-based account in which perception of two simultaneous auditory objects interfered with signal detection. This effect was observed for a wide range of gap durations and was greater when the mistuned harmonic was perceived as a separate object. These results suggest that attention may be initially shared among concurrent sound objects thereby reducing listeners' ability to process acoustic details belonging to a particular sound object. These findings provide new theoretical insight for our understanding of auditory attention and auditory scene analysis. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号