全文获取类型
收费全文 | 352篇 |
免费 | 20篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 81篇 |
金属工艺 | 2篇 |
机械仪表 | 5篇 |
建筑科学 | 19篇 |
矿业工程 | 1篇 |
能源动力 | 36篇 |
轻工业 | 22篇 |
水利工程 | 8篇 |
无线电 | 46篇 |
一般工业技术 | 40篇 |
冶金工业 | 6篇 |
原子能技术 | 1篇 |
自动化技术 | 102篇 |
出版年
2023年 | 6篇 |
2022年 | 12篇 |
2021年 | 18篇 |
2020年 | 7篇 |
2019年 | 15篇 |
2018年 | 16篇 |
2017年 | 18篇 |
2016年 | 12篇 |
2015年 | 11篇 |
2014年 | 14篇 |
2013年 | 25篇 |
2012年 | 29篇 |
2011年 | 38篇 |
2010年 | 20篇 |
2009年 | 25篇 |
2008年 | 12篇 |
2007年 | 23篇 |
2006年 | 10篇 |
2005年 | 2篇 |
2004年 | 10篇 |
2003年 | 9篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 8篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有372条查询结果,搜索用时 218 毫秒
91.
On Data and Algorithms: Understanding Inductive Performance 总被引:1,自引:0,他引:1
92.
Themis P Exarchos Alexandros T Tzallas Dimitrios I Fotiadis Spiros Konitsiotis Sotirios Giannopoulos 《IEEE transactions on information technology in biomedicine》2006,10(3):451-457
In this paper, a methodology for the automated detection and classification of transient events in electroencephalographic (EEG) recordings is presented. It is based on association rule mining and classifies transient events into four categories: epileptic spikes, muscle activity, eye blinking activity, and sharp alpha activity. The methodology involves four stages: 1) transient event detection; 2) clustering of transient events and feature extraction; 3) feature discretization and feature subset selection; and 4) association rule mining and classification of transient events. The methodology is evaluated using 25 EEG recordings, and the best obtained accuracy was 87.38%. The proposed approach combines high accuracy with the ability to provide interpretation for the decisions made, since it is based on a set of association rules. 相似文献
93.
Trap‐State Suppression and Improved Charge Transport in PbS Quantum Dot Solar Cells with Synergistic Mixed‐Ligand Treatments
下载免费PDF全文
![点击此处可从《Small (Weinheim an der Bergstrasse, Germany)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Santanu Pradhan Alexandros Stavrinadis Shuchi Gupta Yu Bi Francesco Di Stasio Gerasimos Konstantatos 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(21)
The power conversion efficiency of colloidal PbS‐quantum‐dot (QD)‐based solar cells is significantly hampered by lower‐than‐expected open circuit voltage (VOC). The VOC deficit is considerably higher in QD‐based solar cells compared to other types of existing solar cells due to in‐gap trap‐induced bulk recombination of photogenerated carriers. Here, this study reports a ligand exchange procedure based on a mixture of zinc iodide and 3‐mercaptopropyonic acid to reduce the VOC deficit without compromising the high current density. This layer‐by‐layer solid state ligand exchange treatment enhances the photovoltaic performance from 6.62 to 9.92% with a significant improvement in VOC from 0.58 to 0.66 V. This study further employs optoelectronic characterization, X‐ray photoelectron spectroscopy, and photoluminescence spectroscopy to understand the origin of VOC improvement. The mixed‐ligand treatment reduces the sub‐bandgap traps and significantly reduces bulk recombination in the devices. 相似文献
94.
Panagiotis Liakos Alexandros Ntoulas Alexandros Labrinidis Alex Delis 《World Wide Web》2016,19(4):605-631
A constantly growing amount of high-quality information resides in databases and is guarded behind forms that users fill out and submit. The Hidden Web comprises all these information sources that conventional web crawlers are incapable of discovering. In order to excavate and make available meaningful data from the Hidden Web, previous work has focused on developing query generation techniques that aim at downloading all the content of a given Hidden Web site with the minimum cost. However, there are circumstances where only a specific part of such a site might be of interest. For example, a politics portal should not have to waste bandwidth or processing power to retrieve sports articles just because they are residing in databases also containing documents relevant to politics. In cases like this one, we need to make the best use of our resources in downloading only the portion of the Hidden Web site that we are interested in. We investigate how we can build a focused Hidden Web crawler that can autonomously extract topic-specific pages from the Hidden Web by searching only the subset that is related to the corresponding area. In this regard, we present an approach that progresses iteratively and analyzes the returned results in order to extract terms that capture the essence of the topic we are interested in. We propose a number of different crawling policies and we experimentally evaluate them with data from four popular sites. Our approach is able to download most of the content in search in all cases, using a significantly smaller number of queries compared to existing approaches. 相似文献
95.
Alexandros Yeratziotis Dalenca Pottas Darelle Van Greunen 《International journal of human-computer interaction》2013,29(10):678-694
The security, privacy, and usability of health social networking websites remain key concerns for their successful adoption by patients. As far as it is known, no studies have developed a usable security heuristic evaluation to test these websites for the usability of their security and privacy features. This article describes the development of such a usable security heuristic evaluation in the context of the online health social networking paradigm. The tailored method approach was applied to transform themes identified from relevant literature and convert them into high-level heuristics for usable security. Checklist items were created for each high-level heuristic. The result is 13 high-level heuristics with individualized checklist items that help examine usable security. The results can identify which security and privacy features are lacking from a usability perspective and would, therefore, require design improvement. The improvements would enhance the users' experiences, which in turn can assist in the adoption of health social networking websites. 相似文献
96.
A Hierarchical Model Fusion (HMF) framework for object tracking in video sequences is presented. The Bayesian tracking equations are extended to account for multiple object models. With these equations as a basis a particle filter algorithm is developed to efficiently cope with the multi-modal distributions emerging from cluttered scenes. The update of each object model takes place hierarchically so that the lower dimensional object models, which are updated first, guide the search in the parameter space of the subsequent object models to relevant regions thus reducing the computational complexity. A method for object model adaptation is also developed. We apply the proposed framework by fusing salient points, blobs, and edges as features and verify experimentally its effectiveness in challenging conditions. 相似文献
97.
Serdar Yildirim Shrikanth Narayanan Alexandros Potamianos 《Computer Speech and Language》2011,25(1):29-44
The automatic recognition of user’s communicative style within a spoken dialog system framework, including the affective aspects, has received increased attention in the past few years. For dialog systems, it is important to know not only what was said but also how something was communicated, so that the system can engage the user in a richer and more natural interaction. This paper addresses the problem of automatically detecting “frustration”, “politeness”, and “neutral” attitudes from a child’s speech communication cues, elicited in spontaneous dialog interactions with computer characters. Several information sources such as acoustic, lexical, and contextual features, as well as, their combinations are used for this purpose. The study is based on a Wizard-of-Oz dialog corpus of 103 children, 7–14 years of age, playing a voice activated computer game. Three-way classification experiments, as well as, pairwise classification between polite vs. others and frustrated vs. others were performed. Experimental results show that lexical information has more discriminative power than acoustic and contextual cues for detection of politeness, whereas context and acoustic features perform best for frustration detection. Furthermore, the fusion of acoustic, lexical and contextual information provided significantly better classification results. Results also showed that classification performance varies with age and gender. Specifically, for the “politeness” detection task, higher classification accuracy was achieved for females and 10–11 years-olds, compared to males and other age groups, respectively. 相似文献
98.
Monitoring and interpreting sequential learner activities has the potential to improve adaptivity and personalization within educational environments. We present an approach based on the modeling of learners?? problem solving activity sequences, and on the use of the models in targeted, and ultimately automated clustering, resulting in the discovery of new, semantically meaningful information about the learners. The approach is applicable at different levels: to detect pre-defined, well-established problem solving styles, to identify problem solving styles by analyzing learner behaviour along known learning dimensions, and to semi-automatically discover learning dimensions and concrete problem solving patterns. This article describes the approach itself, demonstrates the feasibility of applying it on real-world data, and discusses aspects of the approach that can be adjusted for different learning contexts. Finally, we address the incorporation of the proposed approach in the adaptation cycle, from data acquisition to adaptive system interventions in the interaction process. 相似文献
99.
Thanassis Perperis Theodoros Giannakopoulos Alexandros Makris Dimitrios I. Kosmopoulos Sofia Tsekeridou Stavros J. Perantonis Sergios Theodoridis 《Expert systems with applications》2011,38(11):14102-14116
In this paper we present our research results towards the detection of violent scenes in movies, employing advanced fusion methodologies, based on learning, knowledge representation and reasoning. Towards this goal, a multi-step approach is followed: initially, automated audio and visual analysis is performed to extract audio and visual cues. Then, two different fusion approaches are deployed: (i) a multimodal one that provides binary decisions on the existence of violence or not, employing machine learning techniques, (ii) an ontological and reasoning one, that combines the audio-visual cues with violence and multimedia ontologies. The latter reasons out not only the existence of violence or not in a video scene, but also the type of violence (fight, screams, gunshots). Both approaches are experimentally tested, validated and compared for the binary decision problem of violence detection. Finally, results for the violence type identification are presented for the ontological fusion approach. For evaluation purposes, a large dataset of real movie data has been populated. 相似文献
100.
The evaluation of the economic efficiency of regulatory schemes is essential for regulators and utilities. In this study it is analysed for the first time the welfare costs of non-marginal cost pricing in the water supply in England and Wales, by computing the deadweight loss of the water only companies (WoCs) that existed over the period of 1993–2009. The results indicate that the current price schemes can have substantial efficiency costs. Our estimates show that the loss of efficiency for the WoCs lies between 15 and 60 million GBP over the period 1993–2009. These amounts could have been redistributed either to the companies in terms of profits or to the consumers via price reductions. The methodology and results of this study are of great interest for both regulators and water utilities managers to evaluate the effectiveness of price regulation and make informed decisions. 相似文献