全文获取类型
收费全文 | 1038篇 |
免费 | 66篇 |
专业分类
电工技术 | 17篇 |
综合类 | 2篇 |
化学工业 | 259篇 |
金属工艺 | 12篇 |
机械仪表 | 28篇 |
建筑科学 | 53篇 |
矿业工程 | 11篇 |
能源动力 | 67篇 |
轻工业 | 131篇 |
水利工程 | 6篇 |
石油天然气 | 3篇 |
无线电 | 89篇 |
一般工业技术 | 153篇 |
冶金工业 | 33篇 |
原子能技术 | 6篇 |
自动化技术 | 234篇 |
出版年
2023年 | 9篇 |
2022年 | 35篇 |
2021年 | 48篇 |
2020年 | 23篇 |
2019年 | 22篇 |
2018年 | 17篇 |
2017年 | 28篇 |
2016年 | 48篇 |
2015年 | 48篇 |
2014年 | 61篇 |
2013年 | 78篇 |
2012年 | 71篇 |
2011年 | 87篇 |
2010年 | 57篇 |
2009年 | 63篇 |
2008年 | 69篇 |
2007年 | 45篇 |
2006年 | 48篇 |
2005年 | 44篇 |
2004年 | 32篇 |
2003年 | 22篇 |
2002年 | 24篇 |
2001年 | 13篇 |
2000年 | 14篇 |
1999年 | 11篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1979年 | 4篇 |
1977年 | 3篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1971年 | 2篇 |
1969年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有1104条查询结果,搜索用时 31 毫秒
21.
Alejandra Barrera Alejandra C��ceres Alfredo Weitzenfeld Victor Ramirez-Amaya 《Journal of Intelligent and Robotic Systems》2011,63(3-4):361-397
The study of behavioral and neurophysiological mechanisms involved in rat spatial cognition provides a basis for the development of computational models and robotic experimentation of goal-oriented learning tasks. These models and robotics architectures offer neurobiologists and neuroethologists alternative platforms to study, analyze and predict spatial cognition based behaviors. In this paper we present a comparative analysis of spatial cognition in rats and robots by contrasting similar goal-oriented tasks in a cyclical maze, where studies in rat spatial cognition are used to develop computational system-level models of hippocampus and striatum integrating kinesthetic and visual information to produce a cognitive map of the environment and drive robot experimentation. During training, Hebbian learning and reinforcement learning, in the form of Actor-Critic architecture, enable robots to learn the optimal route leading to a goal from a designated fixed location in the maze. During testing, robots exploit maximum expectations of reward stored within the previously acquired cognitive map to reach the goal from different starting positions. A detailed discussion of comparative experiments in rats and robots is presented contrasting learning latency while characterizing behavioral procedures during navigation such as errors associated with the selection of a non-optimal route, body rotations, normalized length of the traveled path, and hesitations. Additionally, we present results from evaluating neural activity in rats through detection of the immediate early gene Arc to verify the engagement of hippocampus and striatum in information processing while solving the cyclical maze task, such as robots use our corresponding models of those neural structures. 相似文献
22.
Given recent experimental results suggesting that neural circuits may evolve through multiple firing states, we develop a framework for estimating state-dependent neural response properties from spike train data. We modify the traditional hidden Markov model (HMM) framework to incorporate stimulus-driven, non-Poisson point-process observations. For maximal flexibility, we allow external, time-varying stimuli and the neurons' own spike histories to drive both the spiking behavior in each state and the transitioning behavior between states. We employ an appropriately modified expectation-maximization algorithm to estimate the model parameters. The expectation step is solved by the standard forward-backward algorithm for HMMs. The maximization step reduces to a set of separable concave optimization problems if the model is restricted slightly. We first test our algorithm on simulated data and are able to fully recover the parameters used to generate the data and accurately recapitulate the sequence of hidden states. We then apply our algorithm to a recently published data set in which the observed neuronal ensembles displayed multistate behavior and show that inclusion of spike history information significantly improves the fit of the model. Additionally, we show that a simple reformulation of the state space of the underlying Markov chain allows us to implement a hybrid half-multistate, half-histogram model that may be more appropriate for capturing the complexity of certain data sets than either a simple HMM or a simple peristimulus time histogram model alone. 相似文献
23.
Marc Baboulin Alfredo Buttari Jack Dongarra Jakub Kurzak Julie Langou Julien Langou Piotr Luszczek Stanimire Tomov 《Computer Physics Communications》2009,180(12):2526-2533
On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit floating point arithmetic, the performance of many dense and sparse linear algebra algorithms can be significantly enhanced while maintaining the 64-bit accuracy of the resulting solution. The approach presented here can apply not only to conventional processors but also to other technologies such as Field Programmable Gate Arrays (FPGA), Graphical Processing Units (GPU), and the STI Cell BE processor. Results on modern processor architectures and the STI Cell BE are presented.
Program summary
Program title: ITER-REFCatalogue identifier: AECO_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AECO_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 7211No. of bytes in distributed program, including test data, etc.: 41 862Distribution format: tar.gzProgramming language: FORTRAN 77Computer: desktop, serverOperating system: Unix/LinuxRAM: 512 MbytesClassification: 4.8External routines: BLAS (optional)Nature of problem: On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit floating point arithmetic, the performance of many dense and sparse linear algebra algorithms can be significantly enhanced while maintaining the 64-bit accuracy of the resulting solution.Solution method: Mixed precision algorithms stem from the observation that, in many cases, a single precision solution of a problem can be refined to the point where double precision accuracy is achieved. A common approach to the solution of linear systems, either dense or sparse, is to perform the LU factorization of the coefficient matrix using Gaussian elimination. First, the coefficient matrix A is factored into the product of a lower triangular matrix L and an upper triangular matrix U. Partial row pivoting is in general used to improve numerical stability resulting in a factorization PA=LU, where P is a permutation matrix. The solution for the system is achieved by first solving Ly=Pb (forward substitution) and then solving Ux=y (backward substitution). Due to round-off errors, the computed solution, x, carries a numerical error magnified by the condition number of the coefficient matrix A. In order to improve the computed solution, an iterative process can be applied, which produces a correction to the computed solution at each iteration, which then yields the method that is commonly known as the iterative refinement algorithm. Provided that the system is not too ill-conditioned, the algorithm produces a solution correct to the working precision.Running time: seconds/minutes 相似文献24.
25.
We consider devices equipped with multiple wired or wireless interfaces. By switching of various interfaces, each device might establish several connections. A connection is established when the devices at its endpoints share at least one active interface. Each interface is assumed to require an activation cost. In this paper, we consider two basic networking problems in the field of multi-interface networks. The first one, known as the Coverage problem, requires to establish the connections defined by a network. The second one, known as Connectivity problem, requires to guarantee a connecting path between any pair of nodes of a network. Both are subject to the constraint of keeping as low as possible the maximum cost set of active interfaces at each single node. We study the problems of minimizing the maximum cost set of active interfaces among the nodes of the network in order to cover all the edges in the first case, or to ensure connectivity in the second case. We prove that the Coverage problem is NP-hard for any fixed Δ≥5 and k≥16, with Δ being the maximum degree, and k being the number of different interfaces among the network. We also show that, unless P=NP, the problem cannot be approximated within a factor of ηln?Δ, for a certain constant η. We then provide a general approximation algorithm which guarantees a factor of O((1+b)ln?Δ), with b being a parameter depending on the topology of the input graph. Interestingly, b can be bounded by a constant for many graph classes. Other approximation and exact algorithms for special cases are presented. Concerning the Connectivity problem, we prove that it is NP-hard for any fixed Δ≥3 and k≥10. Also for this problem, the inapproximability result holds, that is, unless P=NP, the problem cannot be approximated within a factor of ηln?Δ, for a certain constant η. We then provide approximation and exact algorithms for the general problem and for special cases, respectively. 相似文献
26.
Carlos Arizmendi Alfredo VellidoEnrique Romero 《Expert systems with applications》2012,39(5):5223-5232
The diagnosis of brain tumours is an extremely sensitive and complex clinical task that must rely upon information gathered through non-invasive techniques. One such technique is Magnetic Resonance Spectroscopy. In this task, radiology experts are likely to benefit from the support of computer-based systems built around robust classification processes. In this paper, a Discrete Wavelet Transform procedure was applied to the pre-processing of spectra corresponding to several brain tumour pathologies. This procedure does not alleviate the high dimensionality of the data by itself. For this reason, dimensionality reduction was subsequently implemented using Moving Window with Variance Analysis for feature selection or Principal Component Analysis for feature extraction. The combined method yielded very encouraging results in terms of diagnostic discriminatory binary classification using Bayesian Neural Networks. In most cases, the classification accuracy improved on previously reported results. 相似文献
27.
Alfredo Vaccaro Gianluca BontempiSouhaib Ben Taieb Domenico Villacci 《Electric Power Systems Research》2012,83(1):129-135
A massive deployment of wind energy in power systems is expected in the near future. However, a still open issue is how to integrate wind generators into existing electrical grids by limiting their side effects on network operations and control. In order to attain this objective, accurate short and medium-term wind speed forecasting is required.This paper discusses and compares a physical (white-box) model (namely a limited-area non hydrostatic model developed by the European consortium for small-scale modeling) with a family of local learning techniques (black-box) for short and medium term forecasting. Also, an original model integrating machine learning techniques with physical knowledge modeling (grey-box) is proposed.A set of experiments on real data collected from a set of meteorological sensors located in the south of Italy supports the methodological analysis and assesses the potential of the different forecasting approaches. 相似文献
28.
Francesco Palmieri Ugo Fiore Aniello Castiglione Alfredo De Santis 《Applied Soft Computing》2013,13(1):615-627
In the last years, the interest in methods and techniques for circumventing the security of the available digital video broadcasting systems is continuously increasing. Digital TV providers are struggling to restrict access to their video contents only to authorized users, by deploying more and more sophisticated conditional access systems. At the state-of-the-art, the most significant menace is the card-sharing activity which exploits a known weakness allowing an authorized subscriber to provide access to digital contents to a potentially large group of unauthorized ones connected over a communication network. This is usually realized by using ad hoc customized devices. Detecting the presence of these illegal systems on a network, by recognizing their related traffic is an issue of primary importance. Unfortunately, to avoid the identification of such traffic, payload obfuscation strategies based on encryption are often used, hindering packet inspection techniques.This paper presents a strategy for the detection of card-sharing traffic, empowered by machine-learning-driven traffic classification techniques and based on the natural capability of wavelet analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas have been used for the proof-of-concept implementation of an SVM-based binary classification scheme that relies only on time regularities of the traffic and not on the packet contents and hence is immune to payload obfuscation techniques. 相似文献
29.
30.