首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   364篇
  免费   15篇
  国内免费   1篇
电工技术   2篇
综合类   1篇
化学工业   74篇
金属工艺   1篇
机械仪表   8篇
建筑科学   9篇
矿业工程   11篇
能源动力   10篇
轻工业   48篇
水利工程   3篇
石油天然气   1篇
无线电   49篇
一般工业技术   31篇
冶金工业   18篇
自动化技术   114篇
  2024年   1篇
  2023年   2篇
  2022年   12篇
  2021年   9篇
  2020年   9篇
  2019年   7篇
  2018年   10篇
  2017年   13篇
  2016年   16篇
  2015年   8篇
  2014年   15篇
  2013年   24篇
  2012年   27篇
  2011年   30篇
  2010年   23篇
  2009年   26篇
  2008年   22篇
  2007年   18篇
  2006年   12篇
  2005年   9篇
  2004年   14篇
  2003年   10篇
  2002年   11篇
  2001年   7篇
  2000年   2篇
  1999年   2篇
  1998年   6篇
  1997年   4篇
  1996年   4篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   4篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   1篇
  1985年   3篇
  1980年   1篇
  1978年   2篇
  1977年   2篇
  1975年   1篇
排序方式: 共有380条查询结果,搜索用时 62 毫秒
11.
Motion segmentation refers to the problem of separating the objects in a video sequence according to their motion. It is a fundamental problem of computer vision, since various systems focusing on the analysis of dynamic scenes include motion segmentation algorithms. In this paper we present a novel approach, where a video shot is temporally divided in successive and overlapping windows and motion segmentation is performed on each window respectively. This attribute renders the algorithm suitable even for long video sequences. In the last stage of the algorithm the segmentation results for every window are aggregated into a final segmentation. The presented algorithm can handle effectively asynchronous trajectories on each window even when they have no temporal intersection. The evaluation of the proposed algorithm on the Berkeley motion segmentation benchmark demonstrates its scalability and accuracy compared to the state of the art.  相似文献   
12.
Multimedia Tools and Applications - Traditional multimedia search engines retrieve results based mostly on the query submitted by the user, or using a log of previous searches to provide...  相似文献   
13.
In this paper, a novel multi-view human movement recognition method is presented. A novel representation of multi-view human movement videos is proposed that is based on learning basic multi-view human movement primitives, called multi-view dynemes. The movement video is represented in a new feature space (called dyneme space) using these multi-view dynemes, thus producing a time invariant multi-view movement representation. Fuzzy distances from the multi-view dynemes are used to represent the human body postures in the dyneme space. Three variants of Linear Discriminant Analysis (LDA) are evaluated to achieve a discriminant movement representation in a low dimensionality space. The view identification problem is solved either by using a circular block shift procedure followed by the evaluation of the minimum Euclidean distance from any dyneme, or by exploiting the circular shift invariance property of the Discrete Fourier Transform (DFT). The discriminant movement representation combined with camera viewpoint identification and a nearest centroid classification step leads to a high human movement classification accuracy.  相似文献   
14.
15.
In this paper, two novel methods suitable for blind 3D mesh object watermarking applications are proposed. The first method is robust against 3D rotation, translation, and uniform scaling. The second one is robust against both geometric and mesh simplification attacks. A pseudorandom watermarking signal is cast in the 3D mesh object by deforming its vertices geometrically, without altering the vertex topology. Prior to watermark embedding and detection, the object is rotated and translated so that its center of mass and its principal component coincide with the origin and the z-axis of the Cartesian coordinate system. This geometrical transformation ensures watermark robustness to translation and rotation. Robustness to uniform scaling is achieved by restricting the vertex deformations to occur only along the r coordinate of the corresponding (r, /spl theta/, /spl phi/) spherical coordinate system. In the first method, a set of vertices that correspond to specific angles /spl theta/ is used for watermark embedding. In the second method, the samples of the watermark sequence are embedded in a set of vertices that correspond to a range of angles in the /spl theta/ domain in order to achieve robustness against mesh simplifications. Experimental results indicate the ability of the proposed method to deal with the aforementioned attacks.  相似文献   
16.
This paper considers the control problem of a robotic manipulator with separately excited dc motor drives as actuators. An innovative method is proposed which achieves robot speed-control requirements, with simultaneous minimization of total electromechanical losses, while the drives follow the desired speed profiles of the robot joints under various loads and random load disturbances. If there is no demand for a specific speed profile, the optimal speed trajectory is determined by minimizing an electromechanical losses criterion. Controllable energy losses, such as armature copper losses, armature iron losses, field copper losses, stray load losses, brush load losses, friction and windage losses, can be expressed proportionally to the squares of the armature and the field (exciting) currents, the angular velocity and the magnetic field flux. The controllable energy loss term is also included in the optimal control integral quadratic performance index, defined for the whole operation period. Thus the appropriate control signals required for following the desired trajectory by simultaneous energy loss minimization for the whole operation interval are achieved. Two case studies of optimal robot control with and without minimization of actuator energy losses are presented and compared, showing the energy savings that can be achieved by the proposed methodology.  相似文献   
17.
18.
The application of document clustering to information retrieval has been motivated by the potential effectiveness gains postulated by the cluster hypothesis. The hypothesis states that relevant documents tend to be highly similar to each other and therefore tend to appear in the same clusters. In this paper we propose an axiomatic view of the hypothesis by suggesting that documents relevant to the same query (co-relevant documents) display an inherent similarity to each other that is dictated by the query itself. Because of this inherent similarity, the cluster hypothesis should be valid for any document collection. Our research describes an attempt to devise means by which this similarity can be detected. We propose the use of query-sensitive similarity measures that bias interdocument relationships toward pairs of documents that jointly possess attributes expressed in a query. We experimentally tested three query-sensitive measures against conventional ones that do not take the query into account, and we also examined the comparative effectiveness of the three query-sensitive measures. We calculated interdocument relationships for varying numbers of top-ranked documents for six document collections. Our results show a consistent and significant increase in the number of relevant documents that become nearest neighbors of any given relevant document when query-sensitive measures are used. These results suggest that the effectiveness of a cluster-based information retrieval system has the potential to increase through the use of query-sensitive similarity measures.  相似文献   
19.
20.
Extract-transform-load (ETL) workflows model the population of enterprise data warehouses with information gathered from a large variety of heterogeneous data sources. ETL workflows are complex design structures that run under strict performance requirements and their optimization is crucial for satisfying business objectives. In this paper, we deal with the problem of scheduling the execution of ETL activities (a.k.a. transformations, tasks, operations), with the goal of minimizing ETL execution time and allocated memory. We investigate the effects of four scheduling policies on different flow structures and configurations and experimentally show that the use of different scheduling policies may improve ETL performance in terms of memory consumption and execution time. First, we examine a simple, fair scheduling policy. Then, we study the pros and cons of two other policies: the first opts for emptying the largest input queue of the flow and the second for activating the operation (a.k.a. activity) with the maximum tuple consumption rate. Finally, we examine a fourth policy that combines the advantages of the latter two in synergy with flow parallelization.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号