首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   954篇
  免费   68篇
电工技术   13篇
综合类   2篇
化学工业   244篇
金属工艺   5篇
机械仪表   12篇
建筑科学   34篇
矿业工程   1篇
能源动力   47篇
轻工业   105篇
水利工程   10篇
石油天然气   1篇
无线电   130篇
一般工业技术   141篇
冶金工业   23篇
原子能技术   1篇
自动化技术   253篇
  2024年   2篇
  2023年   16篇
  2022年   45篇
  2021年   46篇
  2020年   31篇
  2019年   19篇
  2018年   36篇
  2017年   43篇
  2016年   46篇
  2015年   33篇
  2014年   40篇
  2013年   63篇
  2012年   64篇
  2011年   81篇
  2010年   50篇
  2009年   63篇
  2008年   61篇
  2007年   47篇
  2006年   39篇
  2005年   34篇
  2004年   21篇
  2003年   14篇
  2002年   16篇
  2001年   9篇
  2000年   7篇
  1999年   8篇
  1998年   6篇
  1997年   15篇
  1996年   6篇
  1995年   4篇
  1994年   5篇
  1993年   5篇
  1992年   7篇
  1991年   5篇
  1990年   2篇
  1989年   6篇
  1988年   4篇
  1987年   4篇
  1986年   5篇
  1985年   3篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1979年   2篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有1022条查询结果,搜索用时 15 毫秒
71.
The Video Event Awareness Workbench (VEAW) analyzes surveillance video from thousands of video cameras and automatically detects complex events in near-real-time-at pace with their input video streams. For events of interest to security personnel, VEAW generates and routes alerts and related video evidence to subscribing security personnel. Complex event processing in VEAW is driven by user-authored awareness specifications comprised of inter-connected spatio-temporal stream and statistical operators that consume and produce events described in VEAW’s surveillance ontology. In this paper we introduce VEAW’s event driven architecture and describe its solutions for automating video surveillance, including the orchestration of continuous and tasked video analysis algorithms (e.g., for entity tracking and identification), fusion of events from multiple sources in an installation-specific “world” model, and proactive information gathering to deal with missing or incomplete information (this is done by tasking video analysis algorithms and security personnel to provide it). We also discuss how VEAW deals with late arriving information (due to out-of-band video analysis tasks and overhead), as well as a related resource optimization aimed at minimizing computation costs. We illustrate the benefits of VEAW by illustrating its application on the automation of real-world security policies.  相似文献   
72.
Workflow management systems (WfMS) are widely used by business enterprises as tools for administrating, automating and scheduling the business process activities with the available resources. Since the control flow specifications of workflows are manually designed, they entail assumptions and errors, leading to inaccurate workflow models. Decision points, the XOR nodes in a workflow graph model, determine the path chosen toward completion of any process invocation. In this work, we show that positioning the decision points at their earliest points can improve process efficiency by decreasing their uncertainties and identifying redundant activities. We present novel techniques to discover the earliest positions by analyzing workflow logs and to transform the model graph. The experimental results show that the transformed model is more efficient with respect to its average execution time and uncertainty, when compared to the original model.  相似文献   
73.
This paper presents an analysis of current and potential cross-border congestion management methods for the EU electricity market. Many currently used techniques are reported and the main aspects of possible future are presented. The main steps of the newly established coordinated auction technique will be reported and an example of a real case for the South European Region will be implemented. Moreover, in order to eliminate loop flows, avoid congestions at the day ahead stage and increase the total transfer capacity of the south UCTE region (countries Greece, Albania and FYROM), it will be shown that Flexible Ac Transmission Systems technology can help market players to get access to more transfer capacity for their transactions, while security margins are being maintained.  相似文献   
74.
The crystallization of calcium carbonate was investigated on pristine and non-covalently modified carbon nanotubes (CNTs) using the vapor diffusion technique in a calcium chloride solution. Non-covalent modification was accomplished by treating the carbon nanostructures with the amphiphilic copolymer poly(isoprene-b-acrylic acid). Calcium carbonate crystals grown on the surface and in the interstitial channels of CNT buckypapers were observed in both cases. Scanning electron microscopy analysis of the untreated CNTs showed the characteristic rhombohedral morphology of calcite crystals, while in the case of modified material spherical and ellipsoidal crystals, consisted of nanocrystallites, were observed. X-ray diffraction analysis showed the presence of calcite crystals in both cases.  相似文献   
75.
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
76.
Motion estimation in the spatiotemporal domain has been extensively studied and many methodologies have been proposed, which, however, cannot handle both time-varying and multiple motions. Extending previously published ideas, we present an efficient method for estimating multiple, linearly time-varying motions. It is shown that the estimation of accelerated motions is equivalent to the parameter estimation of superpositioned chirp signals. From this viewpoint, one can exploit established signal processing tools such as the chirp-Fourier transform. It is shown that accelerated motion results in energy concentration along planes in the 4-D space: spatial frequencies-temporal frequency-chirp rate. Using fuzzy c-planes clustering, we estimate the plane/motion parameters. The effectiveness of our method is verified on both synthetic as well as real sequences and its advantages are highlighted.  相似文献   
77.
Purpose of this study was to assess a modification to the hardness determination method in order to mitigate the effect of visual measurements on the consistency of Brinell method and accuracy of the results. The amendment has been previously proposed by other researchers and refers to the automated determination of indentation diameter and relies on the ability of modern testing machines to accurately measure indentation depth, through which the calculation of indentation diameter is possible. From the results of this study it was shown that the hardness values acquired by the proposed modification presented statistically significant difference compared to those acquired using the visual method described in EN1534 (Wood and parquet flooring—determination of resistance to indentation (Brinell)—test method, 2000). Moreover, compared to the standard methodology, the application of the proposed amendment led to hardness values which are better correlated to density as well as Janka hardness for the six different solid wood species tested. Furthermore, the proposed modification resulted to hardness values which seem to be less affected by the presence of varnish coatings.  相似文献   
78.
Community detection and evaluation is an important task in graph mining. In many cases, a community is defined as a subgraph characterized by dense connections or interactions between its nodes. A variety of measures are proposed to evaluate different quality aspects of such communities—in most cases ignoring the directed nature of edges. In this paper, we introduce novel metrics for evaluating the collaborative nature of directed graphs—a property not captured by the single node metrics or by other established community evaluation metrics. In order to accomplish this objective, we capitalize on the concept of graph degeneracy and define a novel D-core framework, extending the classic graph-theoretic notion of $k$ -cores for undirected graphs to directed ones. Based on the D-core, which essentially can be seen as a measure of the robustness of a community under degeneracy, we devise a wealth of novel metrics used to evaluate graph collaboration features of directed graphs. We applied the D-core approach on large synthetic and real-world graphs such as Wikipedia, DBLP, and ArXiv and report interesting results at the graph as well at the node level.  相似文献   
79.
A Smart Grid is the modernization of the electricity grid using communication technology with the prime goals of reducing energy consumption as well as cost increasing reliability and creating new services for all participants. It comprises key components such as the Advanced Metering Infrastructure (AMI), which includes Neighborhood area network (NAN). When multi-hopping is considered in wireless communication, especially in WiFi and ZigBee, the range of the communication can be extended to communicate with the gateway collector in AMI network. Wireless mesh AMI network may have smart meters, a NAN gateway, and fixed as well as mobile repeaters. Though many techniques have been developed to secure on-demand routing protocols in wireless multi-hop ad-hoc networks, these protocols have shortcomings. In this paper, we propose two robust and secure multipath routing protocols for wireless mesh AMI networks. We have analyzed their robustness to various attacks. The simulation results show that the proposed protocols are better than existing secure routing protocols.  相似文献   
80.
Remote sensing has been successfully used for the exposure of shallow buried relics such as archaeological remains. The detection is mainly based on photointerpretation of high-resolution satellite or aerial images. Photointerpretation for archaeological purposes is focused on the identification of crop marks using visible and near infrared (VNIR) spectrum (e.g. vegetation indices) response, which is sensitive to vegetation stress. Detection of such marks is always performed through images of adequate spatial resolution, and therefore this procedure might be problematic in cases when there is a lack of accessibility to such kinds of data. This paper addresses this problem and illustrates an image-based method intended for the detection of crop marks using satellite data of inadequate spatial resolution. The overall methodology consists of seven separate steps. The method needs two areas of interest to be selected in the image, preferably in close proximity to one another. The first area is characterized as the ‘archaeological area under investigation'while the second is a vegetated non-archaeological area. These two areas are simultaneously examined in detail using spectral signatures, soil lines, and their phenological cycle characteristics. The proposed methodology has been successfully applied in three different areas in Cyprus and Greece, where the authors have already used the technique for validation purposes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号