首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   218篇
  免费   8篇
电工技术   4篇
化学工业   23篇
金属工艺   1篇
机械仪表   2篇
建筑科学   2篇
轻工业   15篇
无线电   33篇
一般工业技术   48篇
冶金工业   32篇
原子能技术   1篇
自动化技术   65篇
  2023年   2篇
  2022年   7篇
  2021年   1篇
  2020年   7篇
  2019年   1篇
  2018年   7篇
  2017年   6篇
  2016年   6篇
  2015年   9篇
  2014年   5篇
  2013年   7篇
  2012年   17篇
  2011年   13篇
  2010年   17篇
  2009年   11篇
  2008年   18篇
  2007年   16篇
  2006年   9篇
  2005年   6篇
  2004年   6篇
  2003年   8篇
  2002年   5篇
  2001年   6篇
  2000年   2篇
  1999年   7篇
  1998年   9篇
  1997年   2篇
  1996年   3篇
  1995年   2篇
  1994年   1篇
  1993年   3篇
  1990年   1篇
  1989年   1篇
  1984年   1篇
  1980年   1篇
  1976年   1篇
  1974年   1篇
  1970年   1篇
排序方式: 共有226条查询结果,搜索用时 0 毫秒
91.
Given a class C of graphs, a graph G=(V,E) is said to be a C-probe graph if there exists a stable (i.e., independent) set of vertices XV and a set F of pairs of vertices of X such that the graph G=(V,EF) is in the class C. Recently, there has been increasing interest and research on a variety of C-probe graph classes, such as interval probe graphs, chordal probe graphs and chain probe graphs.In this paper we focus on chordal-bipartite probe graphs. We prove a structural result that if B is a bipartite graph with no chordless cycle of length strictly greater than 6, then B is chordal-bipartite probe if and only if a certain “enhanced” graph B is a chordal-bipartite graph. This theorem is analogous to a result on interval probe graphs in Zhang (1994) [18] and to one on chordal probe graphs in Golumbic and Lipshteyn (2004) [11].  相似文献   
92.
Prediction from expert advice is a fundamental problem in machine learning. A major pillar of the field is the existence of learning algorithms whose average loss approaches that of the best expert in hindsight (in other words, whose average regret approaches zero). Traditionally the regret of online algorithms was bounded in terms of the number of prediction rounds. Cesa-Bianchi, Mansour and Stoltz (Mach. Learn. 66(2–3):21–352, 2007) posed the question whether it is be possible to bound the regret of an online algorithm by the variation of the observed costs. In this paper we resolve this question, and prove such bounds in the fully adversarial setting, in two important online learning scenarios: prediction from expert advice, and online linear optimization.  相似文献   
93.
94.
This paper describes a market-based solution to the problem of assigning mobile agents to tasks. The problem is formulated as the multiple depots, multiple traveling salesmen problem (MTSP), where agents and tasks operate in a market to achieve near-optimal solutions. We consider both the classical MTSP, in which the sum of all tour lengths is minimized, and the Min-Max MTSP, in which the longest tour is minimized. We compare the market-based solution with direct enumeration in small scenarios, and show that the results are nearly optimal. For the classical MTSP, we compare our results to linear programming, and show that the results are within 1 % of the best cost found by linear programming in more than 90 % of the runs, with a significant reduction in runtime. For the Min-Max case, we compare our method with Carlsson’s algorithm and show an improvement of 5 % to 40 % in cost, albeit at an increase in runtime. Finally, we demonstrate the ability of the market-based solution to deal with changes in the scenario, e.g., agents leaving and entering the market. We show that the market paradigm is ideal for dealing with these changes during runtime, without the need to restart the algorithm, and that the solution reacts to the new scenarios in a quick and near-optimal way.  相似文献   
95.
96.
An improved P300-based brain-computer interface.   总被引:7,自引:0,他引:7  
A brain-computer interface (BCI) is a system for direct communication between brain and computer. The BCI developed in this work is based on a BCI described by Farwell and Donchin in 1988, which allows a subject to communicate one of 36 symbols presented on a 6 x 6 matrix. The system exploits the P300 component of event-related brain potentials (ERP) as a medium for communication. The processing methods distinguish this work from Donchin's work. In this work, independent component analysis (ICA) was used to separate the P300 source from the background noise. A matched filter was used together with averaging and threshold techniques for detecting the existence of P300s. The processing method was evaluated offline on data recorded from six healthy subjects. The method achieved a communication rate of 5.45 symbols/min with an accuracy of 92.1% compared to 4.8 symbols/min with an accuracy of 90% in Donchin's work. The online interface was tested with the same six subjects. The average communication rate achieved was 4.5 symbols/min with an accuracy of 79.5 % as apposed to the 4.8 symbols/min with an accuracy of 56 % in Donchin's work. The presented BCI achieves excellent performance compared to other existing BCIs, and allows a reasonable communication rate, while maintaining a low error rate.  相似文献   
97.
In this paper, we examine the control of robot manipulators utilizing a Radial Basis Function (RBF) neural network. We are able to remove the typical requirement of Persistence of Excitation (PE) for the desired trajectory by introducing an error minimizing dead‐zone in the learning dynamics of the neural network. The dead‐zone freezes the evolution of the RBF weights when the performance error is within a bounded region about the origin. This guarantees that the weights do not go unbounded even if the PE condition is not imposed. Utilizing protection ellipsoids we derive conditions on the feedback gain matrices that guarantee that the origin of the closed loop system is semi‐globally uniformly bounded. Simulations are provided illustrating the techniques. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
98.
In this study, we propose a new approach for detecting previously unencountered instances of known classes of malicious software based on their temporal behavior. In the proposed approach, time-stamped security data are continuously monitored within the target computer system or network and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of running processes) and events (e.g., installation of a software) are integrated with a security-domain, temporal-abstraction knowledge-base (i.e., a security ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher-level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions can be monitored to detect suspicious temporal patterns. These patterns are compatible with a set of predefined classes of malware as defined by a security expert employing a set of time and value constraints. The new approach was applied for detecting worm-related malware using two different ontologies. Evaluation results demonstrated the effectiveness of the new approach. The approach can be used for detecting other types of malware by updating the security ontology with new definitions of temporal patterns.  相似文献   
99.
A two-stage processing approach combining spark plasma sintering (SPS) and hot isostatic pressing (HIP) was employed for the fabrication of relatively large (30?mm diameter) and thick (up to 8?mm) samples of transparent polycrystalline magnesium aluminate. The effects of sample thickness, heating rate during SPS, and the temperature and duration of HIP treatments were investigated. It was established that the heating rate during SPS had a major influence on discoloration due to carbon contamination, which increased with sample thickness. HIP treatment allowed for the elimination of cloudiness due to samples porosity, although carbon contamination present after the SPS step could not be reduced by HIP treatment, regardless of the temperature and duration applied. Highly transparent specimens with thicknesses of 4 and 8?mm exhibiting an in-line transmittance of 85.2 and 83.2% at 600?nm, respectively, were fabricated.  相似文献   
100.
Despite widespread consumption of soil among animals, the role of geophagy in health maintenance remains an enigma. It has been hypothesized that animals consume soil for supplementation of minerals and protection against toxins. Most studies determine only the total elemental composition of soil, which may not reflect the amount of minerals available to the consumer. Our aim was to test these hypotheses by evaluating the bioavailability of iron in soil consumed by chacma baboons, using a technique that simulates digestion and adsorption. Our results indicate that, despite variation in absolute iron concentration of soil samples, actual iron bioavailability was low while clay content was quite high. This suggests that iron supplementation is unlikely to be the primary motivation for geophagy in this population, and that detoxification is a plausible explanation. This study demonstrates that more research on bioavailability and clay composition is needed to determine the role geophagy plays in health maintenance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号