首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   878篇
  免费   54篇
电工技术   10篇
化学工业   209篇
金属工艺   10篇
机械仪表   10篇
建筑科学   44篇
矿业工程   2篇
能源动力   38篇
轻工业   173篇
水利工程   6篇
石油天然气   6篇
无线电   89篇
一般工业技术   130篇
冶金工业   14篇
原子能技术   2篇
自动化技术   189篇
  2024年   4篇
  2023年   13篇
  2022年   36篇
  2021年   40篇
  2020年   27篇
  2019年   27篇
  2018年   30篇
  2017年   34篇
  2016年   28篇
  2015年   28篇
  2014年   59篇
  2013年   81篇
  2012年   76篇
  2011年   91篇
  2010年   73篇
  2009年   58篇
  2008年   55篇
  2007年   31篇
  2006年   31篇
  2005年   21篇
  2004年   17篇
  2003年   15篇
  2002年   20篇
  2001年   6篇
  2000年   2篇
  1999年   6篇
  1998年   2篇
  1997年   5篇
  1996年   3篇
  1995年   4篇
  1991年   2篇
  1990年   2篇
  1988年   1篇
  1987年   1篇
  1980年   3篇
排序方式: 共有932条查询结果,搜索用时 15 毫秒
81.
82.
Magnetic resonance imaging (MRI) is frequently used to detect and segment multiple sclerosis lesions due to the detailed and rich information provided. We present a modified expectation-maximisation algorithm to segment brain tissues (white matter, grey matter, and cerebro-spinal fluid) as well as a partial volume class containing fluid and grey matter. This algorithm provides an initial segmentation in which lesions are not separated from tissue, thus a second step is needed to find them. This second step involves the thresholding of the FLAIR image, followed by a regionwise refinement to discard false detections. To evaluate the proposal, we used a database with 45 cases comprising 1.5T imaging data from three different hospitals with different scanner machines and with a variable lesion load per case. The results for our database point out to a higher accuracy when compared to two of the best state-of-the-art approaches.  相似文献   
83.
One of the more tedious and complex tasks during the specification of conceptual schemas (CSs) is modeling the operations that define the system behavior. This paper aims to simplify this task by providing a method that automatically generates a set of basic operations that complement the static aspects of the CS and suffice to perform all typical life-cycle create/update/delete changes on the population of the elements of the CS. Our method guarantees that the generated operations are executable, i.e. their executions produce a consistent state wrt the most typical structural constraints that can be defined in CSs (e.g. multiplicity constraints). In particular, our method takes as input a CS expressed as a Unified Modeling Language (UML) class diagram (optionally defined using a profile to enrich the specification of associations) and generates an extended version of the CS that includes all necessary operations to start operating the system. If desired, these basic operations can be later used as building blocks for creating more complex ones. We show the formalization and implementation of our method by means of model-to-model transformations. Our approach is particularly relevant in the context of Model Driven Development approaches.  相似文献   
84.
This paper describes a method to obtain a closed surface that approximates a general 3D data point set with nonuniform density. Aside from the positions of the initial data points, no other information is used. Particularly, neither the topological relations between the points nor the normal to the surface at the data points are needed. The reconstructed surface does not exactly interpolate the initial data points, but approximates them with a bounded maximum distance. The method allows one to reconstruct closed surfaces with arbitrary genus and closed surfaces with disconnected shells.  相似文献   
85.
On the measurement of privacy as an attacker’s estimation error   总被引:1,自引:0,他引:1  
A wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy-enhancing technologies. Most of these metrics are specific to concrete systems and adversarial models and are difficult to generalize or translate to other contexts. Furthermore, a better understanding of the relationships between the different privacy metrics is needed to enable more grounded and systematic approach to measuring privacy, as well as to assist system designers in selecting the most appropriate metric for a given application. In this work, we propose a theoretical framework for privacy-preserving systems, endowed with a general definition of privacy in terms of the estimation error incurred by an attacker who aims to disclose the private information that the system is designed to conceal. We show that our framework permits interpreting and comparing a number of well-known metrics under a common perspective. The arguments behind these interpretations are based on fundamental results related to the theories of information, probability, and Bayes decision.  相似文献   
86.
We numerically investigate the performance of atomic transport in optical microtraps via the so called spatial adiabatic passage technique. Our analysis is carried out by means of optimal control methods, which enable us to determine suitable transport control pulses. We investigate the ultimate limits of the optimal control in speeding up the transport process in a triple well configuration for both a single atomic wave packet and a Bose-Einstein condensate within a regime of experimental parameters achievable with current optical technology.  相似文献   
87.
Measurement, inspection and quality control in industry have benefited from 3D techniques for imaging and visualization in recent years. The development of machine vision devices at decreased costs, as well as their miniaturization and integration in industrial processes, have accelerated the use of 3D imaging systems in industry. In this paper we describe how to improve the performance of a 3D imaging system for inline dimensional quality inspection of long, flat-rolled metal products manufactured in rolling mills we designed and developed in previous works. Two dimensional characteristics of rolled products are measured by the system: width and flatness. The system is based on active triangulation using a single-line pattern projected onto the surface of the product under inspection for range image acquisition. Taking the system calibration into account the range images are transformed into a calibrated point cloud representing the 3D surface reconstruction of the product. Two approaches to improve the line detection and extraction method used in the original system are discussed, one intended for high-speed processing with lower accuracy, and the other providing high accuracy while incurring higher computational time expenses. A mechanism to remove, or at least reduce, the effects of product movements while manufacturing, such as bouncing and flapping, is also proposed to improve the performance of the system.  相似文献   
88.
Electroencephalography (EEG) has been recently investigated as a biometric modality for automatic people recognition purposes. Several studies have shown that brain signals possess subject-specific traits that allow distinguishing people. Nonetheless, extracting discriminative characteristics from EEG recordings may be a challenging task, due to the significant presence of artifacts in the acquired data. In order to cope with such issue, in this paper we evaluate the effectiveness of some preprocessing techniques in automatically removing undesired EEG contributions, with the aim of improving the achievable recognition rates. Specifically, methods based on blind source separation and sample entropy estimation are here investigated. An extensive set of experimental tests, performed over a large database comprising recordings taken from 50 healthy subjects during three distinct sessions spanning a period of about one month, in both eyes-closed and eyes-open conditions, is carried out to analyze the performance of the proposed approaches.  相似文献   
89.
90.
In this paper we present an approach for the analysis of graph transformation rules based on an intermediate OCL representation. We translate different rule semantics into OCL, together with the properties of interest (like rule applicability, conflicts or independence). The intermediate representation serves three purposes: (1) it allows the seamless integration of graph transformation rules with the MOF and OCL standards, and enables taking the meta-model and its OCL constraints (i.e. well-formedness rules) into account when verifying the correctness of the rules; (2) it permits the interoperability of graph transformation concepts with a number of standards-based model-driven development tools; and (3) it makes available a plethora of OCL tools to actually perform the rule analysis. This approach is especially useful to analyse the operational semantics of Domain Specific Visual Languages. We have automated these ideas by providing designers with tools for the graphical specification and analysis of graph transformation rules, including a back-annotation mechanism that presents the analysis results in terms of the original language notation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号