首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   659篇
  免费   15篇
  国内免费   1篇
电工技术   6篇
化学工业   114篇
金属工艺   4篇
机械仪表   4篇
建筑科学   10篇
能源动力   34篇
轻工业   29篇
水利工程   4篇
无线电   106篇
一般工业技术   72篇
冶金工业   33篇
原子能技术   1篇
自动化技术   258篇
  2024年   1篇
  2023年   3篇
  2022年   5篇
  2021年   11篇
  2020年   3篇
  2019年   7篇
  2018年   14篇
  2017年   10篇
  2016年   27篇
  2015年   16篇
  2014年   29篇
  2013年   41篇
  2012年   41篇
  2011年   54篇
  2010年   48篇
  2009年   47篇
  2008年   43篇
  2007年   36篇
  2006年   35篇
  2005年   23篇
  2004年   21篇
  2003年   20篇
  2002年   21篇
  2001年   12篇
  2000年   8篇
  1999年   10篇
  1998年   16篇
  1997年   12篇
  1996年   6篇
  1995年   2篇
  1994年   7篇
  1993年   4篇
  1992年   4篇
  1990年   2篇
  1989年   8篇
  1987年   2篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   1篇
  1981年   2篇
  1979年   3篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1975年   2篇
  1973年   2篇
  1972年   1篇
  1971年   1篇
  1970年   1篇
排序方式: 共有675条查询结果,搜索用时 17 毫秒
31.
This paper describes the architecture and implementation of a distributed autonomous gardening system with applications in urban/indoor precision agriculture. The garden is a mesh network of robots and plants. The gardening robots are mobile manipulators with an eye-in-hand camera. They are capable of locating plants in the garden, watering them, and locating and grasping fruit. The plants are potted cherry tomatoes enhanced with sensors and computation to monitor their well-being (e.g. soil humidity, state of fruits) and with networking to communicate servicing requests to the robots. By embedding sensing, computation, and communication into the pots, task allocation in the system is de-centrally coordinated, which makes the system scalable and robust against the failure of a centralized agent. We describe the architecture of this system and present experimental results for navigation, object recognition, and manipulation as well as challenges that lie ahead toward autonomous precision agriculture with multi-robot teams.  相似文献   
32.
Dimitris  Nikos  Costas   《Computers & Security》2009,28(7):578-591
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero.  相似文献   
33.
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability.  相似文献   
34.
An analysis of selected spatiotemporal characteristics of isolated thunderstorms in relation to cloud-to-ground (CG) lightning over part of the eastern Mediterranean is performed. The purpose of the study is twofold: to better understand and improve the basic knowledge of the physical mechanisms of the phenomenon and to offer new means of nowcasting the lightning activity in such thunderstorms. Meteosat Second Generation (MSG) Rapid Scan Service (RSS) infrared imagery which offers the option of tracking the examined storms with a time frequency of 5 minutes is one of the two utilized datasets, the other being ZEUS very low frequency (VLF) lightning detection system’s CG discharge data. It was shown that a cloud top temperature of about ?20°C is required for the onset of lightning activity. A rapid drop of the cloud-top temperature of about 11°C in 5 minutes on average is observed a few minutes before or during lightning initiation. The maximization of the activity is usually quite close to the overall minimum cloud-top temperature of the cell. A temperature increase of 3.5°C from this overall minimum can mark the end of the activity, which is also associated to the time evolution of the cell’s horizontal extent. In fact, after the cell’s horizontal area stops to increase and/or starts to gradually diminish, CG lightning activity is expected to stop.  相似文献   
35.
This work presents a new method for tracking and segmenting along time-interacting objects within an image sequence. One major contribution of the paper is the formalization of the notion of visible and occluded parts. For each object, we aim at tracking these two parts. Assuming that the velocity of each object is driven by a dynamical law, predictions can be used to guide the successive estimations. Separating these predicted areas into good and bad parts with respect to the final segmentation and representing the objects with their visible and occluded parts permit handling partial and complete occlusions. To achieve this tracking, a label is assigned to each object and an energy function representing the multilabel problem is minimized via a graph cuts optimization. This energy contains terms based on image intensities which enable segmenting and regularizing the visible parts of the objects. It also includes terms dedicated to the management of the occluded and disappearing areas, which are defined on the areas of prediction of the objects. The results on several challenging sequences prove the strength of the proposed approach.  相似文献   
36.
The problem of channel sharing by rate adaptive streams belonging to various classes is considered. Rate adaptation provides the opportunity for accepting more connections by adapting the bandwidth of connections that are already in the system. However, bandwidth adaptation must be employed in a careful manner in order to ensure that (a) bandwidth is allocated to various classes in a fair manner (system perspective) and (b) bandwidth adaptation does not affect adversely the perceived user quality of the connection (user quality). The system perspective aspect has been studied earlier. This paper focuses on the equally important user perspective. It is proposed to quantify user Quality of Service (QoS) through measures capturing short and long-term bandwidth fluctuations that can be implemented with the mechanisms of traffic regulators, widely used in networking for the purpose of controlling the traffic entering or exiting a network node. Furthermore, it is indicated how to integrate the user perspective metrics with the optimal algorithms for system performance metrics developed earlier by the authors. Simulation results illustrate the effectiveness of the proposed framework.
Leonidas GeorgiadisEmail:

Nikos G. Argiriou   received the Diploma degree in Electrical Engineering from the Department of Electrical Engineering, Telecommunication Division, Aristotle University of Thessaloniki, Greece, in 1996. He worked as a researcher, on secure medical image transmission over networks, at the Image Processing Lab at the same university during 1996–1997. During 1998–2000 he was a researcher for the European Project Esprit Catserver concerning the use of advanced Quality of Service techniques in CATV networks. He received his Ph.D. degree at Aristotle University of Thessaloniki in 2007. His current research interests are in the development and implementation of QoS techniques for wired and wireless networks. Leonidas Georgiadis   received the Diploma degree in Electrical Engineering from Aristotle University, Thessaloniki, Greece, in 1979, and his M.S. and Ph.D degrees both in Electrical Engineering from the University of Connecticut, in 1981 and 1986, respectively. From 1986 to 1987 he was Research Assistant Professor at the University of Virginia, Charlottesville. In 1987 he joined IBM T. J. Watson Research Center, Yorktown Heights as a Research Staff Member. Since October 1995, he has been with the Telecommunications Department of Aristotle University, Thessaloniki, Greece. His interests are in the area of wireless networks, high speed networks, routing, scheduling, congestion control, modeling and performance analysis.  相似文献   
37.
Existing spatiotemporal indexes suffer from either large update cost or poor query performance, except for the B x -tree (the state-of-the-art), which consists of multiple B +-trees indexing the 1D values transformed from the (multi-dimensional) moving objects based on a space filling curve (Hilbert, in particular). This curve, however, does not consider object velocities, and as a result, query processing with a B x -tree retrieves a large number of false hits, which seriously compromises its efficiency. It is natural to wonder “can we obtain better performance by capturing also the velocity information, using a Hilbert curve of a higher dimensionality?”. This paper provides a positive answer by developing the B dual -tree, a novel spatiotemporal access method leveraging pure relational methodology. We show, with theoretical evidence, that the B dual -tree indeed outperforms the B x -tree in most circum- stances. Furthermore, our technique can effectively answer progressive spatiotemporal queries, which are poorly supported by B x -trees.  相似文献   
38.
39.
40.
In this paper, we present the computational tools and a hardware prototype for 3D face recognition. Full automation is provided through the use of advanced multistage alignment algorithms, resilience to facial expressions by employing a deformable model framework, and invariance to 3D capture devices through suitable preprocessing steps. In addition, scalability in both time and space is achieved by converting 3D facial scans into compact metadata. We present our results on the largest known, and now publicly available, face recognition grand challenge 3D facial database consisting of several thousand scans. To the best of our knowledge, this is the highest performance reported on the FRGC v2 database for the 3D modality  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号