首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   589篇
  免费   12篇
  国内免费   2篇
电工技术   15篇
综合类   1篇
化学工业   87篇
金属工艺   32篇
机械仪表   30篇
建筑科学   23篇
能源动力   29篇
轻工业   35篇
水利工程   5篇
无线电   70篇
一般工业技术   87篇
冶金工业   30篇
自动化技术   159篇
  2023年   13篇
  2022年   18篇
  2021年   19篇
  2020年   19篇
  2019年   14篇
  2018年   25篇
  2017年   23篇
  2016年   18篇
  2015年   20篇
  2014年   24篇
  2013年   31篇
  2012年   22篇
  2011年   35篇
  2010年   24篇
  2009年   22篇
  2008年   20篇
  2007年   23篇
  2006年   18篇
  2005年   12篇
  2004年   14篇
  2003年   17篇
  2002年   15篇
  2001年   7篇
  2000年   6篇
  1999年   2篇
  1998年   11篇
  1997年   9篇
  1996年   8篇
  1995年   11篇
  1994年   13篇
  1993年   8篇
  1992年   9篇
  1991年   3篇
  1990年   2篇
  1989年   6篇
  1988年   4篇
  1987年   4篇
  1986年   5篇
  1985年   9篇
  1984年   4篇
  1983年   2篇
  1982年   5篇
  1981年   4篇
  1980年   4篇
  1979年   3篇
  1978年   2篇
  1976年   2篇
  1975年   4篇
  1974年   4篇
  1973年   3篇
排序方式: 共有603条查询结果,搜索用时 15 毫秒
31.
Identification involves obtaining a model from an a priori chosen model class(es) using finite corrupted data. The corruption may be due to several reasons ranging from noise to unmodeled dynamics, since the real system may not belong to the model class. Two popular approaches-probabilistic and set-membership identification-deal with this problem by imposing temporal constraints on the noise sample paths. We differentiate between the two sources of error by imposing different types of constraints on the corruption. If the source of corruption is noise, we model it by imposing temporal constraints on the possible realizations of noise. On the other hand, if it results from unmodeled dynamics informational constraints are imposed. Contrary to probabilistic identification where the parameters of the identified model converge to the true parameters in the presence of noise, current results in set-membership identification do not have this convergence property. Our approach leads to bridging this gap between probabilistic and set-membership identification when the source of corruption is noise. For the case when both unmodeled dynamics and noise are present, we derive consistency results for the case when the unmodeled dynamics can be described either by a linear time-invariant system or by a static nonlinearity  相似文献   
32.
33.
34.
Cardiac catheterization is one of the critical procedures in patient care. It is pertinent for all process related issues in this department to be handled with due priority. This research is a cross-functional effort with a leading hospital that was in its planning stage to implement an overall process improvement at its cardiac catheterization lab department. It has been determined that significant process delays exist in this department. One of the identified key factors to process improvement was to reduce patient turnaround time. Process mapping was used to study the system and identify potential sources of delays in the system. A set of qualitative recommendations were put forward. These recommendations, include the reduction of wait time of outpatients and inpatients and the reduction of non-value-added times such as transfer time of patients, were evaluated using a discrete event simulation approach. The simulation study shows that the daily operating hours at the catheterization lab could be reduced, aiding to reallocate staff for discharging other duties, as the hospital may require.  相似文献   
35.
The parameterized feedback vertex (arc) set problem is to find whether there are k vertices (arcs) in a given graph whose removal makes the graph acyclic. The parameterized complexity of this problem in general directed graphs is a long standing open problem. We investigate the problems on tournaments, a well studied class of directed graphs. We consider both weighted and unweighted versions.  相似文献   
36.
Joint modeling of related data sources has the potential to improve various data mining tasks such as transfer learning, multitask clustering, information retrieval etc. However, diversity among various data sources might outweigh the advantages of the joint modeling, and thus may result in performance degradations. To this end, we propose a regularized shared subspace learning framework, which can exploit the mutual strengths of related data sources while being immune to the effects of the variabilities of each source. This is achieved by further imposing a mutual orthogonality constraint on the constituent subspaces which segregates the common patterns from the source specific patterns, and thus, avoids performance degradations. Our approach is rooted in nonnegative matrix factorization and extends it further to enable joint analysis of related data sources. Experiments performed using three real world data sets for both retrieval and clustering applications demonstrate the benefits of regularization and validate the effectiveness of the model. Our proposed solution provides a formal framework appropriate for jointly analyzing related data sources and therefore, it is applicable to a wider context in data mining.  相似文献   
37.
Mobile wireless sensor networks (MWSNs) will enable information systems to gather detailed information about the environment on an unprecedented scale. These self‐organizing, distributed networks of sensors, processors, and actuators that are capable of movement have a broad range of potential applications, including military reconnaissance, surveillance, planetary exploration, and geophysical mapping. In many of the foreseen applications, the MWSN will need to form a geometric pattern without assistance from the user. In military reconnaissance, for example, the nodes will be dropped onto the battlefield from a plane and land at random positions. The nodes will be expected to arrange themselves into a predetermined formation in order to perform a specific task. Thus, we present algorithms for forming a line, circle, and regular polygon from a given set of random positions. The algorithms are distributed and use no communication between the nodes to minimize energy consumption. Unlike past studies of geometric problems where algorithms are either tested in simulations where each node has global knowledge of all the other nodes or implemented on a small number of robots, the robustness of our algorithms has been studied with simulations that model the sensor system in detail. The simulations demonstrate that the algorithms are robust against random errors in the sensors and actuators. © 2004 Wiley Periodicals, Inc.  相似文献   
38.
The data deluge has created a great challenge for data mining applications wherein the rare topics of interest are often buried in the flood of major headlines. We identify and formulate a novel problem: cross-channel anomaly detection from multiple data channels. Cross-channel anomalies are common among the individual channel anomalies and are often portent of significant events. Central to this new problem is a development of theoretical foundation and methodology. Using the spectral approach, we propose a two-stage detection method: anomaly detection at a single-channel level, followed by the detection of cross-channel anomalies from the amalgamation of single-channel anomalies. We also derive the extension of the proposed detection method to an online settings, which automatically adapts to changes in the data over time at low computational complexity using incremental algorithms. Our mathematical analysis shows that our method is likely to reduce the false alarm rate by establishing theoretical results on the reduction of an impurity index. We demonstrate our method in two applications: document understanding with multiple text corpora and detection of repeated anomalies in large-scale video surveillance. The experimental results consistently demonstrate the superior performance of our method compared with related state-of-art methods, including the one-class SVM and principal component pursuit. In addition, our framework can be deployed in a decentralized manner, lending itself for large-scale data stream analysis.  相似文献   
39.
Purpose: To exploit the potential of proteomics to identify and study additional yet‐unidentified important proteins present in human endometrium. Experimental design: The proteome of human endometrium would be established using 2‐DE and MALDI and the data analyzed to identify differential protein expression in the proliferative and secretory phase of the menstrual cycle using PDQuest software and MALDI. Results: In the present work, 2‐DE of human endometrium protein led to the resolution of over 200 spots. Subsequent MALDI analysis of 215 spots allowed the identification of 194 proteins. A total of 57 out of the 215 spots were found to be differentially expressed, out of which 49 could be identified using MALDI. These differentially expressed proteins included structural proteins, molecular chaperones, signaling proteins, metabolic proteins, proteins related to immunity, RNA biogenesis, protein biosynthesis and others. The differential expressions of seven representative proteins in secretory and proliferative phase endometrium tissue were confirmed by immunoblot analysis. Conclusion and clinical relevance: This study establishes the 2‐D proteome of human endometrium represented by 194 identified protein spots. The present data provides an important clue towards determining the function of these proteins with respect to endometrium related diseases.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号