首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   806篇
  免费   20篇
  国内免费   26篇
电工技术   18篇
综合类   32篇
化学工业   35篇
金属工艺   28篇
机械仪表   31篇
建筑科学   75篇
矿业工程   20篇
能源动力   11篇
轻工业   49篇
水利工程   15篇
石油天然气   26篇
武器工业   3篇
无线电   65篇
一般工业技术   40篇
冶金工业   19篇
原子能技术   10篇
自动化技术   375篇
  2023年   14篇
  2022年   18篇
  2021年   21篇
  2020年   17篇
  2019年   12篇
  2018年   7篇
  2017年   16篇
  2016年   21篇
  2015年   29篇
  2014年   59篇
  2013年   55篇
  2012年   52篇
  2011年   46篇
  2010年   35篇
  2009年   35篇
  2008年   40篇
  2007年   33篇
  2006年   40篇
  2005年   45篇
  2004年   37篇
  2003年   29篇
  2002年   28篇
  2001年   20篇
  2000年   31篇
  1999年   15篇
  1998年   18篇
  1997年   15篇
  1996年   14篇
  1995年   16篇
  1994年   6篇
  1993年   9篇
  1992年   3篇
  1991年   6篇
  1990年   1篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1985年   2篇
  1971年   1篇
排序方式: 共有852条查询结果,搜索用时 15 毫秒
21.
基于PDM的FRACAS平台研究   总被引:1,自引:0,他引:1       下载免费PDF全文
协同产品研制模式对故障报告、分析和纠正措施系统(FRACAS)提出了异构信息管理、分布式闭环控制和多级安全管理的新需求。该文构建基于产品数据管理(PDM)的FRACAS平台体系结构,论述该系统的实现方法,包括基于PDM的系统开发技术以及配置技术,并建立了原型系统。  相似文献   
22.
In this paper, we present a method for action categorization with a modified hidden conditional random field (HCRF). Specifically, effective silhouette-based action features are extracted using motion moments and spectrum of chain code. We formulate a modified HCRF (mHCRF) to have a guaranteed global optimum in the modelling of the temporal action dependencies after the HMM pathing stage. Experimental results on action categorization using this model are compared favorably against several existing model-based methods including GMM, SVM, Logistic Regression, HMM, CRF and HCRF.  相似文献   
23.
A probabilistic plan recognition algorithm based on plan tree grammars   总被引:2,自引:0,他引:2  
We present the PHATT algorithm for plan recognition. Unlike previous approaches to plan recognition, PHATT is based on a model of plan execution. We show that this clarifies several difficult issues in plan recognition including the execution of multiple interleaved root goals, partially ordered plans, and failing to observe actions. We present the PHATT algorithm's theoretical basis, and an implementation based on tree structures. We also investigate the algorithm's complexity, both analytically and empirically. Finally, we present PHATT's integrated constraint reasoning for parametrized actions and temporal constraints.  相似文献   
24.
Refinement algebras are abstract algebras for reasoning about programs in a total correctness framework. We extend a reduct of von Wright’s demonic refinement algebra with two operators for modelling enabledness and termination of programs. We show how the operators can be used for expressing relations between programs and apply the algebra to reasoning about action systems.  相似文献   
25.
The technology profile inventory (TPI) measures attitudes toward computers and the internet. We describe the most recent phase of the construction of the TPI. The studies reported refine and validate the instrument, and we present the final version as an Appendix A. Using a new sample of respondents (N = 394), we replicated the three major factors found previously (Confidence, Approval, and Interest). The TPI scores were related to patterns of information technology (IT) usage and also to gender. To demonstrate the practical utility of the TPI we report (1) results linking TPI scores to behavior during an internet search task; (2) test–retest results obtained as part of a cognitive training experiment using action video games; and (3) results showing that attitudes to IT may be modified by a particular experience with information technology.  相似文献   
26.
Action Recognition Using a Bio-Inspired Feedforward Spiking Network   总被引:2,自引:0,他引:2  
We propose a bio-inspired feedforward spiking network modeling two brain areas dedicated to motion (V1 and MT), and we show how the spiking output can be exploited in a computer vision application: action recognition. In order to analyze spike trains, we consider two characteristics of the neural code: mean firing rate of each neuron and synchrony between neurons. Interestingly, we show that they carry some relevant information for the action recognition application. We compare our results to Jhuang et al. (Proceedings of the 11th international conference on computer vision, pp. 1–8, 2007) on the Weizmann database. As a conclusion, we are convinced that spiking networks represent a powerful alternative framework for real vision applications that will benefit from recent advances in computational neuroscience.  相似文献   
27.
Teleoperated systems for ship hull maintenance (TOS) are robotic systems for ship maintenance tasks, such as cleaning or painting a ship’s hull. The product line paradigm has recently been applied to TOS, and a TOS reference architecture has thus been designed. However, TOS requirements specifications have not been developed in any rigorous way with reuse in mind. We therefore believe that an opportunity exists to increase the abstraction level at which stakeholders can reason about this product line. This paper reports an experience in which this TOS domain was analyzed, including the lessons learned in the construction and use of the TOS domain model. The experience is based on the application of extensions of well-known domain analysis techniques, together with the use of quality attribute templates traced to a feature model to deal with non-functional issues. A qualitative research method (action research) was used to carry out the experience.  相似文献   
28.
韩冰 《软件》2013,(11):133-135
使用Flash制作动作,如果只基于时间轴和动画图层来设计,将会受到很大的限制,例如一些复杂、精彩的动画效果难以实现,也不能让观赏者与媒体互动,即媒体不具有交互性。要想动画具有交互性,能使观赏者通过选择来控制播放的顺序或呈现不同的内容,就需要使用Flash的动作脚本语言。  相似文献   
29.
防火墙在网络安全中起到很重要的作用,其中防火墙策略中的规则决定了网络数据包被“允许”或被“拒绝”进出网络。对于大型网络来说,由于规则太多,管理者很难保证其中不出现冲突,因此策略中规则冲突的检测及解决成为了保证网络安全的重要方面。提出了一种基于MapReduce模型的防火墙策略冲突检测解决算法,它对由基于规则的分段技术得到的片段进行自定义的排序,之后将其转化为规则的形式来代替原来的规则进行数据包的过滤。片段间两两不相交且匹配的包只执行一种动作,从而消除了冲突。  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号