全文获取类型
收费全文 | 234篇 |
免费 | 16篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 4篇 |
综合类 | 9篇 |
化学工业 | 1篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 6篇 |
水利工程 | 1篇 |
无线电 | 34篇 |
一般工业技术 | 10篇 |
冶金工业 | 3篇 |
自动化技术 | 188篇 |
出版年
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 5篇 |
2021年 | 8篇 |
2020年 | 8篇 |
2019年 | 5篇 |
2018年 | 2篇 |
2017年 | 12篇 |
2016年 | 5篇 |
2015年 | 8篇 |
2014年 | 19篇 |
2013年 | 12篇 |
2012年 | 5篇 |
2011年 | 24篇 |
2010年 | 13篇 |
2009年 | 13篇 |
2008年 | 22篇 |
2007年 | 17篇 |
2006年 | 19篇 |
2005年 | 9篇 |
2004年 | 6篇 |
2003年 | 10篇 |
2002年 | 3篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1986年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有261条查询结果,搜索用时 15 毫秒
31.
The increasing popularity of video gaming competitions, the so called eSports, has contributed to the rise of a new type of end-user: the passive game video streaming (GVS) user. This user acts as a passive spectator of the gameplay rather than actively interacting with the content. This content, which is streamed over the Internet, can suffer from disturbing network and encoding impairments. Therefore, assessing the user’s perceived quality, i.e the Quality of Experience (QoE), in real-time becomes fundamental. For the case of natural video content, several approaches already exist that tackle the client-side real-time QoE evaluation. The intrinsically different expectations of the passive GVS user, however, call for new real-time quality models for these streaming services. Therefore, this paper presents a real-time Reduced-Reference (RR) quality assessment framework based on a low-complexity psychometric curve-fitting approach. The proposed solution selects the most relevant, low-complexity objective feature. Afterwards, the relationship between this feature and the ground-truth quality is modelled based on the psychometric perception of the human visual system (HVS). This approach is validated on a publicly available dataset of streamed game videos and is benchmarked against both subjective scores and objective models. As a side contribution, a thorough accuracy analysis of existing Objective Video Quality Metrics (OVQMs) applied to passive GVS is provided. Furthermore, this analysis has led to interesting insights on the accuracy of low-complexity client-based metrics as well as to the creation of a new Full-Reference (FR) objective metric for GVS, i.e. the Game Video Streaming Quality Metric (GVSQM). 相似文献
32.
33.
基于单片机的计量泵流量控制系统的研制 总被引:1,自引:0,他引:1
通过对传统计量泵流量工作原理的研究,应用单片机技术,并结合现代传感器技术、计算机技术,成功研制了基于单片机的计量泵流量控制仪器。试验证明:该仪器的研制简化了流量控制操作,提高了设备的自动化程度,并具有较高的可靠性和精度。 相似文献
34.
基于GPU加速的快速图像相似区域查找 总被引:1,自引:1,他引:0
图像相似区域查找是很多图形图像应用中的关键问题,也是计算瓶颈。传统加速方法如ANN(Approximate Nearest Neighbor)处理较大图像区域时速度较慢,而且在非度量空间下不支持精确查找。提出基于GPU加速的图像相似区域并行查找的通用计算框架,该框架可以扩展,以支持任意距离函数。特别针对在图像处理中应用广泛的欧氏距离(度量空间)和Chamfer距离(非度量空间)分别提出了基于CUDA的高效相似区域查找算法,比较完备地给出了相似性计算在不同度量空间下的实现。进一步,在设计具体的CUDA加速算法中,结合不同距离计算的特点对并行计算过程进行优化。该方法采用穷举的查找策略,在欧氏距离和Chamfer距离下都能实现精确查找,且大大提高了计算效率。实验结果表明,加速算法在准确查找的基础上执行速度比传统加速方法提升了一至二个数量级,且应用于纹理合成的实例表明,算法可以快速合成高质量的纹理。 相似文献
35.
Recently, permutation based indexes have attracted interest in the area of similarity search. The basic idea of permutation based indexes is that data objects are represented as appropriately generated permutations of a set of pivots (or reference objects). Similarity queries are executed by searching for data objects whose permutation representation is similar to that of the query, following the assumption that similar objects are represented by similar permutations of the pivots. In the context of permutation-based indexing, most authors propose to select pivots randomly from the data set, given that traditional pivot selection techniques do not reveal better performance. However, to the best of our knowledge, no rigorous comparison has been performed yet. In this paper we compare five pivot selection techniques on three permutation-based similarity access methods. Among those, we propose a novel technique specifically designed for permutations. Two significant observations emerge from our tests. First, random selection is always outperformed by at least one of the tested techniques. Second, there is no technique that is universally the best for all permutation-based access methods; rather different techniques are optimal for different methods. This indicates that the pivot selection technique should be considered as an integrating and relevant part of any permutation-based access method. 相似文献
36.
Maintenance of software makes up a large fraction of the time and money spent in the software life-cycle. By reducing the need for maintenance these costs can also be reduced. Predicting where maintenance is likely to occur can help to reduce maintenance by prevention. In this paper, maintenance is defined as correction of errors in the program. This paper details a study of the use of software quality metrics to determine high-complexity components in a software system. By the use of a history of maintenance done on a particular system, it is shown that a predictor equation can be developed to identify components which needed maintenance activities. This same equation can also be used to determine which components are likely to need maintenance in the future. Through the use of these predictions and software metric complexities, it should be possible to reduce the likelihood of a component needing maintenance. This might be accomplished by reducing the complexity of that component through further decomposition. Even though this is only one study, this methodology of developing maintenance predictors could be applied in any environment. 相似文献
37.
NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM 总被引:1,自引:0,他引:1
Xiao Yun Han Chongzhao Zheng Qinghua Zhang Junjie 《电子科学学刊(英文版)》2006,23(6):901-905
A new method called RS-MSVM (Rough Set and Multi-class Support Vector Machine) is proposed for network intrusion detection. This method is based on rough set followed by MSVM for attribute reduction and classification respectively, The number of attributes of the network data used in this paper is reduced from 41 to 30 using rough set theory. The kernel function of HVDM-RBF (Heterogeneous Value Difference Metric Radial Basis Function), based on the heterogeneous value difference metric of heterogeneous datasets, is constructed for the heterogeneous network data. HVDM-RBF and one-against-one method are applied to build MSVM. DARPA (Defense Advanced Research Projects Agency) intrusion detection evaluating data were used in the experiment. The testing results show that our method outperforms other methods mentioned in this paper on six aspects: detection accuracy, number of support vectors, false positive rate, falsc negative rate, training time and testing time. 相似文献
38.
针对实时测量和评估IPTV视频质量的迫切需求以及当前主要商用测量方案的不足,通过分析影响IPTV视频质量的主要因素,提出以MPQM模型为评估基础,综合运用Markov模型分别为网络信息包丢失概率、图像复杂程度以及视频流传输位速率进行建模和评测的实时评估算法,并依据所建模型推导出相关估算公式。商用测试结果表明该算法能够在实时环境中较准确地评估IPTV视频质量。 相似文献
39.
Thermography technology is widely used to inspect thermal anomalies in building façade systems. Computer vision-based techniques provide opportunities to autonomously detect such heat anomalies to significantly improve the efficiency of decision-making for building envelope retrofitting and maintenance. In this work, we propose a novel Capsule Network-based deep learning model – CapsLab – that detects and identifies thermal anomalies by semantic segmentation. CapsLab is built based on our proposed prediction-tuning capsule (PT-Capsule) layer. Different from a traditional capsule layer, which consists of part-whole transformation and capsule-routing process, the proposed layer is composed of a prediction and tuning process, which helps decreasing the number of model parameters significantly. While the applicability of traditional Capsule Networks (CapsNets) has been limited to simpler tasks and smaller datasets due to their scalability issue, we can leverage the lightweight of the proposed PT-Capsule layer, and apply it to the semantic segmentation task. In this work, we also employ our previously presented performance metric, referred to as the Anomaly Identification Metric (AIM) (Kakillioglua et al. 2021), to evaluate the segmentation outputs. Traditional performance metrics do not accurately reflect the true performance of the segmentation models in thermal anomaly identification due to the high subjectivity in the annotation process and higher overlap ratio sensitivity of the standard metrics. AIM, on the other hand, is robust to these drawbacks. Experimental results show, both qualitatively and quantitatively, that our proposed segmentation method can effectively segment the thermal anomalies. Specifically, our model provides 9.38% and 13.53% improvements over the baseline model – DeepLabV3+ – based on traditional mIoU score and the AIM score, respectively, while requiring less model parameters and less computation at the same time. In addition, the scores that the AIM metric generates better align with the scores provided by building performance experts. 相似文献
40.
The state of the art of searching for non-text data (e.g., images) is to use extracted metadata annotations or text, which might be available as a related information. However, supporting real content-based audiovisual search, based on similarity search on features, is significantly more expensive than searching for text. Moreover, such search exhibits linear scalability with respect to the dataset size, so parallel query execution is needed.In this paper, we present a Distributed Incremental Nearest Neighbor algorithm (DINN) for finding closest objects in an incremental fashion over data distributed among computer nodes, each able to perform its local Incremental Nearest Neighbor (local-INN) algorithm. We prove that our algorithm is optimum with respect to both the number of involved nodes and the number of local-INN invocations. An implementation of our DINN algorithm, on a real P2P system called MCAN, was used for conducting an extensive experimental evaluation on a real-life dataset.The proposed algorithm is being used in two running projects: SAPIR and NeP4B. 相似文献