首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1671篇
  免费   47篇
  国内免费   47篇
电工技术   61篇
综合类   100篇
化学工业   67篇
金属工艺   23篇
机械仪表   58篇
建筑科学   48篇
矿业工程   12篇
能源动力   15篇
轻工业   20篇
水利工程   3篇
石油天然气   4篇
武器工业   5篇
无线电   309篇
一般工业技术   52篇
冶金工业   3篇
原子能技术   20篇
自动化技术   965篇
  2023年   5篇
  2022年   13篇
  2021年   9篇
  2020年   8篇
  2019年   12篇
  2018年   18篇
  2017年   12篇
  2016年   21篇
  2015年   30篇
  2014年   48篇
  2013年   62篇
  2012年   108篇
  2011年   248篇
  2010年   180篇
  2009年   228篇
  2008年   220篇
  2007年   198篇
  2006年   145篇
  2005年   103篇
  2004年   41篇
  2003年   24篇
  2002年   14篇
  2001年   3篇
  2000年   3篇
  1999年   3篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1992年   1篇
排序方式: 共有1765条查询结果,搜索用时 703 毫秒
51.
In this paper we prove that, under suitable conditions, Atanassov’s Kα operators, which act on intervals, provide the same numerical results as OWA operators of dimension two. On one hand, this allows us to recover OWA operators from Kα operators. On the other hand, by analyzing the properties of Atanassov’s operators, we can generalize them. In this way, we introduce a class of aggregation functions - the generalized Atanassov operators - that, in particular, include two-dimensional OWA operators. We investigate under which conditions these generalized Atanassov operators satisfy some properties usually required for aggregation functions, such as bisymmetry, strictness, monotonicity, etc. We also show that if we apply these aggregation functions to interval-valued fuzzy sets, we obtain an ordered family of fuzzy sets.  相似文献   
52.
Current extensions of hidden Markov models such as structural, hierarchical, coupled, and others have the power to classify complex and highly organized patterns. However, one of their major limitations is the inability to cope with topology: When applied to a visible observation (VO) sequence, the traditional HMM-based techniques have difficulty predicting the n-dimensional shape formed by the symbols of the VO sequence. To fulfill this need, we propose a novel paradigm named “topological hidden Markov models” (THMMs) that classifies VO sequences by embedding the nodes of an HMM state transition graph in a Euclidean space. This is achieved by modeling the noise embedded in the shape generated by the VO sequence. We cover the first and second level topological HMMs. We describe five basic problems that are assigned to a second level topological hidden Markov model: (1) sequence probability evaluation, (2) statistical decoding, (3) structural decoding, (4) topological decoding, and (5) learning. To show the significance of this research, we have applied the concept of THMMs to: (i) predict the ASCII class assigned to a handwritten numeral, and (ii) map protein primary structures to their 3D folds. The results show that the second level THMMs outperform the SHMMs and the multi-class SVM classifiers significantly.  相似文献   
53.
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows.  相似文献   
54.
随着Web2. 0的推广,音乐分享平台纷纷出现.目前的音乐分享平台在用户上传时没有进行检查,导致音乐库里常有大量的冗余.提出了一个基于乐纹的音乐分享平台系统LILT,该系统包含一个含有音乐乐纹的数据库,并通过提取音乐片段的乐纹进行查找判重.建立了6万余首歌的乐纹库,并且在这个库上做了大量测试.测试结果显示,该系统对用户上传的音乐能够有效地识别并判重.在系统识别率、识别速度、指纹鲁棒性测试中均得到了较满意的结果.  相似文献   
55.
遵循AISG2.0协议的固件更新策略设计   总被引:2,自引:1,他引:1  
吕燚  曾荣荣 《测控技术》2010,29(9):62-65
以电调天线远程控制单元为研究背景,介绍了一种遵循AISG2.0规范的固件更新策略的设计实现过程.针对传统远程固件更新策略存在的不足,提出利用MCU片内Flash进行固件存储的设计思路.依据AISG2.0中的相关规范,设计和实现了固件下载和固件激活功能.实际应用证明,该方案稳定、可靠、安全性好.  相似文献   
56.
A goodness-of-fit testing procedure for Archimedean copula (AC) models is developed based on right-censored data. The proposed approach extends an existing method, which is suitable for the Clayton model, to general AC models. Asymptotic properties of the proposed test statistics under the true model assumption are derived. Simulation analysis shows that the proposed test has reasonable performance. Finally, two real data examples are analyzed for illustrative purposes.  相似文献   
57.
The forward search provides data-driven flexible trimming of a Cp statistic for the choice of regression models that reveals the effect of outliers on model selection. An informed robust model choice follows. Even in small samples, the statistic has a null distribution indistinguishable from an F distribution. Limits on acceptable values of the Cp statistic follow. Two examples of widely differing size are discussed. A powerful graphical tool is the generalized candlestick plot, which summarizes the information on all forward searches and on the choice of models. A comparison is made with the use of M-estimation in robust model choice.  相似文献   
58.
Blanchet-Sadri et al. have shown that Avoidability, or the problem of deciding the avoidability of a finite set of partial words over an alphabet of size k≥2, is NP-hard [F. Blanchet-Sadri, R. Jungers, J. Palumbo, Testing avoidability on sets of partial words is hard, Theoret. Comput. Sci. 410 (2009) 968-972]. Building on their work, we analyze in this paper the complexity of natural variations on the problem. While some of them are NP-hard, others are shown to be efficiently decidable. Using some combinatorial properties of de Bruijn graphs, we establish a correspondence between lengths of cycles in such graphs and periods of avoiding words, resulting in a tight bound for periods of avoiding words. We also prove that Avoidability can be solved in polynomial space, and reduces in polynomial time to the problem of deciding the avoidability of a finite set of partial words of equal length over the binary alphabet. We give a polynomial bound on the period of an infinite avoiding word, in the case of sets of full words, in terms of two parameters: the length and the number of words in the set. We give a polynomial space algorithm to decide if a finite set of partial words is avoided by a non-ultimately periodic infinite word. The same algorithm also decides if the number of words of length n avoiding a given finite set of partial words grows polynomially or exponentially with n.  相似文献   
59.
钱立  郭琳 《福建电脑》2010,26(1):116-116,134
本文基于J2ME开发了一个手机程序,该程序能对中医常用方剂和中药按分类和拼音快速检索查阅。为了实现高效检索,在方剂和中药数据中加入了特定分隔符,进行了规范处理,并充分利用String类的子串搜索和子串截取方法达到了目的。  相似文献   
60.
朱小川 《福建电脑》2010,26(4):78-79
几乎每个Web应用都会涉及针对不同的用户进行权限分配的工作,用户登录后根据不同的权限访问系统不同的资源和实现不同的功能。在ASP.NET2.0之前,我们需要自己开发这样的功能,但是在ASP.NET2.0中,随着成员(Mem-bership)服务和相关控件的推出,极大地减轻了相关工作的工作量。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号