首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   593篇
  免费   43篇
  国内免费   3篇
电工技术   6篇
综合类   2篇
化学工业   133篇
金属工艺   12篇
机械仪表   21篇
建筑科学   13篇
矿业工程   1篇
能源动力   50篇
轻工业   28篇
水利工程   1篇
石油天然气   3篇
无线电   94篇
一般工业技术   128篇
冶金工业   19篇
原子能技术   2篇
自动化技术   126篇
  2024年   3篇
  2023年   18篇
  2022年   59篇
  2021年   43篇
  2020年   49篇
  2019年   32篇
  2018年   52篇
  2017年   48篇
  2016年   39篇
  2015年   25篇
  2014年   34篇
  2013年   47篇
  2012年   35篇
  2011年   29篇
  2010年   30篇
  2009年   19篇
  2008年   28篇
  2007年   17篇
  2006年   13篇
  2005年   7篇
  2004年   11篇
  2001年   1篇
排序方式: 共有639条查询结果,搜索用时 15 毫秒
1.
As transistor feature sizes continue to shrink intothe sub-90nm range and beyond, the effects of process variationson critical path delay and chip yields have amplified. A commonconcept to remedy the effects of variation is speed-binning, bywhich chips from a single batch are rated by a discrete range offrequencies and sold at different prices. In this paper, we discussstrategies to modify the number of chips in different bins andhence enhance the profits obtained from them. Particularly, wepropose a scheme that introduces a small Substitute Cacheassociated with each cache way to replicate the data elementsthat will be stored in the high latency lines. Assuming a fixedpricing model, this method increases the revenue by as much as13.8% without any impact on the performance of the chips.  相似文献   
2.
We propose a novel pose-invariant face recognition approach which we call Discriminant Multiple Coupled Latent Subspace framework. It finds the sets of projection directions for different poses such that the projected images of the same subject in different poses are maximally correlated in the latent space. Discriminant analysis with artificially simulated pose errors in the latent space makes it robust to small pose errors caused due to a subject’s incorrect pose estimation. We do a comparative analysis of three popular latent space learning approaches: Partial Least Squares (PLSs), Bilinear Model (BLM) and Canonical Correlational Analysis (CCA) in the proposed coupled latent subspace framework. We experimentally demonstrate that using more than two poses simultaneously with CCA results in better performance. We report state-of-the-art results for pose-invariant face recognition on CMU PIE and FERET and comparable results on MultiPIE when using only four fiducial points for alignment and intensity features.  相似文献   
3.
This paper presents a new loss function for neural network classification, inspired by the recently proposed similarity measure called Correntropy. We show that this function essentially behaves like the conventional square loss for samples that are well within the decision boundary and have small errors, and L0 or counting norm for samples that are outliers or are difficult to classify. Depending on the value of the kernel size parameter, the proposed loss function moves smoothly from convex to non-convex and becomes a close approximation to the misclassification loss (ideal 0–1 loss). We show that the discriminant function obtained by optimizing the proposed loss function in the neighborhood of the ideal 0–1 loss function to train a neural network is immune to overfitting, more robust to outliers, and has consistent and better generalization performance as compared to other commonly used loss functions, even after prolonged training. The results also show that it is a close competitor to the SVM. Since the proposed method is compatible with simple gradient based online learning, it is a practical way of improving the performance of neural network classifiers.  相似文献   
4.

Handwriting recognition is used for the prediction of various demographic traits such as age, gender, nationality, etc. Out of all the applications gender prediction is mainly admired topic among researchers. The relation between gender and handwriting can be seen from the physical appearance of the handwriting. This research work predicts gender from handwriting using the landmarks of differences between the two genders. We use the shape or visual appearance of the handwriting for extracting features of the handwriting such as slanteness (direction), area (no of pixels occupied by text), perimeter (length of edges), etc. Classification is carried out using the Support Vector Machine (SVM) as a classifier which transforms the nonlinear problem into linear using its kernel trick, logistic regression, KNN and at the end to enhance the classification rates we use Majority Voting. The experimental results obtained on a dataset of 282 writers with 2 samples per writer shows that the proposed method attains appealing performance on writer detection and text-independent environment.

  相似文献   
5.
Multibody System Dynamics - Collision between hard objects causes abrupt changes in the velocities of the system, which are characterized by very large contact forces over very small time...  相似文献   
6.
Pattern Analysis and Applications - The performance of graph-based learning techniques largely relies on the edges defined between the vertices of the graph. These edges that represent the affinity...  相似文献   
7.
The ferroelectric liquid crystals, because of their fast electro‐optical response, are one of the most important classes of liquid crystals. Here, in this review, we have summarized the different electro‐optical modes for ferroelectric liquid crystals. Clark–Lagerwall effect (surface stabilized ferroelectric liquid crystal), deformed helix ferroelectric (DHF) effect, electrically suppressed helix (ESH) mode, DHF orientational Kerr effect, and ESH diffraction modes have been discussed. All of the crucial features, that is, optics, electro‐optics, dynamics, and their dependence on material parameters, operational regime, and applications, have been reviewed.  相似文献   
8.
9.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
10.
This article deals with the propagation of SH-wave in a vertically heterogeneous viscoelastic layer lying over a micropolar elastic half-space. Dispersion and damping equations are obtained analytically in closed form. Phase and damped velocities are computed numerically and depicted by means of a graph to exhibit the substantial effect of heterogeneity, viscoelasticity (internal friction), and micropolar parameter. As a special case of the problem, it is found that deduced dispersion relation is well in agreement to the classical-Love wave equation and damping equation vanishes identically for the isotropic case. Influence of micropolarity present in the medium of half-space is highlighted through comparative study.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号