首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   498篇
  免费   27篇
电工技术   38篇
化学工业   84篇
金属工艺   3篇
机械仪表   22篇
建筑科学   13篇
能源动力   10篇
轻工业   35篇
水利工程   3篇
石油天然气   1篇
无线电   56篇
一般工业技术   120篇
冶金工业   95篇
原子能技术   6篇
自动化技术   39篇
  2023年   2篇
  2022年   6篇
  2021年   7篇
  2020年   9篇
  2018年   8篇
  2017年   12篇
  2016年   8篇
  2015年   6篇
  2014年   19篇
  2013年   19篇
  2012年   23篇
  2011年   23篇
  2010年   14篇
  2009年   14篇
  2008年   17篇
  2007年   22篇
  2006年   20篇
  2005年   17篇
  2004年   11篇
  2003年   13篇
  2002年   8篇
  2001年   5篇
  2000年   3篇
  1999年   10篇
  1998年   33篇
  1997年   13篇
  1996年   11篇
  1995年   15篇
  1994年   20篇
  1993年   8篇
  1992年   8篇
  1991年   8篇
  1990年   9篇
  1989年   10篇
  1988年   8篇
  1987年   8篇
  1986年   4篇
  1985年   10篇
  1984年   8篇
  1983年   6篇
  1982年   6篇
  1981年   6篇
  1980年   2篇
  1979年   5篇
  1978年   2篇
  1977年   4篇
  1976年   12篇
  1975年   4篇
  1974年   2篇
  1972年   2篇
排序方式: 共有525条查询结果,搜索用时 15 毫秒
1.
Real Time Machine Learning Based Car Detection in Images With Fast Training   总被引:2,自引:0,他引:2  
Our primary interest is to build fast and reliable object recognizers in images based on small training sets. This is important in cases where the training set needs to be built mostly manually, as in the case that we studied, the recognition of the Honda Accord 2004 from rear views. We describe a novel variant of the AdaBoost based learning algorithm, which builds a strong classifier by incremental addition of weak classifiers (WCs) that minimize the combined error of the already selected WCs. Each WC is trained only once, and examples do not change their weights. We describe a set of appropriate feature types for the considered recognition problem, including a redness measure and dominant edge orientations. The existing edge orientation bin division was improved by shifting so that all horizontal (vertical, respectively) edges belong to the same bin. We propose to pre-eliminate features whose best threshold value is near the trivial position at the minimum or maximum of all threshold values. This is a novel method that has reduced the training set WC quantity to less than 10% of its original number, greatly speeding up training time, and showing no negative impact on the quality of the final classifier. We also modified the AdaBoost based learning machine. Our experiments indicate that the set of features used by Viola and Jones and others for face recognition was inefficient for our problem, recognizing cars accurately and in real time with fast training. Our training method has resulted in finding a very accurate classifier containing merely 30 WCs after about 1 h of training. Compared to existing literature, we have overall achieved the design of a real time object detection machine with the least number of examples, the least number of WCs, the fastest training time, and with competitive detection and false positive rates.  相似文献   
2.
3.
4.
This paper reports on experimental results of aqueous heterophase polymerizations with monomers of quite different solubility in water ranging from the water-soluble 2-hydroxyethyl methacrylate to lauryl methacrylate with solubility in water of only about 10−4 mM. A calorimetric study revealed the strong influence of both the hydrophilicity of the monomer and the stirrer speed on the rate of polymerization in the absence of surfactants. In order to obtain maximum latex yield and high efficiency (which is a measure considering colloidal properties, polymerization recipe, and polymerization parameters) the initiator-surfactant combination must be properly chosen in dependence on the hydrophilicity of the monomer. Results are presented for sodium alkyl sulfates or disodium-N-stearoyl-l-glutamate as surfactant and potassium peroxodisulfate, or poly(ethylene glycol)-azo- compounds, or 2,2′-azobis(N-2′-methylpropanoyl-2-amino-alkyl-1)-sulfonates as initiators.  相似文献   
5.
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme.  相似文献   
6.
This paper presents us with a framework for the automatic player position detection (APPD) in the game of basketball. Court players are detected in the images broadcasted via television stations. In them, at any point of time, the view is from only one camera. This makes the detection process much more difficult. The player detection is based on the mixture of non-oriented pictorial structures. The detection of body parts is performed by the Support Vector Machine (SVM) algorithm. The results of these detections are combined together with constraints on their locations, which specify the position of one body part with respect to the parent body part. In order to train the whole model, we used a latent form of SVM called the latent SVM (LSVM). Such approach generated the statistical accuracy of about 82 %, which represents one of the best results in basketball player detection framework. Beside players, the algorithm detected a certain number of false positive objects. These are mostly people from the audience and the referees as well. This paper contains a simple and robust solution to remove them all, based on the play court boundaries and the histogram comparison. Separating players in different teams is done by k-means clustering. The inputs to this algorithm are saturation histograms calculated on the jerseys. A spatial transformation is determined by the detected play court boundaries and the actual court measures. Using this transformation, points representing the location of detected players in TV images are mapped to the actual location of players on the court, which was the main goal of our research. The proposed solution is sound and efficient. In addition, it is backed up by the experimental results obtained using the model of the actual footage of basketball games.  相似文献   
7.
The topological derivative provides the sensitivity of a given shape functional with respect to an infinitesimal (non smooth) domain perturbation at an arbitrary point of the domain. Classically, this derivative comes from the second term of the topological asymptotic expansion, dealing only with infinitesimal perturbations. However, for practical applications, we need to insert perturbations of finite size. Therefore, we consider one more term in the expansion which is defined as the second order topological derivative. In order to present these ideas, in this work we calculate first as well as second order topological derivatives for the total potential energy associated to the Laplace’s equation, when the domain is perturbed with a hole. Furthermore, we also study the effects of different boundary conditions on the hole: Neumann and Dirichlet (both homogeneous). In the Neumann’s case, the second order topological derivative depends explicitly on higher-order gradients of the state solution and also implicitly on the point where the hole is nucleated through the solution of an auxiliary problem. On the other hand, in the Dirichlet’s case, the first order topological derivative depends explicitly on the state solution as well as implicitly through the solution of an auxiliary problem, and the second order topological derivative depends only explicitly on the solution associated to the original problem. Finally, we present two simple examples showing the influence of both terms in the second order topological asymptotic expansion for each case of boundary condition on the hole.  相似文献   
8.
Interdigital secretions were collected from eight male white-tailed deer of various ages. Analysis of volatiles was performed by gas chromatography-mass spectrometry with a modified headspace technique. Forty-six volatile compounds were found including alkanes, arenes, aldehydes, ketones, aliphatic acids, esters, pyrroles, furans, and sulfur compounds. Eleven occurred in higher concentrations (P0.10) in dominant (3.5-year-old) than in subordinate (1.5-year-old) animals. Dominant males typically have higher serum testosterone levels, and fatty acids and esters fluctuate with sebum production, which is under hormonal control. Therefore, these compounds may reflect testosterone levels and act as chemical signals indicating the presence of a dominant male. Interdigital volatiles also may act as generalized scent trail markers.  相似文献   
9.
The sophisticated method for mathematical modeling of humanoid robots formulated in Part 1 of this paper is applied here to the dynamic task of keeping a posture under disturbance, which is equally important to humans and humanoid robots. The idea of this work is to develop and realize a simulator tool for dynamic analysis of human-or-humanoid behavior under disturbances. To show the potentials and verify this tool, we comparatively analyze the robustness of some postures to external disturbance. At this stage of research we do not conduct real experiments with humans/humanoids but try to verify our simulation tool by relying on available experience. Therefore, the postures for comparison are taken from everyday life and from sports: upright standing, squat posture, and three karate postures. As the external disturbance we choose an impulse and a permanent force, both with variable direction and magnitude.  相似文献   
10.
In this work a new method for obstacles reconstruction from partial boundary measurements is proposed. For a given boundary excitation, we want to determine the quantity, locations and sizes of a number of holes embedded within a geometrical domain, from partial boundary measurements related to such an excitation. The resulting inverse problem is written in the form of an ill-posed and over-determined boundary value problem. The idea therefore is to rewrite it as an optimization problem where a shape functional measuring the misfit between the boundary measurement and the solution to an auxiliary boundary value problem is minimized with respect to a set of ball-shaped holes. The topological derivative concept is used for solving the associated topology optimization problem, leading to a second-order reconstruction algorithm. The resulting algorithm is non-iterative – and thus very robust with respect to noisy data – and also free of initial guess. Finally, some numerical results are presented in order to demonstrate the effectiveness of the proposed reconstruction algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号