首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   307篇
  免费   21篇
  国内免费   7篇
电工技术   1篇
化学工业   83篇
金属工艺   8篇
机械仪表   10篇
建筑科学   10篇
能源动力   19篇
轻工业   53篇
石油天然气   1篇
无线电   24篇
一般工业技术   64篇
冶金工业   12篇
原子能技术   5篇
自动化技术   45篇
  2024年   4篇
  2023年   9篇
  2022年   31篇
  2021年   42篇
  2020年   19篇
  2019年   19篇
  2018年   29篇
  2017年   14篇
  2016年   13篇
  2015年   3篇
  2014年   16篇
  2013年   30篇
  2012年   17篇
  2011年   13篇
  2010年   10篇
  2009年   6篇
  2008年   6篇
  2007年   7篇
  2006年   5篇
  2005年   11篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1990年   1篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1977年   2篇
  1976年   2篇
  1975年   2篇
排序方式: 共有335条查询结果,搜索用时 15 毫秒
1.
2.
The efficient application of current methods of shadow detection in video is hindered by the difficulty in defining their parameters or models and/or their application domain dependence. This paper presents a new shadow detection and removal method that aims to overcome these inefficiencies. It proposes a semi-supervised learning rule using a new variant of co-training technique for shadow detection and removal in uncontrolled scenes. The new variant both reduces the run-time through a periodical execution of a co-training process according to a novel temporal framework, and generates a more generic prediction model for an accurate classification. The efficiency of the proposed method is shown experimentally on a testbed of videos that were recorded by a static camera and that included several constraints, e.g., dynamic changes in the natural scene and various visual shadow features. The conducted experimental study produced quantitative and qualitative results that highlighted the robustness of our shadow detection method and its accuracy in removing cast shadows. In addition, the practical usefulness of the proposed method was evaluated by integrating it in a Highway Control and Management System software called RoadGuard.  相似文献   
3.
Fast and accurate moving object segmentation in dynamic scenes is the first step in many computer vision applications. In this paper, we propose a new background modeling method for moving object segmentation based on dynamic matrix and spatio-temporal analyses of scenes. Our method copes with some challenges related to this field. A new algorithm is proposed to detect and remove cast shadow. A comparative study by quantitative evaluations shows that the proposed approach can detect foreground robustly and accurately from videos recorded by a static camera and which include several constraints. A Highway Control and Management System called RoadGuard is proposed to show the robustness of our method. In fact, our system has the ability to control highway by detecting strange events that can happen like vehicles suddenly stopped in roads, parked vehicles in emergency zones or even illegal conduct such as going out from the road. Moreover, RoadGuard is capable of managing highways by saving information about the date and time of overloaded roads.  相似文献   
4.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
5.
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have...  相似文献   
6.

The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.

  相似文献   
7.
In this work, trajectory optimization of an aerodynamically controlled hypersonic boost glide class of flight vehicle is presented. In order to meet the mission constraints such as controllability, skin temperature, and terminal conditions etc., the trajectory is optimized using a pattern search algorithm with the lift to drag (L/D) ratio as a control parameter. It is brought out that the approach offers a viable tool for optimizing trajectories for the considered class of vehicles. Further, the effects of the constraints on trajectory shape and performance are studied and the analysis is used to bring out an optimal vehicle configuration at the initial stage of the design process itself. The research also reveals that the pattern search algorithm offers superior performance in comparison with the genetic algorithm for this class of optimization problem.  相似文献   
8.
A visible light active and stable photoelectrode has been developed by depositing a passivating layer of ZnS QDs on CdS QDs sensitized hematite photoelectrode (Hematite‐CdS/ZnS) for PEC generation of hydrogen. Photoelectrochemical properties, in terms of stability and efficiency, have been investigated on the various hematite photoelectrodes sensitized with CdS QDs and CdS/ZnS QDs by varying number of SILAR cycles. I–V characteristics show that two layers of ZnS QDs deposited over three layers of CdS could enhance PEC response of hematite and efficiency by a factor of 3 and 11 respectively. Chronoamperometry measurement ensures that after adding a layer of ZnS QDs, CdS sensitized hematite film turns out to be a stable photoelectrode in the electrolyte. Prepared photoelectrodes have been characterized by XRD, SEM, HRTEM and UV–Vis spectrophotometer for various structural, morphological and optical properties to analyze PEC results. Mott–Schottky analysis and incident photon to current conversion efficiency (IPCE) measurements of sensitized hematite photoelectrode supported the improved PEC response of CdS/ZnS QDs sensitized hematite thin films. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
9.
Iranian Polymer Journal - Hydrogels were produced from mixtures of polyvinyl alcohol (PVA), polyvinyl pyrrolidone (PVP), and acrylic acid (AAc) using γ-radiation at doses of 3, 7, and...  相似文献   
10.
The Key Expansion Function is a vital constituent component of any block cipher. Many of Key Expansion Functions generate subkeys through the algorithms which are based on Feistel or Substitution Permutation Network (SPN) structures against which cryptanalytic methods have been well researched. In this very paper, an efficient method for generating subkeys based on chaotic maps has been suggested. The phenomenon behind the proposed Key Expansion Function is the mixing property of Tent Map. Using chaotic binary sequences, the proposed Key Expansion Function satisfies the specific statistical and cryptographic properties of chaotic generators. A new Bit Extraction Technique based on IEEE-754 Floating-point Standard (binary32) is used to extract the bits of subkeys from the chaotic binary sequences. The generated subkeys are then analyzed. The results show that the given Chaos-based Key Expansion Function is well protected and fully strengthened in all respects.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号