全文获取类型
收费全文 | 128篇 |
免费 | 7篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 28篇 |
金属工艺 | 3篇 |
机械仪表 | 2篇 |
建筑科学 | 7篇 |
能源动力 | 4篇 |
轻工业 | 12篇 |
无线电 | 31篇 |
一般工业技术 | 14篇 |
冶金工业 | 5篇 |
原子能技术 | 2篇 |
自动化技术 | 26篇 |
出版年
2023年 | 2篇 |
2022年 | 7篇 |
2021年 | 7篇 |
2020年 | 4篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 2篇 |
2015年 | 1篇 |
2014年 | 7篇 |
2013年 | 11篇 |
2012年 | 8篇 |
2011年 | 5篇 |
2010年 | 3篇 |
2009年 | 14篇 |
2008年 | 5篇 |
2007年 | 9篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 1篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1974年 | 2篇 |
排序方式: 共有135条查询结果,搜索用时 15 毫秒
1.
George Caridakis Stylianos Asteriadis Kostas Karpouzis 《Personal and Ubiquitous Computing》2014,18(1):37-46
Present work deals with the incorporation of non-manual cues in automatic sign language recognition. More specifically, eye gaze, head pose, and facial expressions are discussed in relation to their grammatical and syntactic function and means of including them in the recognition phase are investigated. Computer vision issues related to extracting facial features, eye gaze, and head pose cues are presented and classification approaches for incorporating these non-manual cues into the overall Sign Language recognition architecture are introduced. 相似文献
2.
Estimation of behavioral user state based on eye gaze and head pose—application in an e-learning environment 总被引:1,自引:1,他引:0
Stylianos Asteriadis Paraskevi Tzouveli Kostas Karpouzis Stefanos Kollias 《Multimedia Tools and Applications》2009,41(3):469-493
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting
very often in incomplete answers, and sometimes deliberate misleading input. In this work, we present a mechanism which compiles
feedback related to the behavioral state of the user (e.g. level of interest) in the context of reading an electronic document;
this is achieved using a non-intrusive scheme, which uses a simple web camera to detect and track the head, eye and hand movements
and provides an estimation of the level of interest and engagement with the use of a neuro-fuzzy network initialized from
evidence from the idea of Theory of Mind and trained from expert-annotated data. The user does not need to interact with the
proposed system, and can act as if she was not monitored at all. The proposed scheme is tested in an e-learning environment,
in order to adapt the presentation of the content to the user profile and current behavioral state. Experiments show that
the proposed system detects reading- and attention-related user states very effectively, in a testbed where children’s reading
performance is tracked.
相似文献
Stefanos KolliasEmail: |
3.
In the present paper we evaluate the performance of three different site allocation policies in a 2-level computational grid with heterogeneous sites. We examine the case where service demands of jobs show high variability, and we consider that schedulers are aware of the service times. A simulation model is used to evaluate performance in terms of the average response time and slowdown, under medium and high load. The impact of the various input parameters on performance is also taken into account. Simulation results show that one policy outperforms the other two that are examined, especially at high load. Furthermore, no performance degradation is observed when estimations are used instead of exact knowledge about job service times. 相似文献
4.
Active Queue Management is a convenient way to administer the network load without increasing the complexity of end-user protocols. Current AQM techniques work in two ways; the router either drops some of its packets with a given probability or creates different queues with corresponding priorities. Head-to-Tail introduces a novel AQM approach: the packet rearrange scheme. Instead of dropping, HtT rearranges packets, moving them from the head of the queue to its tail. The additional queuing delay triggers a sending rate decrease and congestion events can be avoided. The HtT scheme avoids explicit packet drops and extensive retransmission delays. In this work, we detail the HtT algorithm and demonstrate when and how it outperforms current AQM implementations. We also approach analytically its impact on packet delay and conduct extensive simulations. Our experiments show that HtT achieves better results than Droptail and RED methods in terms of retransmitted packets and Goodput. 相似文献
5.
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs. 相似文献
6.
7.
George Z. Papageorgiou Vasilios Tsanaktsis Dimitrios G. Papageorgiou Stylianos Exarhopoulos Maria Papageorgiou Dimitrios N. Bikiaris 《Polymer》2014
Poly(butylene 2,5-furan dicarboxylate) (PBF) is an alipharomatic polyester that can be prepared using monomers derived from renewable resources such as 2,5-furan dicarboxylic acid and 1,4-butanediol. In the present work the thermal behavior of PBF was studied. Multiple melting was observed during heating traces of samples isothermally crystallized from the melt using differential scanning calorimetry (DSC). The wide angle X-ray diffraction (WAXD) patterns did not reveal the presence of a second crystal population, or a crystal transition upon heating. DSC study showed that the phenomena are closely related to recrystallization. Temperature modulated DSC (TMDSC) tests indeed evidenced enhanced recrystallization. The equilibrium melting point was estimated to be 184.5 °C using the linear Hoffman–Weeks extrapolation. The heat of fusion of the pure crystalline polymer was found equal to 129 J/g or (27.35 kJ/mol), a little lower than that of PBT. The Lauritzen–Hoffman secondary nucleation theory was used and the surface energy values and the work of chain folding were found to be comparable to those of PBT, but quite lower than those of poly(ethylene terephthalate) (PET). The non-isothermal crystallization on cooling and the cold-crystallization of quenched samples were also studied. Condensed spherulites were observed on isothermal crystallization under large supercoolings by using polarized optical microscopy (POM), while the spherulites turned to ring-banded morphology at higher temperatures. In every case the nucleation density was high. 相似文献
8.
McLaurin Teresa Diamantidis Stylianos Diamantidis Iraklis 《Design & Test of Computers, IEEE》2009,26(1):44-51
This article describes the test wrapper implementation of a popular embedded microprocessor, along with an automated approach for verifying the wrapper's compliance to the standard. 相似文献
9.
Weissman KJ Hong H Oliynyk M Siskos AP Leadlay PF 《Chembiochem : a European journal of chemical biology》2004,5(1):116-125
Phosphopantetheinyl transferases (PPTases) catalyze the essential post-translational activation of carrier proteins (CPs) from fatty acid synthases (FASs) (primary metabolism), polyketide synthases (PKSs), and non-ribosomal polypeptide synthetases (NRPSs) (secondary metabolism). Bacteria typically harbor one PPTase specific for CPs of primary metabolism ("ACPS-type" PPTases) and at least one capable of modifying carrier proteins involved in secondary metabolism ("Sfp-type" PPTases). In order to identify the PPTase(s) associated with erythromycin biosynthesis in Saccharopolyspora erythraea, we have used the genome sequence of this organism to identify, clone, and express (in Escherichia coli) three candidate PPTases: an ACPS-type PPTase (S. erythraea ACPS) and two Sfp-type PPTases (a discrete enzyme (SePptII) and another that is integrated into a modular PKS subunit (SePptI)). In vitro analysis of these recombinant PPTases, with an acyl carrier protein-thioesterase (ACP-TE) didomain from the erythromycin PKS as substrate, revealed that only SePptII is active in phosphopantetheinyl transfer with this substrate. SePptII was also shown to provide complete modification of ACP-TE and of an entire multienzyme subunit from the erythromycin PKS in E. coli. The efficiency of the SePptII in phosphopantetheinyl transfer in E. coli makes it an attractive alternative to other Sfp-type PPTases for co-expression experiments with PKS proteins. 相似文献
10.
Gas/particle partitioning of seven volatile polycyclic aromatic hydrocarbons in a heavy traffic urban area 总被引:5,自引:0,他引:5
Air samples (vapor- and particle-phase) were taken for 19 sampling events during the period from December 1997 to July 1998 in an urban site in the center of Athens. The urban site is densely populated and characterized by heavy traffic circulation and elevated concentrations of VOCs, NO(x), CO and smoke. Seven volatile polycyclic aromatic hydrocarbons (PAHs) were determined in samples. The temperature dependence of gas-phase atmospheric concentration of PAHs, C(g), was investigated using diagrams of natural logarithm of partial pressures (lnP) vs. reciprocal mid-point temperatures. For the six of seven volatile PAHs, the temperature dependence of lnP was statistically significant (at least at the 90% confidence level) and the temperature accounted for 21-67% of the variability in gas-phase concentrations. The gas-phase concentration C(g) of the very volatile PAHs was affected more significantly by changes in temperature, but the variation of the less-volatile PAHs fluoranthene and pyrene C(g), was better explained by changes in temperature. The temperature dependence of gas/particle partitioning constant K(P) was also examined. Regressions of log(K(P))(-1) vs. T(-1) for fluorene, fluoranthene and pyrene were classified into two different temperature ranges. The gas/particle partitioning of PAHs was studied by correlating the partition constant to the sub-cooled liquid saturation vapor pressure (P(L)(o)). The Junge adsorption model underestimated the particle fraction of volatile PAHs probably due to the presence of non-exchangeable fraction. Slopes (m(r)) of the regressions logK(P) vs. logP(L)(o) were different from the value -1 as Pankow's theory predicts. The short distance between the sampling point and the emission sources is also estimated to be a factor that causes deviations from the theoretical value. Evidence that atmospheric conditions favorable for secondary aerosol formation coincide with higher value of m(r), was provided by limited sampling events. An interrelation was found to exist between the m(r) values, allowing the prediction of the gas/particle partitioning of a series of seven PAHs by the measurement of a single PAH partitioning. 相似文献