首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   236篇
  免费   11篇
  国内免费   4篇
电工技术   8篇
化学工业   25篇
金属工艺   9篇
机械仪表   3篇
建筑科学   11篇
矿业工程   1篇
能源动力   34篇
轻工业   21篇
水利工程   3篇
石油天然气   4篇
无线电   26篇
一般工业技术   37篇
冶金工业   29篇
自动化技术   40篇
  2024年   2篇
  2023年   7篇
  2022年   9篇
  2021年   6篇
  2020年   13篇
  2019年   6篇
  2018年   18篇
  2017年   11篇
  2016年   12篇
  2015年   6篇
  2014年   14篇
  2013年   34篇
  2012年   6篇
  2011年   8篇
  2010年   12篇
  2009年   10篇
  2008年   11篇
  2007年   4篇
  2006年   6篇
  2005年   5篇
  2004年   2篇
  2002年   5篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1998年   11篇
  1997年   5篇
  1996年   2篇
  1995年   4篇
  1994年   3篇
  1993年   1篇
  1990年   3篇
  1988年   2篇
  1985年   1篇
  1984年   1篇
  1981年   1篇
  1980年   3篇
  1978年   1篇
  1968年   1篇
排序方式: 共有251条查询结果,搜索用时 15 毫秒
1.
The main objective of this study is to explore the utility of a neural network-based approach in hand gesture recognition. The proposed system presents two recognition algorithms to recognize a set of six specific static hand gestures, namely open, close, cut, paste, maximize, and minimize. The hand gesture image is passed through three stages: preprocessing, feature extraction, and classification. In the first method, the hand contour is used as a feature that treats scaling and translation of problems (in some cases). However, the complex moment algorithm is used to describe the hand gesture and to treat the rotation problem in addition to scaling and translation. The back-propagation learning algorithm is employed in the multilayer neural network classifier. The second method proposed in this article achieves better recognition rate than the first method.  相似文献   
2.
A new mathematical model of generalized thermoelasticity with memory-dependent derivatives for the dual-phase-lag heat conduction law is constructed. The governing equations of the new model are applied to a half-space subjected to ramp-type heating. Laplace transforms technique is used. The solution is obtained for different types of functions representing the thermal shock and for different values of the parameter of the time fraction derivative of the model. The effects of time-delay and arbitrary kernel function on elastic material are studied and represented graphically. The predictions of the theory are discussed and compared with dynamic classical coupled theory.  相似文献   
3.
Visual Speech Synthesis by Morphing Visemes   总被引:6,自引:0,他引:6  
We present MikeTalk, a text-to-audiovisual speech synthesizer which converts input text into an audiovisual speech stream. MikeTalk is built using visemes, which are a small set of images spanning a large range of mouth shapes. The visemes are acquired from a recorded visual corpus of a human subject which is specifically designed to elicit one instantiation of each viseme. Using optical flow methods, correspondence from every viseme to every other viseme is computed automatically. By morphing along this correspondence, a smooth transition between viseme images may be generated. A complete visual utterance is constructed by concatenating viseme transitions. Finally, phoneme and timing information extracted from a text-to-speech synthesizer is exploited to determine which viseme transitions to use, and the rate at which the morphing process should occur. In this manner, we are able to synchronize the visual speech stream with the audio speech stream, and hence give the impression of a photorealistic talking face.  相似文献   
4.
In this paper, we fill a gap in the literature by studying the problem of Arabic handwritten digit recognition. The performances of different classification and feature extraction techniques on recognizing Arabic digits are going to be reported to serve as a benchmark for future work on the problem. The performance of well known classifiers and feature extraction techniques will be reported in addition to a novel feature extraction technique we present in this paper that gives a high accuracy and competes with the state-of-the-art techniques. A total of 54 different classifier/features combinations will be evaluated on Arabic digits in terms of accuracy and classification time. The results are analyzed and the problem of the digit ‘0’ is identified with a proposed method to solve it. Moreover, we propose a strategy to select and design an optimal two-stage system out of our study and, hence, we suggest a fast two-stage classification system for Arabic digits which achieves as high accuracy as the highest classifier/features combination but with much less recognition time.  相似文献   
5.
Fault management and security of computer networks present new challenges of increasing complexity. Decision procedures for fault diagnosis, security-related threats, and follow-up actions must, however, be evaluated on the basis of sound theoretical foundations and economic costs of various strategies. This paper presents a minimum expected cost solution for fault diagnosis and corrective actions. Several notions new to fault management are introduced. The methodology is applicable to both non-malicious and malicious faults. As a novel security-related application, the problem of choosing between two strategies for containing the spread of network worms is discussed.  相似文献   
6.
7.
In this work, we aimed to develop a feasible method for in situ preparation of a magnetite ionic polymer nanocomposite at room temperature. For this purpose, acrylonitrile (AN) and 2-acrylamido-2-methylpropane sulfonic acid (AMPS) monomers were copolymerized and crosslinked using different monomer mol ratios in the presence of N,N-methylenebisacrylamide (MBA) as crosslinker to produce ionic crosslinked polymers P(AN-co-AMPS. The nitrile groups were converted to amine amidoxime by reacting with hydroxylamine to increase the adsorption characteristics of the ionic polymers. The produced polymers were swelled in iron cations produced from the reaction of ferric chloride and potassium iodide, followed by reaction with an ammonium hydroxide solution to produce magnetite nano-polymer composites. We performed FT-IR and XRD analysis to determine the chemical and crystalline structures, and assessed the morphologies and magnetite content using SEM, TEM and TGA analyses. We investigated the adsorption capacity and mechanism of the prepared magnetite nano-composites as adsorbents for methylene blue, Co2+ and Ni2+ cations from water.  相似文献   
8.
On the Existence of 2-Imino-2H-1,3-thiazines The title compounds 2 are readily liberated from the 2-amino-1,3-thiazinium salts 1 by treatment with bases. Their stability depends sensitively on the substituents at the imino-N. The imino-N substituted 2a – i are isolable as well-defined coloured substances. Reaction of the 2 as well 1 with nucleophilic agents affords pyrimidine-2-thiones ( 4 , 9 – 11 , 16 – 18 ). In these ring transformations a nucleophilic addition at ring position 6 as primary reaction step is preferred. The imino-N unsubstituted representatives display a more complicated behaviour; the highly enhanced reactivity prevents or handicaps, respectively, any isolation. As exemplified in the base-induced ring-transformation of 1 m to the pyrimidine derivative 19 , these 2 are able to react as nucleophiles too, and versatile intermolecular self-reactions are increasingly favoured.  相似文献   
9.
Network securityprotocolssuch as IPsechave been used for many years to ensure robust end-to-end communication and are impor-tant in the context of SDN.Despite the widespread installation of IPsec to date,per-packet protection offered by the protocol isnot very compatible with OpenFlow and flow-like behavior.OpenFlow architecture cannot aggregate IPsec-ESP flows in transportmode or tunnel mode because layer-3 information is encrypted and therefore unreadable.In this paper,we propose using the Secu-rity Parameter Index(SPI)of IPsec within the OpenFlow architecture to identify and direct IPsec flows.Thisenables IPsec to con-form to the packet-based behavior of OpenFlow architecture.In addition,by distinguishing between IPsec flows,the architectureis particularly suited to secure group communication.  相似文献   
10.
The measurement of transportation network travel time reliability is imperative to provide drivers with accurate route guidance information and to generate the shortest path (or alternative paths) connecting origins and destinations, especially under conditions of varying demands and limited capacities. Previous studies assumed that link failures in a road network are statistically independent and that reliability probabilities are perfectly determinable. In real life, these assumptions are dubious, because the failure of a link in one particular area does not necessarily result in the complete failure of the neighboring link, but may lead to deterioration of its performance. This paper presents a new methodology to study the multistate system reliability analysis of transportation networks for which one cannot formulate an “all or nothing” type of failure criterion and in which dependent link failures are considered. The methodology is presented, using a numerical example, for computing the probability that travel time between an origin and a destination may exceed a threshold.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号