首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   384篇
  免费   25篇
  国内免费   10篇
综合类   1篇
化学工业   107篇
金属工艺   4篇
机械仪表   21篇
建筑科学   10篇
能源动力   29篇
轻工业   39篇
水利工程   2篇
石油天然气   5篇
无线电   28篇
一般工业技术   99篇
冶金工业   8篇
原子能技术   5篇
自动化技术   61篇
  2024年   4篇
  2023年   6篇
  2022年   16篇
  2021年   22篇
  2020年   20篇
  2019年   21篇
  2018年   30篇
  2017年   28篇
  2016年   22篇
  2015年   19篇
  2014年   21篇
  2013年   41篇
  2012年   29篇
  2011年   19篇
  2010年   19篇
  2009年   13篇
  2008年   12篇
  2007年   18篇
  2006年   5篇
  2005年   4篇
  2004年   5篇
  2003年   4篇
  2002年   7篇
  2001年   2篇
  2000年   5篇
  1999年   2篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
  1995年   5篇
  1994年   3篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
  1972年   1篇
排序方式: 共有419条查询结果,搜索用时 15 毫秒
1.
大量的研究行为识别方法集中在检测简单的动作,如:步行,慢跑或者跳跃等;针对于打斗或者动作复杂的攻击性行为则研究较少;而这些研究在某些监控场景下非常有用,如:监狱,自助银行,商场等. 传统的暴力行为识别研究方法主要利用先验知识来手动设计特征,而本文提出了一种基于3D-CNN结构的暴力检测方法,通过三维深度神经网络直接对输入进行操作,能够很好的提取暴力行为的时空特征信息,从而进行检测. 从实验结果可以看出,本文方法能较好地识别出暴力行为,准确率要高于人工设计特征的方法.  相似文献   
2.
SATCHMORE was introduced as a mechanism to integrate relevancy testing with the model-generation theorem prover SATCHMO. This made it possible to avoid invoking some clauses that appear in no refutation, which was a major drawback of the SATCHMO approach. SATCHMORE relevancy, however, is driven by the entire set of negative clauses and no distinction is accorded to the query negation. Under unfavorable circumstances, such as in the presence of large amounts of negative data, this can reduce the efficiency of SATCHMORE. In this paper we introduce a further refinement of SATCHMO called SATCHMOREBID: SATCHMORE with BIDirectional relevancy. SATCHMOREBID uses only the negation of the query for relevancy determination at the start. Other negative clauses are introduced on demand and only if a refutation is not possible using the current set of negative clauses. The search for the relevant negative clauses is performed in a forward chaining mode as opposed to relevancy propagation in SATCHMORE which is based on backward chaining. SATCHMOREBID is shown to be refutationally sound and complete. Experiments on a prototype SATCHMOREBID implementation point to its potential to enhance the efficiency of the query answering process in disjunctive databases. Donald Loveland, Ph.D.: He is Emeritus Professor of Computer Science at Duke University. He received his Ph.D. in mathematics from New York University and taught at NYU and CMU prior to joining Duke in 1973. His research in automated deduction includes defining the model elimination proof procedure and the notion of linear resolution. He is author of one book and editor/co-editor of two other books on automated theorem proving. He has done research in the areas of algorithms, complexity, expert systems and logic programming. He is an AAAI Fellow, ACM Fellow and winner of the Herbrand Award in Automated Reasoning. Adnan H. Yahya, Ph.D.: He is an associate professor at the Department of Electrical Engineering, Birzeit University, Palestine. He received his Diploma and PhD degrees from St. Petersburg Electrotechnical University and Nothwestern University in 1979 and 1984 respectively. His research interests are in Artificial Intelligence in general and in the areas of Deductive Databases, Logic Programming and Nonmonotonic Reasoning in particular. He had several visiting appointments at universities and research labs in the US, Germany, France and the UK. Adnan Yahya is a member of the ACM, IEEE and IEEE Computer Society.  相似文献   
3.
A new method for inverse kinematics for hyper-redundant manipulators is proposed in this paper to plan the path of the end-effector. The basic idea is that for a given smooth path consisting of points close enough to each other; computing the inverse kinematics for these points is carried out geometrically using the proposed method. In this method, the angles between the adjacent links are set to be the same, which makes lining up of two or more joint axes impossible; therefore, avoiding singularities. The manipulability index has been used to show how far the manipulator from the singularity configuration is. The determination of the workspace of the manipulator using the proposed method has been presented in this paper. The simulation results have been carried out on a planar and a three dimensional manipulators. The effectiveness of the proposed method is clearly demonstrated by comparing its result with results calculated by the well-known method of measuring manipulability which is used for singularity avoidance for the last two decades.  相似文献   
4.
Reprogramming of metabolic pathways in monocytes and macrophages can induce a proatherosclerotic inflammatory memory called trained innate immunity. Here, we have analyzed the role of the Liver X receptor (LXR), a crucial regulator of metabolism and inflammation, in oxidized low-density lipoprotein (oxLDL)-induced trained innate immunity. Human monocytes were incubated with LXR agonists, antagonists, and oxLDL for 24 h. After five days of resting time, cells were restimulated with the TLR-2 agonist Pam3cys. OxLDL priming induced the expression of LXRα but not LXRβ. Pharmacologic LXR activation was enhanced, while LXR inhibition prevented the oxLDL-induced inflammatory response. Furthermore, LXR inhibition blocked the metabolic changes necessary for epigenetic reprogramming associated with trained immunity. In fact, enrichment of activating histone marks at the IL-6 and TNFα promotor was reduced following LXR inhibition. Based on the differential expression of the LXR isoforms, we inhibited LXRα and LXRβ genes using siRNA in THP1 cells. As expected, siRNA-mediated knock-down of LXRα blocked the oxLDL-induced inflammatory response, while knock-down of LXRβ had no effect. We demonstrate a specific and novel role of the LXRα isoform in the regulation of oxLDL-induced trained immunity. Our data reveal important aspects of LXR signaling in innate immunity with relevance to atherosclerosis formation.  相似文献   
5.
Wireless Personal Communications - This paper proposes highly compact and high speed hardware architectures of 64-bit KASUMI block cipher for wide range of wireless applications. A novel...  相似文献   
6.
In this paper a new protocol using fuzzy logic control has been proposed. The protocol is based on Stable Election Protocol (SEP). Fuzzy logic control based on three variables, distance of nodes form base station, density of nodes and the battery level of nodes along with the traditional threshold values used in SEP are used to enhance the process of cluster head election in the existing SEP protocol and improve the lifetime and throughput of the Wireless Sensor Network. The result of the simulation which has been done in MATLAB simulator indicates that Stable Election Protocol based on fuzzy logic is more energy efficient and improves the lifetime and throughput of the network by 73.2 and 68.54 % respectively comparing with the existing SEP protocol.  相似文献   
7.
A highly accurate frequency estimation providing suppression of windowing effects, denoising performances and frequency resolutions in excess of Gabor–Heisenberg limit, is proposed for brief duration signals. It is shown that unbiased frequency estimation with vanishing frequency variances is achieved far below Cramer–Rao lower bound when signal-to-noise ratio reaches vicinity of threshold values. Observed performances provide novel and valuable perspectives for efficient and accurate frequency estimation for brief duration signals in noise.  相似文献   
8.
The physical theory of diffraction (PTD) has been expanded for the case of slope diffraction, when an incident wave is zero but its derivative is not zero in the direction of a perfectly conducting scattering edge. High frequency asymptotics are found both for elementary edge waves and for the total edge waves scattered by arbitrary curved edges. Great attention is given to fields created by the nonuniform (diffraction) component of edge currents. These fields are usually called ptd corrections to the Physical Optics approach. These corrections are found for diffraction fields in ray regions and in diffraction regions such as the vicinities of shadow boundaries, smooth caustics, and foci.  相似文献   
9.
Power management is an important issue in wireless sensor networks (WSNs) because wireless sensor nodes are usually battery powered, and an efficient use of the available battery power becomes an important concern specially for those applications where the system is expected to operate for long durations. This necessity for energy efficient operation of a WSN has prompted the development of new protocols in all layers of the communication stack. Provided that, the radio transceiver is the most power consuming component of a typical sensor node, large gains can be achieved at the link layer where the medium access control (MAC) protocol controls the usage of the radio transceiver unit. MAC protocols for sensor networks differ greatly from typical wireless networks access protocols in many issues. MAC protocols for sensor networks must have built‐in power conservation, mobility management, and failure recovery strategies. Furthermore, sensor MAC protocols should make performance trade‐off between latency and throughput for a reduction in energy consumption to maximize the lifetime of the network. This is in general achieved through duty cycling the radio transceiver. Many MAC protocols with different objectives were proposed for wireless sensor networks in the literature. Most of these protocols take into account the energy efficiency as a main objective. There is much more innovative work should be done at the MAC layer to address the hard unsolved problems. In this paper, we first outline and discuss the specific requirements and design trade‐offs of a typical wireless sensor MAC protocol by describing the properties of WSN that affect the design of MAC layer protocols. Then, a typical collection of wireless sensor MAC protocols presented in the literature are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally, we present research directions and identify open issues for future medium access research. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号