全文获取类型
收费全文 | 384篇 |
免费 | 25篇 |
国内免费 | 10篇 |
专业分类
综合类 | 1篇 |
化学工业 | 107篇 |
金属工艺 | 4篇 |
机械仪表 | 21篇 |
建筑科学 | 10篇 |
能源动力 | 29篇 |
轻工业 | 39篇 |
水利工程 | 2篇 |
石油天然气 | 5篇 |
无线电 | 28篇 |
一般工业技术 | 99篇 |
冶金工业 | 8篇 |
原子能技术 | 5篇 |
自动化技术 | 61篇 |
出版年
2024年 | 4篇 |
2023年 | 6篇 |
2022年 | 16篇 |
2021年 | 22篇 |
2020年 | 20篇 |
2019年 | 21篇 |
2018年 | 30篇 |
2017年 | 28篇 |
2016年 | 22篇 |
2015年 | 19篇 |
2014年 | 21篇 |
2013年 | 41篇 |
2012年 | 29篇 |
2011年 | 19篇 |
2010年 | 19篇 |
2009年 | 13篇 |
2008年 | 12篇 |
2007年 | 18篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 5篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1975年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有419条查询结果,搜索用时 15 毫秒
1.
大量的研究行为识别方法集中在检测简单的动作,如:步行,慢跑或者跳跃等;针对于打斗或者动作复杂的攻击性行为则研究较少;而这些研究在某些监控场景下非常有用,如:监狱,自助银行,商场等. 传统的暴力行为识别研究方法主要利用先验知识来手动设计特征,而本文提出了一种基于3D-CNN结构的暴力检测方法,通过三维深度神经网络直接对输入进行操作,能够很好的提取暴力行为的时空特征信息,从而进行检测. 从实验结果可以看出,本文方法能较好地识别出暴力行为,准确率要高于人工设计特征的方法. 相似文献
2.
SATCHMORE was introduced as a mechanism to integrate relevancy testing with the model-generation theorem prover SATCHMO. This
made it possible to avoid invoking some clauses that appear in no refutation, which was a major drawback of the SATCHMO approach.
SATCHMORE relevancy, however, is driven by the entire set of negative clauses and no distinction is accorded to the query
negation. Under unfavorable circumstances, such as in the presence of large amounts of negative data, this can reduce the
efficiency of SATCHMORE. In this paper we introduce a further refinement of SATCHMO called SATCHMOREBID: SATCHMORE with BIDirectional
relevancy. SATCHMOREBID uses only the negation of the query for relevancy determination at the start. Other negative clauses
are introduced on demand and only if a refutation is not possible using the current set of negative clauses. The search for
the relevant negative clauses is performed in a forward chaining mode as opposed to relevancy propagation in SATCHMORE which
is based on backward chaining. SATCHMOREBID is shown to be refutationally sound and complete. Experiments on a prototype SATCHMOREBID
implementation point to its potential to enhance the efficiency of the query answering process in disjunctive databases.
Donald Loveland, Ph.D.: He is Emeritus Professor of Computer Science at Duke University. He received his Ph.D. in mathematics from New York University
and taught at NYU and CMU prior to joining Duke in 1973. His research in automated deduction includes defining the model elimination
proof procedure and the notion of linear resolution. He is author of one book and editor/co-editor of two other books on automated
theorem proving. He has done research in the areas of algorithms, complexity, expert systems and logic programming. He is
an AAAI Fellow, ACM Fellow and winner of the Herbrand Award in Automated Reasoning.
Adnan H. Yahya, Ph.D.: He is an associate professor at the Department of Electrical Engineering, Birzeit University, Palestine. He received his
Diploma and PhD degrees from St. Petersburg Electrotechnical University and Nothwestern University in 1979 and 1984 respectively.
His research interests are in Artificial Intelligence in general and in the areas of Deductive Databases, Logic Programming
and Nonmonotonic Reasoning in particular. He had several visiting appointments at universities and research labs in the US,
Germany, France and the UK. Adnan Yahya is a member of the ACM, IEEE and IEEE Computer Society. 相似文献
3.
Samer Yahya M. Moghavvemi Haider A.F. Mohamed 《Simulation Modelling Practice and Theory》2011,19(1):406-422
A new method for inverse kinematics for hyper-redundant manipulators is proposed in this paper to plan the path of the end-effector. The basic idea is that for a given smooth path consisting of points close enough to each other; computing the inverse kinematics for these points is carried out geometrically using the proposed method. In this method, the angles between the adjacent links are set to be the same, which makes lining up of two or more joint axes impossible; therefore, avoiding singularities. The manipulability index has been used to show how far the manipulator from the singularity configuration is. The determination of the workspace of the manipulator using the proposed method has been presented in this paper. The simulation results have been carried out on a planar and a three dimensional manipulators. The effectiveness of the proposed method is clearly demonstrated by comparing its result with results calculated by the well-known method of measuring manipulability which is used for singularity avoidance for the last two decades. 相似文献
4.
Hannes M. Findeisen Vivienne C. Voges Laura C. Braun Jannik Sonnenberg Dennis Schwarz Helena Krner Holger Reinecke Yahya Sohrabi 《International journal of molecular sciences》2022,23(11)
Reprogramming of metabolic pathways in monocytes and macrophages can induce a proatherosclerotic inflammatory memory called trained innate immunity. Here, we have analyzed the role of the Liver X receptor (LXR), a crucial regulator of metabolism and inflammation, in oxidized low-density lipoprotein (oxLDL)-induced trained innate immunity. Human monocytes were incubated with LXR agonists, antagonists, and oxLDL for 24 h. After five days of resting time, cells were restimulated with the TLR-2 agonist Pam3cys. OxLDL priming induced the expression of LXRα but not LXRβ. Pharmacologic LXR activation was enhanced, while LXR inhibition prevented the oxLDL-induced inflammatory response. Furthermore, LXR inhibition blocked the metabolic changes necessary for epigenetic reprogramming associated with trained immunity. In fact, enrichment of activating histone marks at the IL-6 and TNFα promotor was reduced following LXR inhibition. Based on the differential expression of the LXR isoforms, we inhibited LXRα and LXRβ genes using siRNA in THP1 cells. As expected, siRNA-mediated knock-down of LXRα blocked the oxLDL-induced inflammatory response, while knock-down of LXRβ had no effect. We demonstrate a specific and novel role of the LXRα isoform in the regulation of oxLDL-induced trained immunity. Our data reveal important aspects of LXR signaling in innate immunity with relevance to atherosclerosis formation. 相似文献
5.
Yasir Wu Ning Ali Zain Anwar Shaikh Muhammad Mujtaba Yahya Muhammad Rehan Aamir Muhammad 《Wireless Personal Communications》2019,106(4):1787-1800
Wireless Personal Communications - This paper proposes highly compact and high speed hardware architectures of 64-bit KASUMI block cipher for wide range of wireless applications. A novel... 相似文献
6.
In this paper a new protocol using fuzzy logic control has been proposed. The protocol is based on Stable Election Protocol (SEP). Fuzzy logic control based on three variables, distance of nodes form base station, density of nodes and the battery level of nodes along with the traditional threshold values used in SEP are used to enhance the process of cluster head election in the existing SEP protocol and improve the lifetime and throughput of the Wireless Sensor Network. The result of the simulation which has been done in MATLAB simulator indicates that Stable Election Protocol based on fuzzy logic is more energy efficient and improves the lifetime and throughput of the network by 73.2 and 68.54 % respectively comparing with the existing SEP protocol. 相似文献
7.
Nourédine Yahya Bey 《Signal, Image and Video Processing》2018,12(7):1279-1283
A highly accurate frequency estimation providing suppression of windowing effects, denoising performances and frequency resolutions in excess of Gabor–Heisenberg limit, is proposed for brief duration signals. It is shown that unbiased frequency estimation with vanishing frequency variances is achieved far below Cramer–Rao lower bound when signal-to-noise ratio reaches vicinity of threshold values. Observed performances provide novel and valuable perspectives for efficient and accurate frequency estimation for brief duration signals in noise. 相似文献
8.
The physical theory of diffraction (PTD) has been expanded for the case of slope diffraction, when an incident wave is zero but its derivative is not zero in the direction of a perfectly conducting scattering edge. High frequency asymptotics are found both for elementary edge waves and for the total edge waves scattered by arbitrary curved edges. Great attention is given to fields created by the nonuniform (diffraction) component of edge currents. These fields are usually called ptd corrections to the Physical Optics approach. These corrections are found for diffraction fields in ray regions and in diffraction regions such as the vicinities of shadow boundaries, smooth caustics, and foci. 相似文献
9.
Power management is an important issue in wireless sensor networks (WSNs) because wireless sensor nodes are usually battery powered, and an efficient use of the available battery power becomes an important concern specially for those applications where the system is expected to operate for long durations. This necessity for energy efficient operation of a WSN has prompted the development of new protocols in all layers of the communication stack. Provided that, the radio transceiver is the most power consuming component of a typical sensor node, large gains can be achieved at the link layer where the medium access control (MAC) protocol controls the usage of the radio transceiver unit. MAC protocols for sensor networks differ greatly from typical wireless networks access protocols in many issues. MAC protocols for sensor networks must have built‐in power conservation, mobility management, and failure recovery strategies. Furthermore, sensor MAC protocols should make performance trade‐off between latency and throughput for a reduction in energy consumption to maximize the lifetime of the network. This is in general achieved through duty cycling the radio transceiver. Many MAC protocols with different objectives were proposed for wireless sensor networks in the literature. Most of these protocols take into account the energy efficiency as a main objective. There is much more innovative work should be done at the MAC layer to address the hard unsolved problems. In this paper, we first outline and discuss the specific requirements and design trade‐offs of a typical wireless sensor MAC protocol by describing the properties of WSN that affect the design of MAC layer protocols. Then, a typical collection of wireless sensor MAC protocols presented in the literature are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally, we present research directions and identify open issues for future medium access research. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献