首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   291篇
  免费   18篇
电工技术   5篇
综合类   1篇
化学工业   49篇
金属工艺   3篇
建筑科学   11篇
能源动力   20篇
轻工业   26篇
水利工程   1篇
无线电   69篇
一般工业技术   18篇
冶金工业   4篇
自动化技术   102篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   3篇
  2019年   5篇
  2018年   14篇
  2017年   13篇
  2016年   8篇
  2015年   6篇
  2014年   11篇
  2013年   21篇
  2012年   24篇
  2011年   19篇
  2010年   12篇
  2009年   23篇
  2008年   10篇
  2007年   13篇
  2006年   11篇
  2005年   9篇
  2004年   10篇
  2003年   15篇
  2002年   15篇
  2001年   6篇
  2000年   18篇
  1999年   4篇
  1998年   10篇
  1997年   5篇
  1996年   3篇
  1995年   4篇
  1994年   2篇
  1993年   1篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1988年   1篇
排序方式: 共有309条查询结果,搜索用时 31 毫秒
1.
To model effectively the output waveform and propagation delay of a CMOS gate, knowledge of the time point at which it starts to conduct is essential. An efficient method for calculating analytically this time point taking into account the structure of the gate and the input waveform, is introduced. Such a method can easily be integrated into a timing analysis system  相似文献   
2.
Video shot detection and condensed representation. a review   总被引:4,自引:0,他引:4  
There is an urgent need to develop techniques that organize video data into more compact forms or extract semantically meaningful information. Such operations can serve as a first step for a number of different data access tasks such as browsing, retrieval, genre classification, and event detection. In this paper, we focus not on the high-level video analysis task themselves but on the common basic techniques that have been developed to facilitate them. These basic tasks are shot boundary detection and condensed video representation  相似文献   
3.
4.
Enterprises increasingly recognize the compelling economic and operational benefits from virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable transformation of organizations that adopt cloud computing is accompanied by a number of security threats that should be considered. In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword – a novel holistic framework that aspires to alleviate these challenges. Specifically, the proposed framework involves a context-aware security model, the necessary policies enforcement mechanism along with a physical distribution, encryption and query middleware.  相似文献   
5.
This paper addresses the model reduction problem for a class of stiff chemical Langevin equations that arise as models of biomolecular networks with fast and slow reactions and can be described as continuous Markov processes. Initially, a coordinate transformation is sought that allows the decoupling of fast and slow variables in the model equations. Necessary and sufficient conditions are derived for such a linear transformation to exist, along with an explicit change of variables which achieves the desired decoupling. For the systems for which this step is applicable, the method of adiabatic elimination is applied to determine a representation of the slow dynamics. Theoretical concepts and results are illustrated with simple examples.  相似文献   
6.
Typically, design of a complex system starts by setting targets for its performance characteristics. Then, design engineers cascade these targets to the components and design the components to meet these targets. It is important to have efficient tools that check if a set of performance targets for a component corresponds to a feasible design and determine the dimensions and mass of this design. This paper describes a method to develop tools that relate response parameters that describe the performance of a component to the physical design variables that specify its geometry. Neural networks and response surface polynomials are used to rapidly predict the performance characteristics of the components given the component dimensions. The method is demonstrated on design of an automotive joint. The paper compares neural networks and response surface polynomials and shows that they are almost equally accurate for the problem considered.  相似文献   
7.
In this paper we consider the potential of using an aggressive form of energy conservation for mobile computing environments. The estimators for the round-trip time and round-trip time variance used by TCP are used to direct the transceiver of a mobile node to idle over extended periods of time when packet activity is not anticipated. In addition, we consider data link layer extensions that provide additional control information allowing the mobile to be further selective as to when to idle and when to activate the network interface device. Simulations are conducted to examine the performance of the proposed scheme under various levels of congestion in the fixed part of the network, from completely unloaded to fully congested. The simulations reveal that the technique is promising but its effectiveness depends crucially on the control of the maximum window size used by TCP and on accurate knowledge of the congestion conditions in the network.  相似文献   
8.
9.
Nonnegative Matrix Factorization (NMF) is among the most popular subspace methods, widely used in a variety of image processing problems. Recently, a discriminant NMF method that incorporates Linear Discriminant Analysis inspired criteria has been proposed, which achieves an efficient decomposition of the provided data to its discriminant parts, thus enhancing classification performance. However, this approach possesses certain limitations, since it assumes that the underlying data distribution is unimodal, which is often unrealistic. To remedy this limitation, we regard that data inside each class have a multimodal distribution, thus forming clusters and use criteria inspired by Clustering based Discriminant Analysis. The proposed method incorporates appropriate discriminant constraints in the NMF decomposition cost function in order to address the problem of finding discriminant projections that enhance class separability in the reduced dimensional projection space, while taking into account subclass information. The developed algorithm has been applied for both facial expression and face recognition on three popular databases. Experimental results verified that it successfully identified discriminant facial parts, thus enhancing recognition performance.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号