全文获取类型
收费全文 | 236篇 |
免费 | 15篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 28篇 |
金属工艺 | 8篇 |
机械仪表 | 1篇 |
建筑科学 | 12篇 |
能源动力 | 6篇 |
轻工业 | 21篇 |
水利工程 | 1篇 |
无线电 | 19篇 |
一般工业技术 | 26篇 |
冶金工业 | 7篇 |
自动化技术 | 121篇 |
出版年
2023年 | 3篇 |
2022年 | 8篇 |
2021年 | 6篇 |
2020年 | 6篇 |
2019年 | 6篇 |
2018年 | 7篇 |
2017年 | 3篇 |
2016年 | 7篇 |
2015年 | 9篇 |
2014年 | 6篇 |
2013年 | 26篇 |
2012年 | 12篇 |
2011年 | 14篇 |
2010年 | 18篇 |
2009年 | 20篇 |
2008年 | 20篇 |
2007年 | 20篇 |
2006年 | 8篇 |
2005年 | 8篇 |
2004年 | 10篇 |
2003年 | 3篇 |
2002年 | 6篇 |
2001年 | 2篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有251条查询结果,搜索用时 15 毫秒
1.
Abstract. Locally stationary processes are non‐stationary stochastic processes the second‐order structure of which varies smoothly over time. In this paper, we develop a method to bootstrap the local periodogram of a locally stationary process. Our method generates pseudo local periodogram ordinates by combining a parametric time and non‐parametric frequency domain bootstrap approach. We first fit locally a time varying autoregressive model so as to capture the essential characteristics of the underlying process. A locally calculated non‐parametric correction in the frequency domain is then used so as to improve upon the locally parametric autoregressive fit. As an application, we investigate theoretically the asymptotic properties of the bootstrap method proposed applied to the class of local spectral means, local ratio statistics and local spectral density estimators. Some simulations demonstrate the ability of our method to give accurate estimates of the quantities of interest in finite sample situations and an application to a real‐life data‐set is presented. 相似文献
2.
Marios Anagnostopoulos Georgios Kambourakis Stefanos Gritzalis 《International Journal of Information Security》2016,15(5):455-473
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack. 相似文献
3.
4.
5.
Marios C. Angelides 《New Review of Hypermedia and Multimedia》2013,19(1):67-106
Abstract The objective of this paper is to present an alternative paradigm to the traditional Knowledge Based Expert Systems Paradigm for developing a full-scale Intelligent Tutoring System that has dominated for years Intelligent Tutoring Systems development. This alternative paradigm which integrates Minsky's Frames with hypertext has been successfully deployed so far in the development of PEDRO, an Intelligent Tutoring System for foreign language learning, SONATA, an Intelligent Tutoring System for music theory learning and INTUITION, an Intelligent Tutoring System for Gaming-Simulation. 相似文献
6.
The content–user gap is the difference between the limited range of content-relevant preferences that may be expressed using
the MPEG-7 user interaction tools and the much wider range of metadata that may be represented using the MPEG-7 content tools.
One approach for closing this gap is to make the user and content metadata isomorphic by using the existing MPEG-7 content
tools to represent user (as well as content) metadata (Agius and Angelides 2006, 2007). Subsequently, user preferences may
be specified for all content, without omission. Since there is a wealth of user preference and history metadata within the
MPEG-7 user interaction tools that can usefully complement these specific content preferences, in this paper we develop a
method by which all user and content metadata may be bridged.
相似文献
Marios C. AngelidesEmail: |
7.
Marios Kyperountas Author Vitae Anastasios Tefas Author Vitae 《Pattern recognition》2010,43(3):972-986
A novel facial expression classification (FEC) method is presented and evaluated. The classification process is decomposed into multiple two-class classification problems, a choice that is analytically justified, and unique sets of features are extracted for each classification problem. Specifically, for each two-class problem, an iterative feature selection process that utilizes a class separability measure is employed to create salient feature vectors (SFVs), where each SFV is composed of a selected feature subset. Subsequently, two-class discriminant analysis is applied on the SFVs to produce salient discriminant hyper-planes (SDHs), which are used to train the corresponding two-class classifiers. To properly integrate the two-class classification results and produce the FEC decision, a computationally efficient and fast classification scheme is developed. During each step of this scheme, the most reliable classifier is identified and utilized, thus, a more accurate final classification decision is produced. The JAFFE and the MMI databases are used to evaluate the performance of the proposed salient-feature-and-reliable-classifier selection (SFRCS) methodology. Classification rates of 96.71% and 93.61% are achieved under the leave-one-sample-out evaluation strategy, and 85.92% under the leave-one-subject-out evaluation strategy. 相似文献
8.
Constantinos Marios Angelopoulos Author Vitae Sotiris Nikoletseas Author Vitae 《Journal of Systems and Software》2010,83(12):2471-2477
We study the problem of fast and energy-efficient data collection of sensory data using a mobile sink, in wireless sensor networks in which both the sensors and the sink move. Motivated by relevant applications, we focus on dynamic sensory mobility and heterogeneous sensor placement. Our approach basically suggests to exploit the sensor motion to adaptively propagate information based on local conditions (such as high placement concentrations), so that the sink gradually “learns” the network and accordingly optimizes its motion. Compared to relevant solutions in the state of the art (such as the blind random walk, biased walks, and even optimized deterministic sink mobility), our method significantly reduces latency (the improvement ranges from 40% for uniform placements, to 800% for heterogeneous ones), while also improving the success rate and keeping the energy dissipation at very satisfactory levels. 相似文献
9.
This paper proposes a two-stage system for text detection in video images. In the first stage, text lines are detected based on the edge map of the image leading in a high recall rate with low computational time expenses. In the second stage, the result is refined using a sliding window and an SVM classifier trained on features obtained by a new Local Binary Pattern-based operator (eLBP) that describes the local edge distribution. The whole algorithm is used in a multiresolution fashion enabling detection of characters for a broad size range. Experimental results, based on a new evaluation methodology, show the promising overall performance of the system on a challenging corpus, and prove the superior discriminating ability of the proposed feature set against the best features reported in the literature. 相似文献
10.
In this work, we continue the study of the many facets of the Fully Mixed Nash Equilibrium Conjecture, henceforth abbreviated as the
FMNE\mathsf{FMNE}
Conjecture, in selfish routing for the special case of n identical users over two (identical) parallel links. We introduce a new measure of Social Cost, defined as the expectation of the square of the maximum congestion on a link; we call it Quadratic Maximum Social Cost. A Nash equilibrium is a stable state where no user can improve her (expected) latency by switching her mixed strategy; a worst-case Nash equilibrium is one that maximizes Quadratic Maximum Social Cost. In the fully mixed Nash equilibrium, all mixed strategies achieve full support. 相似文献