首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   15篇
电工技术   1篇
化学工业   27篇
金属工艺   8篇
机械仪表   1篇
建筑科学   12篇
能源动力   7篇
轻工业   21篇
水利工程   1篇
无线电   27篇
一般工业技术   33篇
冶金工业   9篇
自动化技术   126篇
  2023年   3篇
  2022年   7篇
  2021年   6篇
  2020年   6篇
  2019年   6篇
  2018年   7篇
  2017年   3篇
  2016年   7篇
  2015年   9篇
  2014年   6篇
  2013年   26篇
  2012年   12篇
  2011年   16篇
  2010年   22篇
  2009年   23篇
  2008年   21篇
  2007年   20篇
  2006年   10篇
  2005年   10篇
  2004年   10篇
  2003年   4篇
  2002年   6篇
  2001年   2篇
  1999年   6篇
  1998年   2篇
  1997年   5篇
  1995年   1篇
  1994年   4篇
  1992年   1篇
  1991年   2篇
  1990年   3篇
  1989年   1篇
  1987年   1篇
  1984年   1篇
  1983年   2篇
  1980年   2篇
排序方式: 共有273条查询结果,搜索用时 15 毫秒
1.
Multifilament Ag-sheathed BiPbSrCaCuO (2223) superconducting tapes containing 49 filaments were fabricated by the powder-in-tube route and the roll-anneal process. The transport critical current densityJ c was 1.3×104 A cm–2 at 77 K and 7×104 A cm–2 at 4.2 K in self-field. A 12-m-long tape was used to construct superconducting solenoids (50, 28, and 14 mm internal diameters) generating dc fields 380–1070 G at 4.2 K. Measurements of the variation ofJ c with field (0–1.6 T) and bend strain (0–5%) are used to explain the performance of the solenoids. The critical bend strain of tapes was about 1.5%.  相似文献   
2.
Abstract. Locally stationary processes are non‐stationary stochastic processes the second‐order structure of which varies smoothly over time. In this paper, we develop a method to bootstrap the local periodogram of a locally stationary process. Our method generates pseudo local periodogram ordinates by combining a parametric time and non‐parametric frequency domain bootstrap approach. We first fit locally a time varying autoregressive model so as to capture the essential characteristics of the underlying process. A locally calculated non‐parametric correction in the frequency domain is then used so as to improve upon the locally parametric autoregressive fit. As an application, we investigate theoretically the asymptotic properties of the bootstrap method proposed applied to the class of local spectral means, local ratio statistics and local spectral density estimators. Some simulations demonstrate the ability of our method to give accurate estimates of the quantities of interest in finite sample situations and an application to a real‐life data‐set is presented.  相似文献   
3.
Silver/superconductor composites containing 0 to 80 vol% silver have been prepared and their properties determined. Optimum heat treatment at sintering temperatures ( 800° C) under low oxygen pressures produces material with high critical current density and improves physical properties. Magnetic susceptibility measurements have been found to be consistent with resistivity results. In order to retain a single high-T c phase with increasing silver content, decreased oxygen partial pressures are required. Using the normal-state resistivity of these composites, a percolation threshold at a silver volume fraction of 43% was observed, while zero resistivity measurements show that a continuous superconducting network can be obtained with up to 80 vol% silver. The critical current density of 21 vol% silver-doped samples was found to be 1520 A cm–2 at 77.3 K, compared to 260 A cm–2 for an undoped sample.  相似文献   
4.
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack.  相似文献   
5.
6.
7.
Abstract

The objective of this paper is to present an alternative paradigm to the traditional Knowledge Based Expert Systems Paradigm for developing a full-scale Intelligent Tutoring System that has dominated for years Intelligent Tutoring Systems development. This alternative paradigm which integrates Minsky's Frames with hypertext has been successfully deployed so far in the development of PEDRO, an Intelligent Tutoring System for foreign language learning, SONATA, an Intelligent Tutoring System for music theory learning and INTUITION, an Intelligent Tutoring System for Gaming-Simulation.  相似文献   
8.
The content–user gap is the difference between the limited range of content-relevant preferences that may be expressed using the MPEG-7 user interaction tools and the much wider range of metadata that may be represented using the MPEG-7 content tools. One approach for closing this gap is to make the user and content metadata isomorphic by using the existing MPEG-7 content tools to represent user (as well as content) metadata (Agius and Angelides 2006, 2007). Subsequently, user preferences may be specified for all content, without omission. Since there is a wealth of user preference and history metadata within the MPEG-7 user interaction tools that can usefully complement these specific content preferences, in this paper we develop a method by which all user and content metadata may be bridged.
Marios C. AngelidesEmail:
  相似文献   
9.
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyber-physical systems subject to process disturbances and measurement noise. A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model. The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values. In order to help detect such attacks, a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change, due to the attack, at a time prior to the attack occurrence time. A key characteristic of this residual is that its magnitude increases every time a new attack occurs. To estimate this unknown residual, an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices. The smoother design guarantees robustness with respect to process disturbances and measurement noise, and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices. The adaptive threshold is designed based on the estimated backward-in-time residual, and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology. Finally, a simulation example is used to demonstrate the effectiveness of the developed methodology.   相似文献   
10.
A novel facial expression classification (FEC) method is presented and evaluated. The classification process is decomposed into multiple two-class classification problems, a choice that is analytically justified, and unique sets of features are extracted for each classification problem. Specifically, for each two-class problem, an iterative feature selection process that utilizes a class separability measure is employed to create salient feature vectors (SFVs), where each SFV is composed of a selected feature subset. Subsequently, two-class discriminant analysis is applied on the SFVs to produce salient discriminant hyper-planes (SDHs), which are used to train the corresponding two-class classifiers. To properly integrate the two-class classification results and produce the FEC decision, a computationally efficient and fast classification scheme is developed. During each step of this scheme, the most reliable classifier is identified and utilized, thus, a more accurate final classification decision is produced. The JAFFE and the MMI databases are used to evaluate the performance of the proposed salient-feature-and-reliable-classifier selection (SFRCS) methodology. Classification rates of 96.71% and 93.61% are achieved under the leave-one-sample-out evaluation strategy, and 85.92% under the leave-one-subject-out evaluation strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号