首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   378篇
  免费   22篇
  国内免费   1篇
电工技术   9篇
综合类   1篇
化学工业   82篇
金属工艺   6篇
机械仪表   14篇
建筑科学   2篇
能源动力   11篇
轻工业   32篇
水利工程   3篇
无线电   81篇
一般工业技术   80篇
冶金工业   35篇
原子能技术   3篇
自动化技术   42篇
  2023年   3篇
  2022年   11篇
  2021年   14篇
  2020年   13篇
  2019年   5篇
  2018年   12篇
  2017年   11篇
  2016年   10篇
  2015年   8篇
  2014年   21篇
  2013年   23篇
  2012年   28篇
  2011年   17篇
  2010年   11篇
  2009年   24篇
  2008年   18篇
  2007年   21篇
  2006年   16篇
  2005年   15篇
  2004年   14篇
  2003年   11篇
  2002年   9篇
  2001年   8篇
  2000年   5篇
  1999年   4篇
  1998年   11篇
  1997年   6篇
  1996年   4篇
  1995年   4篇
  1994年   4篇
  1993年   2篇
  1989年   2篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1985年   3篇
  1984年   4篇
  1983年   2篇
  1982年   4篇
  1981年   2篇
  1980年   1篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
  1966年   2篇
排序方式: 共有401条查询结果,搜索用时 31 毫秒
1.
Diabetic neuropathy (DN), the most common chronic and progressive complication of diabetes mellitus (DM), strongly affects patients’ quality of life. DN could be present as peripheral, autonomous or, clinically also relevant, uremic neuropathy. The etiopathogenesis of DN is multifactorial, and genetic components play a role both in its occurrence and clinical course. A number of gene polymorphisms in candidate genes have been assessed as susceptibility factors for DN, and most of them are linked to mechanisms such as reactive oxygen species production, neurovascular impairments and modified protein glycosylation, as well as immunomodulation and inflammation. Different epigenomic mechanisms such as DNA methylation, histone modifications and non-coding RNA action have been studied in DN, which also underline the importance of “metabolic memory” in DN appearance and progression. In this review, we summarize most of the relevant data in the field of genetics and epigenomics of DN, hoping they will become significant for diagnosis, therapy and prevention of DN.  相似文献   
2.
Real Time Machine Learning Based Car Detection in Images With Fast Training   总被引:2,自引:0,他引:2  
Our primary interest is to build fast and reliable object recognizers in images based on small training sets. This is important in cases where the training set needs to be built mostly manually, as in the case that we studied, the recognition of the Honda Accord 2004 from rear views. We describe a novel variant of the AdaBoost based learning algorithm, which builds a strong classifier by incremental addition of weak classifiers (WCs) that minimize the combined error of the already selected WCs. Each WC is trained only once, and examples do not change their weights. We describe a set of appropriate feature types for the considered recognition problem, including a redness measure and dominant edge orientations. The existing edge orientation bin division was improved by shifting so that all horizontal (vertical, respectively) edges belong to the same bin. We propose to pre-eliminate features whose best threshold value is near the trivial position at the minimum or maximum of all threshold values. This is a novel method that has reduced the training set WC quantity to less than 10% of its original number, greatly speeding up training time, and showing no negative impact on the quality of the final classifier. We also modified the AdaBoost based learning machine. Our experiments indicate that the set of features used by Viola and Jones and others for face recognition was inefficient for our problem, recognizing cars accurately and in real time with fast training. Our training method has resulted in finding a very accurate classifier containing merely 30 WCs after about 1 h of training. Compared to existing literature, we have overall achieved the design of a real time object detection machine with the least number of examples, the least number of WCs, the fastest training time, and with competitive detection and false positive rates.  相似文献   
3.
The performance of a time hopping combined with pulse position modulation ultra wide band system with a nonlinear receiver using an adaptive filter and a soft-limiter in the presence of narrowband interference has been considered. This system brings a significant performance improvement compared with the system that uses an adaptive filter and a linear receiver, particularly in the case of high-interference power where its absence leads to the reception loss. Also, the proposed receiver has much better interference rejection performance compared with minimal mean-square error interference rejection, in case of high-interference power (interference to signal ratios from 30 to 65 dB).  相似文献   
4.
This paper reports on experimental results of aqueous heterophase polymerizations with monomers of quite different solubility in water ranging from the water-soluble 2-hydroxyethyl methacrylate to lauryl methacrylate with solubility in water of only about 10−4 mM. A calorimetric study revealed the strong influence of both the hydrophilicity of the monomer and the stirrer speed on the rate of polymerization in the absence of surfactants. In order to obtain maximum latex yield and high efficiency (which is a measure considering colloidal properties, polymerization recipe, and polymerization parameters) the initiator-surfactant combination must be properly chosen in dependence on the hydrophilicity of the monomer. Results are presented for sodium alkyl sulfates or disodium-N-stearoyl-l-glutamate as surfactant and potassium peroxodisulfate, or poly(ethylene glycol)-azo- compounds, or 2,2′-azobis(N-2′-methylpropanoyl-2-amino-alkyl-1)-sulfonates as initiators.  相似文献   
5.
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme.  相似文献   
6.
This paper presents us with a framework for the automatic player position detection (APPD) in the game of basketball. Court players are detected in the images broadcasted via television stations. In them, at any point of time, the view is from only one camera. This makes the detection process much more difficult. The player detection is based on the mixture of non-oriented pictorial structures. The detection of body parts is performed by the Support Vector Machine (SVM) algorithm. The results of these detections are combined together with constraints on their locations, which specify the position of one body part with respect to the parent body part. In order to train the whole model, we used a latent form of SVM called the latent SVM (LSVM). Such approach generated the statistical accuracy of about 82 %, which represents one of the best results in basketball player detection framework. Beside players, the algorithm detected a certain number of false positive objects. These are mostly people from the audience and the referees as well. This paper contains a simple and robust solution to remove them all, based on the play court boundaries and the histogram comparison. Separating players in different teams is done by k-means clustering. The inputs to this algorithm are saturation histograms calculated on the jerseys. A spatial transformation is determined by the detected play court boundaries and the actual court measures. Using this transformation, points representing the location of detected players in TV images are mapped to the actual location of players on the court, which was the main goal of our research. The proposed solution is sound and efficient. In addition, it is backed up by the experimental results obtained using the model of the actual footage of basketball games.  相似文献   
7.
8.
The sophisticated method for mathematical modeling of humanoid robots formulated in Part 1 of this paper is applied here to the dynamic task of keeping a posture under disturbance, which is equally important to humans and humanoid robots. The idea of this work is to develop and realize a simulator tool for dynamic analysis of human-or-humanoid behavior under disturbances. To show the potentials and verify this tool, we comparatively analyze the robustness of some postures to external disturbance. At this stage of research we do not conduct real experiments with humans/humanoids but try to verify our simulation tool by relying on available experience. Therefore, the postures for comparison are taken from everyday life and from sports: upright standing, squat posture, and three karate postures. As the external disturbance we choose an impulse and a permanent force, both with variable direction and magnitude.  相似文献   
9.
OBJECTIVE: To examine operator strategies for diagnosing and recovering from errors and disturbances as well as the impact of automation design and time pressure on these processes. BACKGROUND: Considerable efforts have been directed at error prevention through training and design. However, because errors cannot be eliminated completely, their detection, diagnosis, and recovery must also be supported. Research has focused almost exclusively on error detection. Little is known about error diagnosis and recovery, especially in the context of event-driven tasks and domains. METHOD: With a confederate pilot, 12 airline pilots flew a 1-hr simulator scenario that involved three challenging automation-related tasks and events that were likely to produce erroneous actions or assessments. Behavioral data were compared with a canonical path to examine pilots' error and disturbance management strategies. Debriefings were conducted to probe pilots' system knowledge. RESULTS: Pilots seldom followed the canonical path to cope with the scenario events. Detection of a disturbance was often delayed. Diagnostic episodes were rare because of pilots' knowledge gaps and time criticality. In many cases, generic inefficient recovery strategies were observed, and pilots relied on high levels of automation to manage the consequences of an error. CONCLUSION: Our findings describe and explain the nature and shortcomings of pilots' error management activities. They highlight the need for improved automation training and design to achieve more timely detection, accurate explanation, and effective recovery from errors and disturbances. APPLICATION: Our findings can inform the design of tools and techniques that support disturbance management in various complex, event-driven environments.  相似文献   
10.
3D distance fields: a survey of techniques and applications   总被引:2,自引:0,他引:2  
A distance field is a representation where, at each point within the field, we know the distance from that point to the closest point on any object within the domain. In addition to distance, other properties may be derived from the distance field, such as the direction to the surface, and when the distance field is signed, we may also determine if the point is internal or external to objects within the domain. The distance field has been found to be a useful construction within the areas of computer vision, physics, and computer graphics. This paper serves as an exposition of methods for the production of distance fields, and a review of alternative representations and applications of distance fields. In the course of this paper, we present various methods from all three of the above areas, and we answer pertinent questions such as How accurate are these methods compared to each other? How simple are they to implement?, and What is the complexity and runtime of such methods?  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号