首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56篇
  免费   5篇
电工技术   6篇
建筑科学   1篇
无线电   1篇
一般工业技术   3篇
冶金工业   2篇
自动化技术   48篇
  2024年   1篇
  2023年   2篇
  2022年   3篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   5篇
  2016年   2篇
  2015年   2篇
  2014年   2篇
  2013年   7篇
  2012年   7篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   3篇
  2007年   1篇
  2005年   3篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
  1996年   1篇
  1995年   1篇
排序方式: 共有61条查询结果,搜索用时 15 毫秒
1.
Online discussion threads are conversational cascades in the form of posted messages that can be generally found in social systems that comprise many-to-many interaction such as blogs, news aggregators or bulletin board systems. We propose a framework based on generative models of growing trees to analyse the structure and evolution of discussion threads. We consider the growth of a discussion to be determined by an interplay between popularity, novelty and a trend (or bias) to reply to the thread originator. The relevance of these features is estimated using a full likelihood approach and allows to characterise the habits and communication patterns of a given platform and/or community. We apply the proposed framework on four popular websites: Slashdot, Barrapunto (a Spanish version of Slashdot), Meneame (a Spanish Digg-clone) and the article discussion pages of the English Wikipedia. Our results provide significant insight into understanding how discussion cascades grow and have potential applications in broader contexts such as community management or design of communication platforms.  相似文献   
2.
We study central-place foraging patterns of Aphaenogaster senilis ants at a population level by video framing individual ant trajectories in a circular arena with a nest connected to its centre. The ants naturally leave and enter the nest and forage generating non-trivial movement patterns around the nest. Our data analysis indicated that the trajectories observed can be classified into two strategies: the risk-averse strategy, which involves wandering around the nest without departing far from it and the risk-prone strategy, which involves long exploration paths with periodic returns to the central region, nearby the nest. We found that both risk-prone and risk-averse strategies exhibit qualitatively the same reorientation patterns, with the time between consecutive reorientations covering a wide range of scales, and fitting a stretched exponential function. Nevertheless, differences in the temporal scales and the time variability of such reorientation events differ, together with other aspects of motion, such as average speed and turns. Our results give experimental evidence that the internal mechanisms driving reorientations in ants tend to favour frequently long relocations, as theory predicts for efficient exploration in patchy landscapes, but ants engaged in central-place foraging can modulate such behaviour to control distances from the nest. Previous works on the species support the idea that risk-prone and risk-averse strategies may reflect actual differences between individuals age and experience; these factors (age and experience) should be then relevant in modulating the internal reorientation clocks. To support the validity of our findings, we develop a random-walk model combining stretched exponential reorientation clocks with klinokinesis that fits the time length and the travelled distance distributions of the observed trajectories.  相似文献   
3.
In this paper, we review the role of information fusion in data privacy. To that end, we introduce data privacy, and describe how information and data fusion are used in some fields of data privacy. Our study is focused on the use of aggregation for privacy protections, and record linkage techniques.  相似文献   
4.
In this paper, an active fault-tolerant control scheme is proposed in the case of actuator faults. In particular, the general idea of integrating fault identification and control schemes, which takes into account the fault estimation error is first presented in a linear context. As a result, the so-called separation principle for the controller and the fault identification scheme is developed. Subsequently, the proposed approach is extended to a class of non-linear systems. Similarly to the linear case, it is proven that using a suitable control strategy and a faulty identification scheme it is possible to obtain an integrated fault-tolerant control framework, which takes into account the fault identification error. As a result, a non-linear counterpart of the above-mentioned separation principle is developed. Finally, the last part of the paper shows the application results obtained using a twin-rotor system that confirm the high performance of the proposed approach.  相似文献   
5.
6.
International Journal of Information Security - The introduction of advanced metering infrastructure (AMI) smart meters has given rise to fine-grained electricity usage data at different levels of...  相似文献   
7.
International Journal of Information Security - In this paper, we present an unified framework that encompasses both particle swarm optimization (PSO) and federated learning (FL). This unified...  相似文献   
8.
Assigning p values to all transitions in a matrix based on their z scores is problematic on 2 counts: The z scores may not be normally distributed, and transitions are interconnected. Permutation tests, which require far fewer assumptions, are an attractive alternative to the standard asymptotic methods for assigning significance. Moreover, when asymptotic z scores are only somewhat above their critical value and sequences are short, often the exact probabilities of permutation tests are not less than .05. Log-linear and permutation methods may be used to winnow the set of transitions initially identified as significant even further. A computer program that performs these tests is available from the authors. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
9.
The problem of anonymization in large networks and the utility of released data are considered in this paper. Although there are some anonymization methods for networks, most of them cannot be applied in large networks because of their complexity. In this paper, we devise a simple and efficient algorithm for k-degree anonymity in large networks. Our algorithm constructs a k-degree anonymous network by the minimum number of edge modifications. We compare our algorithm with other well-known k-degree anonymous algorithms and demonstrate that information loss in real networks is lowered. Moreover, we consider the edge relevance in order to improve the data utility on anonymized networks. By considering the neighbourhood centrality score of each edge, we preserve the most important edges of the network, reducing the information loss and increasing the data utility. An evaluation of clustering processes is performed on our algorithm, proving that edge neighbourhood centrality increases data utility. Lastly, we apply our algorithm to different large real datasets and demonstrate their efficiency and practical utility.  相似文献   
10.
This paper proposes to design an unknown input observer (UIO) for the linear‐parameter‐varying (LPV) system on the basis of the set theory, which is named as the set‐theoretic UIO (SUIO). The advantage of the SUIO consists in that it combines active and passive approaches to obtain robustness in state estimation (SE) and fault detection (FD). The active approach is based on the use of UIO to decouple unknown inputs, while the passive approach is based on the set theory to bound uncertain factors that cannot be actively decoupled. As a result, the effect of both unknown inputs (process disturbances, modeling errors, etc.) and measurement noises can be appropriately handled in the residual signals compared with the standard UIO‐based SE and FD approaches. The design of SUIO can overcome the limitations of the traditional UIO design conditions, which can significantly broaden the application of the UIO‐based SE and FD theory. Moreover, this paper proposes a generalized framework that can provide more flexibility in the design of SUIO guaranteeing their stability by means of a group of matrix inequalities. Because the LPV system uses a collection of online obtainable scheduling variables to embed nonlinearities, the design of SUIO for the LPV system can be used to address the SE and FD problems of nonlinear systems. At the end of this paper, two case studies are used to illustrate the effectiveness of the proposed approach. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号