首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2794篇
  免费   61篇
  国内免费   10篇
工业技术   2865篇
  2023年   26篇
  2022年   57篇
  2021年   55篇
  2020年   49篇
  2019年   52篇
  2018年   64篇
  2017年   56篇
  2016年   81篇
  2015年   55篇
  2014年   66篇
  2013年   173篇
  2012年   89篇
  2011年   129篇
  2010年   106篇
  2009年   98篇
  2008年   101篇
  2007年   96篇
  2006年   92篇
  2005年   78篇
  2004年   59篇
  2003年   57篇
  2002年   67篇
  2001年   55篇
  2000年   63篇
  1999年   58篇
  1998年   118篇
  1997年   82篇
  1996年   85篇
  1995年   50篇
  1994年   49篇
  1993年   45篇
  1992年   46篇
  1991年   35篇
  1990年   40篇
  1989年   37篇
  1988年   31篇
  1987年   28篇
  1986年   27篇
  1985年   35篇
  1984年   21篇
  1983年   31篇
  1982年   27篇
  1981年   28篇
  1980年   27篇
  1979年   34篇
  1978年   16篇
  1977年   16篇
  1976年   22篇
  1975年   11篇
  1972年   10篇
排序方式: 共有2865条查询结果,搜索用时 15 毫秒
61.
62.
This article addresses the issue of visual landmark recognition in autonomous robot navigation along known routes, by intuitively exploiting the functions of the human visual system and its navigational ability. A feedforward–feedbackward architecture has been developed for recognising visual landmarks in real time. It integrates the theoretical concepts from the pre-attentive and attentive stages in the human visual system, the selective attention adaptive resonance theory neural network and its derivatives, and computational approaches towards object recognition in computer vision. The architecture mimics the pre-attentive and attentive stages in the context of object recognition, embedding neural network processing paradigm into a computational template-matching approach in computer vision. The real-time landmark recognition capability is achieved by mimicking the pre-attentive stage, where it models a selective attention mechanism for optimal computational resource allocation, focusing only on the regions of interest to address the computational restrictive nature of current computer processing power. Similarly, the recognition of visual landmarks in both clean and cluttered backgrounds is implemented in the attentive stage by developing a memory feedback modulation (MFM) mechanism that enables knowledge from the memory to interact and enhance the efficiency of earlier stages in the architecture. Furthermore, it also incorporates both top-down and bottom-up facilitatory and inhibition pathways between the memory and the earlier stages to enable the architecture to recognise a 2D landmark, which is partially occluded by adjacent features in the surroundings. The results show that the architecture is able to recognise objects in cluttered backgrounds using real-images in both indoor and outdoor scenes. Furthermore, the architecture application in autonomous robot navigation has been demonstrated through a number of real-time trials in both indoor and outdoor environments.  相似文献   
63.
Clubfoot is a challenging structural foot abnormality in babies and generally occurs at birth or during childhood. Due to this the abnormal posturing of the foot causes the babies to turn the ankle inward and walk along the outside edges of the foot. In medical science it is known as “congenital talipes equino varus” (CTEV). Computer modeling of prosthesis and orthosis is a perspective method for optimal design and gait is a terminology related to walking patterns of human subject.  相似文献   
64.
65.
We introduce the concert (or cafeteria) queueing problem: A finite but large number of customers arrive into a queueing system that starts service at a specified opening time. Each customer is free to choose her arrival time (before or after opening time), and is interested in early service completion with minimal wait. These goals are captured by a cost function which is additive and linear in the waiting time and service completion time, with coefficients that may be class dependent. We consider a fluid model of this system, which is motivated as the fluid-scale limit of the stochastic system. In the fluid setting, we explicitly identify the unique Nash-equilibrium arrival profile for each class of customers. Our structural results imply that, in equilibrium, the arrival rate is increasing up until the closing time where all customers are served. Furthermore, the waiting queue is maximal at the opening time, and monotonically decreases thereafter. In the simple single class setting, we show that the price of anarchy (PoA, the efficiency loss relative to the socially optimal solution) is exactly two, while in the multi-class setting we develop tight upper and lower bounds on the PoA. In addition, we consider several mechanisms that may be used to reduce the PoA. The proposed model may explain queueing phenomena in diverse settings that involve a pre-assigned opening time.  相似文献   
66.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
67.
68.
In this paper we consider uncountable classes recognizable by ω-automata and investigate suitable learning paradigms for them. In particular, the counterparts of explanatory, vacillatory and behaviourally correct learning are introduced for this setting. Here the learner reads in parallel the data of a text for a language L from the class plus an ω-index α and outputs a sequence of ω-automata such that all but finitely many of these ω-automata accept the index α if and only if α is an index for L.It is shown that any class is behaviourally correct learnable if and only if it satisfies Angluin’s tell-tale condition. For explanatory learning, such a result needs that a suitable indexing of the class is chosen. On the one hand, every class satisfying Angluin’s tell-tale condition is vacillatorily learnable in every indexing; on the other hand, there is a fixed class such that the level of the class in the hierarchy of vacillatory learning depends on the indexing of the class chosen.We also consider a notion of blind learning. On the one hand, a class is blind explanatorily (vacillatorily) learnable if and only if it satisfies Angluin’s tell-tale condition and is countable; on the other hand, for behaviourally correct learning, there is no difference between the blind and non-blind version.This work establishes a bridge between the theory of ω-automata and inductive inference (learning theory).  相似文献   
69.
Emergent semantics through interaction in image databases   总被引:9,自引:0,他引:9  
In this paper, we briefly discuss some aspects of image semantics and the role that it plays for the design of image databases. We argue that images don't have an intrinsic meaning, but that they are endowed with a meaning by placing them in the context of other images and by the user interaction. From this observation, we conclude that, in an image, database users should be allowed to manipulate not only the individual images, but also the relation between them. We present an interface model based on the manipulation of configurations of images  相似文献   
70.
Despite their widespread deployment, questions about electronic voting systems' performance emerge following many elections. To encourage full public confidence in the electoral process, some researchers recommend equipping electronic voting machines with voter-verifiable audit trails that print out paper records that voters can read and verify. In this article, the authors report on their analysis and testing of one US state's criteria for direct-recording electronic (DRE) voting machines equipped with voter-verified paper-record (VVPR) systems. The criteria and analysis cover various categories, including privacy, security, verification, integrity, functionality, and examination. The authors describe their testing methodologies, discuss issues exhibited by different voting systems, and propose solutions to address those issues.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号