全文获取类型
收费全文 | 763篇 |
免费 | 55篇 |
国内免费 | 41篇 |
学科分类
工业技术 | 859篇 |
出版年
2024年 | 2篇 |
2023年 | 7篇 |
2022年 | 11篇 |
2021年 | 13篇 |
2020年 | 13篇 |
2019年 | 14篇 |
2018年 | 13篇 |
2017年 | 27篇 |
2016年 | 26篇 |
2015年 | 29篇 |
2014年 | 48篇 |
2013年 | 33篇 |
2012年 | 43篇 |
2011年 | 57篇 |
2010年 | 38篇 |
2009年 | 34篇 |
2008年 | 58篇 |
2007年 | 56篇 |
2006年 | 48篇 |
2005年 | 40篇 |
2004年 | 30篇 |
2003年 | 38篇 |
2002年 | 34篇 |
2001年 | 25篇 |
2000年 | 31篇 |
1999年 | 19篇 |
1998年 | 13篇 |
1997年 | 16篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
排序方式: 共有859条查询结果,搜索用时 46 毫秒
61.
With an increasing acceptance of Wireless Sensor Networks (WSNs), the health of individual sensor is becoming critical in identifying important events in the region of interest. One of the key challenges in detecting event in a WSN is how to detect it accurately transmitting minimum information providing sufficient details about the event. At the same time, it is also important to devise a strategy to handle multiple events occurring simultaneously. In this paper, we propose a Polynomial-based scheme that addresses these problems of Event Region Detection (PERD) by having a aggregation tree of sensor nodes. We employ a data aggregation scheme, TREG (proposed in our earlier work) to perform function approximation of the event using a multivariate polynomial regression. Only coefficients of the polynomial (P) are passed instead of aggregated data. PERD includes two components: event recognition and event report with boundary detection. This can be performed for multiple simultaneously occurring events. We also identify faulty sensor(s) using the aggregation tree. Performing further mathematical operations on the calculated P can identify the maximum (max) and minimum (min) values of the sensed attribute and their locations. Therefore, if any sensor reports a data value outside the [min, max] range, it can be identified as a faulty sensor. Since PERD is implemented over a polynomial tree on a WSN in a distributed manner, it is easily scalable and computation overhead is marginal. Results reveal that event(s) can be detected by PERD with error in detection remaining almost constant achieving a percentage error within a threshold of 10% with increase in communication range. Results also show that a faulty sensor can be detected with an average accuracy of 94% and it increases with increase in node density. 相似文献
62.
63.
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video
data that exists in today’s world of omnipresent surveillance video. Ideas and techniques for closing the semantic gap between
low-level machine readable features of video data and high-level events seen by a human observer are discussed. An evaluation
of the event classification and detection technique is presented and a future experiment to refine this technique is proposed.
These experiments are used as a lead to a discussion on the most optimal machine learning algorithm to learn the event representation
scheme proposed in this paper.
相似文献
Bhavani ThuraisinghamEmail: |
64.
65.
Events play many roles in computer systems, ranging from hardware interrupts, over event-based software architecture, to monitoring and managing of complex systems. In many applications, however, individual event occurrences are not the main point of concern, but rather the occurrences of certain event patterns. Such event patterns can be defined by means of an event algebra, i.e., expressions representing the patterns of interest are built from simple events and operators such as disjunction, sequence, etc.We propose a novel event algebra with intuitive operators (a claim which is supported by a number of algebraic properties). We also present an efficient detection algorithm that correctly detects any expression with bounded memory, which makes this algebra particularly suitable for resource-constrained applications such as embedded systems. 相似文献
66.
In the paper we present efficient algorithm for measurement and simultaneous compression of multidimensional symmetrical γ-ray histograms from event data streams. The compression of data volume is achieved due to both the symmetry of the γ-ray spectra and compression capabilities of the employed randomizing transform. The algorithm of compression is very fast. Acquired compressed data can be later processed in an interactive way. 相似文献
67.
机场供油系统是一种典型的排队服务系统。本文通过对单顾客流输入下五种情况的研究,分别建立了系统的仿真模型,提出了适合解决该问题的事件调度法与活动扫描法等两种仿真策略并给出了伪码算法。仿真实践表明,准确而全面的模型分析,对于后期开发仿真程序,优化系统性能是非常重要的。 相似文献
68.
69.
基于事件的发布-订阅系统模型 总被引:5,自引:0,他引:5
Internet的广泛应用已经改变了分布式系统的规模,使得传统的基于请求/应答的点对.点的同步通信已不能很好地满足大规模的动态分布式应用环境。为了加强大规模的分布式环境中实体之间的通信协作,系统要求更加灵活的通信模型,以反映应用的动态和非耦合特性。基于事件通信的中间件是建立大规模分布式系统的有效方式,发布者/订阅者(Publisher/subscriber)是目前广泛使用的基于事件的通信模型,支持发布者和订阅者之间在时间、空间和同步方面的非耦合以及多对多的通信模式,提供大规模系统所要求的交互间的松散耦合。本文详细阐述了事件系统的组成以及基于事件系统的PUB/SUB模型,提出了基于PUB/SUB的事件系统中间件的核心及实现的关键,这些中间件为大规模的分布式应用提供更多和更有力的保障。 相似文献
70.