首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   489篇
  免费   15篇
工业技术   504篇
  2023年   6篇
  2022年   10篇
  2021年   13篇
  2020年   15篇
  2019年   14篇
  2018年   19篇
  2017年   20篇
  2016年   21篇
  2015年   13篇
  2014年   16篇
  2013年   40篇
  2012年   28篇
  2011年   42篇
  2010年   28篇
  2009年   35篇
  2008年   33篇
  2007年   30篇
  2006年   15篇
  2005年   11篇
  2004年   12篇
  2003年   11篇
  2002年   8篇
  2001年   7篇
  2000年   5篇
  1999年   10篇
  1998年   8篇
  1997年   2篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   5篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   4篇
  1982年   2篇
  1981年   1篇
  1978年   1篇
  1977年   1篇
排序方式: 共有504条查询结果,搜索用时 31 毫秒
1.
The perpetual energy production of a wind farm could be accomplished (under proper weather conditions) if no failures occurred. But even the best possible design, manufacturing, and maintenance of a system cannot eliminate the failure possibility. In order to understand and minimize the system failures, the most crucial components of the wind turbines, which are prone to failures, should be identified. Moreover, it is essential to determine and classify the criticality of the system failures according to the impact of these failure events on wind turbine safety. The present study is processing the failure data from a wind farm and uses the Fault Tree Analysis as a baseline for applying the Design Structure Matrix technique to reveal the failure and risk interactions between wind turbine subsystems. Based on the analysis performed and by introducing new importance measures, the “readiness to fail” of a subsystem in conjunction with the “failure riskiness” can determine the “failure criticality.” The value of the failure criticality can define the frame within which interventions could be done. The arising interventions could be applied either to the whole system or could be focused in specified pairs of wind turbine subsystems. In conclusion, the method analyzed in the present research can be effectively applied by the wind turbine manufacturers and the wind farm operators as an operation framework, which can lead to a limited (as possible) design‐out maintenance cost, failures' minimization, and safety maximization for the whole wind turbine system.  相似文献   
2.
This paper describes an efficient technique for the design of fault-secure VLSI circuits based on differential cascode voltage switch (DCVS) logic. We propose a new synthesis method for constructing DCVS circuits with a near-optimal transistor count based on binary decision diagrams (BDDs). the time and memory resources required are very low, making the technique practical even for PC-based synthesis tools. This method is the basis for a CAD tool that allows automatic synthesis of fault-secure circuits based on the DCVS technology. We finally present an improved design and implementation of a 2's complement serial/parallel multiplier as an application of the proposed technique and algorithm.  相似文献   
3.
4.
In multiview 3D TV, a pair of corresponding pixels in adjacent 2D views contributes to the reconstruction of voxels (3D pixels) in the 3D scene. We analyze this reconstruction process and determine the optimal pixel aspect ratio based on which the estimated object position can be improved given specific imaging or viewing configurations and constraints. By applying mathematical modeling, we deduce the optimal solutions for two general stereo configurations: parallel and with vergence. We theoretically show that for a given total resolution a finer horizontal resolution, compared to the usual uniform pixel distribution, in general, provides a better 3D visual experience for both configurations. The optimal value may vary depending on different configuration parameter values. We validate our theoretical results by conducting subjective studies using a set of simulated non-square discretized red–blue stereo pairs and show that human observers indeed have a better 3D viewing experience with an optimized vs. a non-optimized representation of 3D-models.  相似文献   
5.
We introduce a robust framework for learning and fusing of orientation appearance models based on both texture and depth information for rigid object tracking. Our framework fuses data obtained from a standard visual camera and dense depth maps obtained by low-cost consumer depth cameras such as the Kinect. To combine these two completely different modalities, we propose to use features that do not depend on the data representation: angles. More specifically, our framework combines image gradient orientations as extracted from intensity images with the directions of surface normals computed from dense depth fields. We propose to capture the correlations between the obtained orientation appearance models using a fusion approach motivated by the original Active Appearance Models (AAMs). To incorporate these features in a learning framework, we use a robust kernel based on the Euler representation of angles which does not require off-line training, and can be efficiently implemented online. The robustness of learning from orientation appearance models is presented both theoretically and experimentally in this work. This kernel enables us to cope with gross measurement errors, missing data as well as other typical problems such as illumination changes and occlusions. By combining the proposed models with a particle filter, the proposed framework was used for performing 2D plus 3D rigid object tracking, achieving robust performance in very difficult tracking scenarios including extreme pose variations.  相似文献   
6.
Present work deals with the incorporation of non-manual cues in automatic sign language recognition. More specifically, eye gaze, head pose, and facial expressions are discussed in relation to their grammatical and syntactic function and means of including them in the recognition phase are investigated. Computer vision issues related to extracting facial features, eye gaze, and head pose cues are presented and classification approaches for incorporating these non-manual cues into the overall Sign Language recognition architecture are introduced.  相似文献   
7.
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack.  相似文献   
8.
Query optimizers rely on statistical models that succinctly describe the underlying data. Models are used to derive cardinality estimates for intermediate relations, which in turn guide the optimizer to choose the best query execution plan. The quality of the resulting plan is highly dependent on the accuracy of the statistical model that represents the data. It is well known that small errors in the model estimates propagate exponentially through joins, and may result in the choice of a highly sub-optimal query execution plan. Most commercial query optimizers make the attribute value independence assumption: all attributes are assumed to be statistically independent. This reduces the statistical model of the data to a collection of one-dimensional synopses (typically in the form of histograms), and it permits the optimizer to estimate the selectivity of a predicate conjunction as the product of the selectivities of the constituent predicates. However, this independence assumption is more often than not wrong, and is considered to be the most common cause of sub-optimal query execution plans chosen by modern query optimizers. We take a step towards a principled and practical approach to performing cardinality estimation without making the independence assumption. By carefully using concepts from the field of graphical models, we are able to factor the joint probability distribution over all the attributes in the database into small, usually two-dimensional distributions, without a significant loss in estimation accuracy. We show how to efficiently construct such a graphical model from the database using only two-way join queries, and we show how to perform selectivity estimation in a highly efficient manner. We integrate our algorithms into the PostgreSQL DBMS. Experimental results indicate that estimation errors can be greatly reduced, leading to orders of magnitude more efficient query execution plans in many cases. Optimization time is kept in the range of tens of milliseconds, making this a practical approach for industrial-strength query optimizers.  相似文献   
9.
10.
In this article, a switching networked attitude controller for an unmanned quadrotor over a wireless sensor network is presented. To deal with the network induced time varying delays, the quadrotor is being modeled as a switching time varying linear system, while the applied switching output feedback control scheme, is calculated based on Linear Matrix Inequalities, and is able to guarantee the stability of the quadrotor under arbitrary changes in the time delays.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号