全文获取类型
收费全文 | 489篇 |
免费 | 15篇 |
学科分类
工业技术 | 504篇 |
出版年
2023年 | 6篇 |
2022年 | 10篇 |
2021年 | 13篇 |
2020年 | 15篇 |
2019年 | 14篇 |
2018年 | 19篇 |
2017年 | 20篇 |
2016年 | 21篇 |
2015年 | 13篇 |
2014年 | 16篇 |
2013年 | 40篇 |
2012年 | 28篇 |
2011年 | 42篇 |
2010年 | 28篇 |
2009年 | 35篇 |
2008年 | 33篇 |
2007年 | 30篇 |
2006年 | 15篇 |
2005年 | 11篇 |
2004年 | 12篇 |
2003年 | 11篇 |
2002年 | 8篇 |
2001年 | 7篇 |
2000年 | 5篇 |
1999年 | 10篇 |
1998年 | 8篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 5篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有504条查询结果,搜索用时 31 毫秒
1.
The perpetual energy production of a wind farm could be accomplished (under proper weather conditions) if no failures occurred. But even the best possible design, manufacturing, and maintenance of a system cannot eliminate the failure possibility. In order to understand and minimize the system failures, the most crucial components of the wind turbines, which are prone to failures, should be identified. Moreover, it is essential to determine and classify the criticality of the system failures according to the impact of these failure events on wind turbine safety. The present study is processing the failure data from a wind farm and uses the Fault Tree Analysis as a baseline for applying the Design Structure Matrix technique to reveal the failure and risk interactions between wind turbine subsystems. Based on the analysis performed and by introducing new importance measures, the “readiness to fail” of a subsystem in conjunction with the “failure riskiness” can determine the “failure criticality.” The value of the failure criticality can define the frame within which interventions could be done. The arising interventions could be applied either to the whole system or could be focused in specified pairs of wind turbine subsystems. In conclusion, the method analyzed in the present research can be effectively applied by the wind turbine manufacturers and the wind farm operators as an operation framework, which can lead to a limited (as possible) design‐out maintenance cost, failures' minimization, and safety maximization for the whole wind turbine system. 相似文献
2.
Theodore Karoubalis Kostas Adaos George Ph. Alexiou Nick Kanopoulos 《International Journal of Circuit Theory and Applications》1995,23(6):587-598
This paper describes an efficient technique for the design of fault-secure VLSI circuits based on differential cascode voltage switch (DCVS) logic. We propose a new synthesis method for constructing DCVS circuits with a near-optimal transistor count based on binary decision diagrams (BDDs). the time and memory resources required are very low, making the technique practical even for PC-based synthesis tools. This method is the basis for a CAD tool that allows automatic synthesis of fault-secure circuits based on the DCVS technology. We finally present an improved design and implementation of a 2's complement serial/parallel multiplier as an application of the proposed technique and algorithm. 相似文献
3.
4.
Hossein Azari Irene Cheng Kostas Daniilidis Anup Basu 《Computer Vision and Image Understanding》2012,116(1):38-53
In multiview 3D TV, a pair of corresponding pixels in adjacent 2D views contributes to the reconstruction of voxels (3D pixels) in the 3D scene. We analyze this reconstruction process and determine the optimal pixel aspect ratio based on which the estimated object position can be improved given specific imaging or viewing configurations and constraints. By applying mathematical modeling, we deduce the optimal solutions for two general stereo configurations: parallel and with vergence. We theoretically show that for a given total resolution a finer horizontal resolution, compared to the usual uniform pixel distribution, in general, provides a better 3D visual experience for both configurations. The optimal value may vary depending on different configuration parameter values. We validate our theoretical results by conducting subjective studies using a set of simulated non-square discretized red–blue stereo pairs and show that human observers indeed have a better 3D viewing experience with an optimized vs. a non-optimized representation of 3D-models. 相似文献
5.
Ioannis Marras Georgios Tzimiropoulos Stefanos Zafeiriou Maja Pantic 《Image and vision computing》2014
We introduce a robust framework for learning and fusing of orientation appearance models based on both texture and depth information for rigid object tracking. Our framework fuses data obtained from a standard visual camera and dense depth maps obtained by low-cost consumer depth cameras such as the Kinect. To combine these two completely different modalities, we propose to use features that do not depend on the data representation: angles. More specifically, our framework combines image gradient orientations as extracted from intensity images with the directions of surface normals computed from dense depth fields. We propose to capture the correlations between the obtained orientation appearance models using a fusion approach motivated by the original Active Appearance Models (AAMs). To incorporate these features in a learning framework, we use a robust kernel based on the Euler representation of angles which does not require off-line training, and can be efficiently implemented online. The robustness of learning from orientation appearance models is presented both theoretically and experimentally in this work. This kernel enables us to cope with gross measurement errors, missing data as well as other typical problems such as illumination changes and occlusions. By combining the proposed models with a particle filter, the proposed framework was used for performing 2D plus 3D rigid object tracking, achieving robust performance in very difficult tracking scenarios including extreme pose variations. 相似文献
6.
George Caridakis Stylianos Asteriadis Kostas Karpouzis 《Personal and Ubiquitous Computing》2014,18(1):37-46
Present work deals with the incorporation of non-manual cues in automatic sign language recognition. More specifically, eye gaze, head pose, and facial expressions are discussed in relation to their grammatical and syntactic function and means of including them in the recognition phase are investigated. Computer vision issues related to extracting facial features, eye gaze, and head pose cues are presented and classification approaches for incorporating these non-manual cues into the overall Sign Language recognition architecture are introduced. 相似文献
7.
Marios Anagnostopoulos Georgios Kambourakis Stefanos Gritzalis 《International Journal of Information Security》2016,15(5):455-473
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack. 相似文献
8.
Kostas Tzoumas Amol Deshpande Christian S. Jensen 《The VLDB Journal The International Journal on Very Large Data Bases》2013,22(1):3-27
Query optimizers rely on statistical models that succinctly describe the underlying data. Models are used to derive cardinality estimates for intermediate relations, which in turn guide the optimizer to choose the best query execution plan. The quality of the resulting plan is highly dependent on the accuracy of the statistical model that represents the data. It is well known that small errors in the model estimates propagate exponentially through joins, and may result in the choice of a highly sub-optimal query execution plan. Most commercial query optimizers make the attribute value independence assumption: all attributes are assumed to be statistically independent. This reduces the statistical model of the data to a collection of one-dimensional synopses (typically in the form of histograms), and it permits the optimizer to estimate the selectivity of a predicate conjunction as the product of the selectivities of the constituent predicates. However, this independence assumption is more often than not wrong, and is considered to be the most common cause of sub-optimal query execution plans chosen by modern query optimizers. We take a step towards a principled and practical approach to performing cardinality estimation without making the independence assumption. By carefully using concepts from the field of graphical models, we are able to factor the joint probability distribution over all the attributes in the database into small, usually two-dimensional distributions, without a significant loss in estimation accuracy. We show how to efficiently construct such a graphical model from the database using only two-way join queries, and we show how to perform selectivity estimation in a highly efficient manner. We integrate our algorithms into the PostgreSQL DBMS. Experimental results indicate that estimation errors can be greatly reduced, leading to orders of magnitude more efficient query execution plans in many cases. Optimization time is kept in the range of tens of milliseconds, making this a practical approach for industrial-strength query optimizers. 相似文献
9.
10.
George Nikolakopoulos Kostas Alexis 《International Journal of Control, Automation and Systems》2013,11(2):389-397
In this article, a switching networked attitude controller for an unmanned quadrotor over a wireless sensor network is presented. To deal with the network induced time varying delays, the quadrotor is being modeled as a switching time varying linear system, while the applied switching output feedback control scheme, is calculated based on Linear Matrix Inequalities, and is able to guarantee the stability of the quadrotor under arbitrary changes in the time delays. 相似文献