首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1147篇
  免费   76篇
  国内免费   8篇
工业技术   1231篇
  2023年   10篇
  2022年   10篇
  2021年   31篇
  2020年   15篇
  2019年   25篇
  2018年   34篇
  2017年   30篇
  2016年   32篇
  2015年   21篇
  2014年   41篇
  2013年   59篇
  2012年   54篇
  2011年   98篇
  2010年   55篇
  2009年   49篇
  2008年   65篇
  2007年   56篇
  2006年   47篇
  2005年   31篇
  2004年   28篇
  2003年   37篇
  2002年   37篇
  2001年   27篇
  2000年   35篇
  1999年   31篇
  1998年   51篇
  1997年   47篇
  1996年   33篇
  1995年   14篇
  1994年   12篇
  1993年   16篇
  1992年   9篇
  1991年   3篇
  1990年   5篇
  1989年   7篇
  1988年   11篇
  1987年   8篇
  1986年   4篇
  1985年   10篇
  1984年   5篇
  1981年   1篇
  1980年   4篇
  1979年   1篇
  1978年   1篇
  1977年   7篇
  1976年   10篇
  1974年   7篇
  1973年   3篇
  1972年   1篇
  1957年   1篇
排序方式: 共有1231条查询结果,搜索用时 31 毫秒
21.
Supply chain management (SCM) is an important strategic tool that requires careful planning and management. While the availability of real-time information is a critical aspect of an SCM system, it possesses a potential to disrupt supply chain participants. Thus, the success of an SCM system hinges on how well participants deal with changes taking place in a real-time environment. This study adopts the concept of the real-time enterprise to understand the role of change management on SCM performance based on the concept of the information orientation. The study empirically validated the role of change management on SCM performance.  相似文献   
22.
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications.  相似文献   
23.
24.
25.
26.
Human Activity Recognition (HAR) is an active research area due to its applications in pervasive computing, human-computer interaction, artificial intelligence, health care, and social sciences. Moreover, dynamic environments and anthropometric differences between individuals make it harder to recognize actions. This study focused on human activity in video sequences acquired with an RGB camera because of its vast range of real-world applications. It uses two-stream ConvNet to extract spatial and temporal information and proposes a fine-tuned deep neural network. Moreover, the transfer learning paradigm is adopted to extract varied and fixed frames while reusing object identification information. Six state-of-the-art pre-trained models are exploited to find the best model for spatial feature extraction. For temporal sequence, this study uses dense optical flow following the two-stream ConvNet and Bidirectional Long Short Term Memory (BiLSTM) to capture long-term dependencies. Two state-of-the-art datasets, UCF101 and HMDB51, are used for evaluation purposes. In addition, seven state-of-the-art optimizers are used to fine-tune the proposed network parameters. Furthermore, this study utilizes an ensemble mechanism to aggregate spatial-temporal features using a four-stream Convolutional Neural Network (CNN), where two streams use RGB data. In contrast, the other uses optical flow images. Finally, the proposed ensemble approach using max hard voting outperforms state-of-the-art methods with 96.30% and 90.07% accuracies on the UCF101 and HMDB51 datasets.  相似文献   
27.
ManiWordle: providing flexible control over Wordle   总被引:1,自引:0,他引:1  
Among the multifarious tag-clouding techniques, Wordle stands out to the community by providing an aesthetic layout, eliciting the emergence of the participatory culture and usage of tag-clouding in the artistic creations. In this paper, we introduce ManiWordle, a Wordle-based visualization tool that revamps interactions with the layout by supporting custom manipulations. ManiWordle allows people to manipulate typography, color, and composition not only for the layout as a whole, but also for the individual words, enabling them to have better control over the layout result. We first describe our design rationale along with the interaction techniques for tweaking the layout. We then present the results both from the preliminary usability study and from the comparative study between ManiWordle and Wordle. The results suggest that ManiWordle provides higher user satisfaction and an efficient method of creating the desired "art work," harnessing the power behind the ever-increasing popularity of Wordle.  相似文献   
28.
In this paper, we consider the problem of separation of unknown number of sources from their underdetermined convolutive mixtures via time-frequency (TF) masking. We propose two algorithms, one for the estimation of the masks which are to be applied to the mixture in the TF domain for the separation of signals in the frequency domain, and the other for solving the permutation problem. The algorithm for mask estimation is based on the concept of angles in complex vector space. Unlike the previously reported methods, the algorithm does not require any estimation of the mixing matrix or the source positions for mask estimation. The algorithm clusters the mixture samples in the TF domain based on the Hermitian angle between the sample vector and a reference vector using the well known k -means or fuzzy c -means clustering algorithms. The membership functions so obtained from the clustering algorithms are directly used as the masks. The algorithm for solving the permutation problem clusters the estimated masks by using k-means clustering of small groups of nearby masks with overlap. The effectiveness of the algorithm in separating the sources, including collinear sources, from their underdetermined convolutive mixtures obtained in a real room environment, is demonstrated.  相似文献   
29.
Information security management has become an important research issue in distributed systems, and the detection of failures is a fundamental issue for fault tolerance in large distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, similar to IP address lookup. However, this has not been successful so far; one of the reasons being the fact that classical failure detectors were not designed to satisfy several application requirements simultaneously. More specifically, traditional implementations of failure detectors are often tuned for running over local networks and fail to address some important problems found in wide-area distributed systems with a large number of monitored components, such as Grid systems. In this paper, we study the security management scheme for failure detector distributed systems. We first identify some of the most important QoS problems raised in the context of large wide-area distributed systems. Then we present a novel failure detector scheme combined with self-tuning control theory that can help in solving or optimizing some of these problems. Furthermore, this paper discusses the design and analysis of implementing a scalable failure detection service for such large wide-area distributed systems considering dynamically adjusting the heartbeat streams, so that it satisfies the bottleneck router requirements. The basic z-transformation stability test is used to achieve the stability criterion, which ensures the bounded rate allocation without steady state oscillation. We further show how the online failure detector control algorithm can be used to design a controller, analyze the theoretical aspects of the proposed algorithm and verify its agreement with the simulations in the LAN and WAN case. Simulation results show the efficiency of our scheme in terms of high utilization of the bottleneck link, fast response and good stability of the bottleneck router buffer occupancy as well as of the controlled sending rates. In conclusion, the new security management failure detector algorithm provides a better QoS than an algorithm that is proposed by Stelling et al. (Proceedings of 7th IEEE symposium on high performance distributed computing, pp. 268–278, 1998), Foster et al. (Int J Supercomput Appl, 2001).  相似文献   
30.
Firms that have implemented knowledge management initiatives are now interested in nurturing voluntary knowledge sharing organizations, called communities of practice (CoPs). Adopting the Triandis model on attitude formation, we identified and validated a set of organizational factors that was anticipated to have effects on knowledge sharing by CoP members such as perceived consequences, affect, social factors and facilitating conditions. One hundred and seventy-nine members from 70 CoPs of a large multinational electronics firm participated in this survey. Based on the PLS analysis, perceived consequences, affect, social factors, and facilitating conditions were found to significantly affect knowledge sharing in CoPs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号