全文获取类型
收费全文 | 365篇 |
免费 | 27篇 |
国内免费 | 2篇 |
学科分类
工业技术 | 394篇 |
出版年
2023年 | 6篇 |
2022年 | 6篇 |
2021年 | 20篇 |
2020年 | 20篇 |
2019年 | 14篇 |
2018年 | 25篇 |
2017年 | 20篇 |
2016年 | 25篇 |
2015年 | 18篇 |
2014年 | 21篇 |
2013年 | 29篇 |
2012年 | 28篇 |
2011年 | 25篇 |
2010年 | 21篇 |
2009年 | 13篇 |
2008年 | 14篇 |
2007年 | 8篇 |
2006年 | 13篇 |
2005年 | 9篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 9篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1986年 | 1篇 |
1983年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有394条查询结果,搜索用时 281 毫秒
31.
Combination of multiple acoustic features has great potential to improve Automatic Speech Recognition (ASR) accuracy. Our
contribution in this research was to investigate one novel method when using voiced formants’ features in combination with
standard MFCC features in order to enhance TIMIT phone recognition. These voiced features provide accurate formants frequencies
using a Variable Order LPC Coding (VO-LPC) algorithm that was combined with continuity constraints. The overall estimating
formants were concatenated with MFCC features when a voiced frame could be detected. For feature-level combination, Heteroscedastic
Linear Discriminant Analysis (HLDA) based approach had been used successfully to find an optimal linear combination of successive
vectors of a single feature stream. 相似文献
32.
Mohamed Haouari Anis Gharbi Mahdi Jemmali 《International Transactions in Operational Research》2006,13(6):529-548
We address the problem of minimizing makespan on identical parallel machines. We propose new lower bounding strategies and heuristics for this fundamental scheduling problem. The lower bounds are based on the so‐called lifting procedure. In addition, two optimization‐based heuristics are proposed. These heuristics require iteratively solving a subset‐sum problem. We present the results of computational experiments that provide strong evidence that the new proposed lower and upper bounds consistently outperform the best bounds from the literature. 相似文献
33.
Rubiyah Yusof Marzuki Khalid Anis Salwa Mohd Khairuddin 《Machine Vision and Applications》2013,24(8):1589-1604
Classifying tropical wood species poses a considerable economic challenge and failure to classify the wood species accurately can have significant effects on timber industries. The problem of wood recognition is compounded with the nonlinearities of the features among the similar wood species. Besides that, large wood databases presented a problem of large processing time especially for online wood recognition system. In view of these problems, we propose the use of fuzzy logic-based pre-classifier as a means of treating uncertainty to improve the classification accuracy of tropical wood recognition system. The pre-classifier serve as a clustering mechanism for the large database simplifying the classification process making it more efficient. The use of the fuzzy logic-based pre-classifier has managed to increase the accuracy of the wood recognition system by 4 % and reduce the processing time for training and testing by more than 75 % and 26 % respectively. 相似文献
34.
Some recently developed methods for robust tracking control by model unfalsification require demanding computations with polytopes. This paper introduces a limited-complexity polytope updating technique that can be used with adaptive control schemes. The main result establishes the convergence of adaptive steady-state tracking performance to near the ideal robust performance. This result is extended to a robust control algorithm with limited-complexity polytope updating. 相似文献
35.
Anis Ben Aissa Robert K. Abercrombie Frederick T. Sheldon Ali Mili 《Information Systems and E-Business Management》2012,10(4):433-453
In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions. 相似文献
36.
Mohammad M. Dehghani Anis Ahmad Ronald L. Capelletti Sukesh Mahajan 《Journal of Materials Shaping Technology》1989,7(4):199-202
Cu/Y1Ba2Cu3O7?x superconducting composite wires have been fabricated using the powder-in-tube coextrusion process. Increase in load during the extrusion process seems to indicate that powder particles from the deformation zone of the die travel up toward the unextruded part of the billet and gradually increase the density in that part to some saturation value, which prohibits further extrusion at moderate to heavy applied load. A powder removal technique has been devised to perform full length extrusion under such conditions. Powder removal, however, is not required if the extrusion ratio is reduced sufficiently. The extrusion ratio that will give a full length extrusion without powder removal seems to be a function of starting billet length. Extrusion ratio of 2.52 gives smooth full length extrusions with 25.4 mm (1 in.) starting billet length at reasonable load values. Four probe resistivity and magnetic susceptibility measurements indicate a critical temperature (Tc) value of the formed wire to be close to 88 K. Density measurements using the volume displacement method indicate a value of 4.819 g/cm3, which is approximately 76.5% of the theoretical density. M.M. Dehghani and A. Ahmad are Assistant Professor and 相似文献
37.
Since the discovery of the electrochemical discharge phenomenon by Fizeau and Foucault, several contributions have expanded the wide range of applications associated with this high current density electrochemical process. The complexity of the phenomenon, from the macroscopic to the microscopic scales, led since then to experimental and theoretical studies from different research fields. This contribution reviews the chemical and electrochemical perspectives where a mechanistic model based on results from radiation chemistry of aqueous solutions is proposed. In addition applications to micro-machining and fabrication of nanoparticles are discussed. 相似文献
38.
39.
Anis Shuib Peter Hoskins William Easson 《Journal of Mechanical Science and Technology》2011,25(2):357-364
The particle distribution of a dilute solid-liquid suspension through a stenosed arterial geometry was investigated. Particle
image velocimetry (PIV) was used to determine the velocity as well as to acquire the flow images. The light intensity scattered
by particles was evaluated to determine the particle distribution. Flow separation exists where the flow emerges from the
stenosis throat. From the PIV images, the particle density distribution exhibited differing non-uniform characteristics which
vary with flow rate, particle size and particle concentration. At low flow rates, a particle-free layer is formed. As the
flow rate is increased, particles accumulate in concentric recirculation orbits within the downstream vortex. Particles with
larger size and higher concentration tend to accumulate more towards the center of the vortex. 相似文献
40.
Web caching has been the solution of choice to web latency problems. The efficiency of a Web cache is strongly affected by the replacement algorithm used to decide which objects to evict once the cache is saturated. Numerous web cache replacement algorithms have appeared in the literature. Despite their diversity, a large number of them belong to a class known as stack‐based algorithms. These algorithms are evaluated mainly via trace‐driven simulation. The very few analytical models reported in the literature were targeted at one particular replacement algorithm, namely least recently used (LRU) or least frequently used (LFU). Further they provide a formula for the evaluation of the Hit Ratio only. The main contribution of this paper is an analytical model for the performance evaluation of any stack‐based web cache replacement algorithm. The model provides formulae for the prediction of the object Hit Ratio, the byte Hit Ratio, and the delay saving ratio. The model is validated against extensive discrete event trace‐driven simulations of the three popular stack‐based algorithms, LRU, LFU, and SIZE, using NLANR and DEC traces. Results show that the analytical model achieves very good accuracy. The mean error deviation between analytical and simulation results is at most 6% for LRU, 6% for the LFU, and 10% for the SIZE stack‐based algorithms. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献