首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   583篇
  免费   43篇
  国内免费   3篇
工业技术   629篇
  2024年   3篇
  2023年   18篇
  2022年   58篇
  2021年   42篇
  2020年   49篇
  2019年   32篇
  2018年   51篇
  2017年   48篇
  2016年   39篇
  2015年   24篇
  2014年   33篇
  2013年   46篇
  2012年   35篇
  2011年   28篇
  2010年   28篇
  2009年   18篇
  2008年   28篇
  2007年   17篇
  2006年   13篇
  2005年   7篇
  2004年   11篇
  2001年   1篇
排序方式: 共有629条查询结果,搜索用时 9 毫秒
1.
As transistor feature sizes continue to shrink intothe sub-90nm range and beyond, the effects of process variationson critical path delay and chip yields have amplified. A commonconcept to remedy the effects of variation is speed-binning, bywhich chips from a single batch are rated by a discrete range offrequencies and sold at different prices. In this paper, we discussstrategies to modify the number of chips in different bins andhence enhance the profits obtained from them. Particularly, wepropose a scheme that introduces a small Substitute Cacheassociated with each cache way to replicate the data elementsthat will be stored in the high latency lines. Assuming a fixedpricing model, this method increases the revenue by as much as13.8% without any impact on the performance of the chips.  相似文献   
2.
We propose a novel pose-invariant face recognition approach which we call Discriminant Multiple Coupled Latent Subspace framework. It finds the sets of projection directions for different poses such that the projected images of the same subject in different poses are maximally correlated in the latent space. Discriminant analysis with artificially simulated pose errors in the latent space makes it robust to small pose errors caused due to a subject’s incorrect pose estimation. We do a comparative analysis of three popular latent space learning approaches: Partial Least Squares (PLSs), Bilinear Model (BLM) and Canonical Correlational Analysis (CCA) in the proposed coupled latent subspace framework. We experimentally demonstrate that using more than two poses simultaneously with CCA results in better performance. We report state-of-the-art results for pose-invariant face recognition on CMU PIE and FERET and comparable results on MultiPIE when using only four fiducial points for alignment and intensity features.  相似文献   
3.
This paper presents a new loss function for neural network classification, inspired by the recently proposed similarity measure called Correntropy. We show that this function essentially behaves like the conventional square loss for samples that are well within the decision boundary and have small errors, and L0 or counting norm for samples that are outliers or are difficult to classify. Depending on the value of the kernel size parameter, the proposed loss function moves smoothly from convex to non-convex and becomes a close approximation to the misclassification loss (ideal 0–1 loss). We show that the discriminant function obtained by optimizing the proposed loss function in the neighborhood of the ideal 0–1 loss function to train a neural network is immune to overfitting, more robust to outliers, and has consistent and better generalization performance as compared to other commonly used loss functions, even after prolonged training. The results also show that it is a close competitor to the SVM. Since the proposed method is compatible with simple gradient based online learning, it is a practical way of improving the performance of neural network classifiers.  相似文献   
4.

Handwriting recognition is used for the prediction of various demographic traits such as age, gender, nationality, etc. Out of all the applications gender prediction is mainly admired topic among researchers. The relation between gender and handwriting can be seen from the physical appearance of the handwriting. This research work predicts gender from handwriting using the landmarks of differences between the two genders. We use the shape or visual appearance of the handwriting for extracting features of the handwriting such as slanteness (direction), area (no of pixels occupied by text), perimeter (length of edges), etc. Classification is carried out using the Support Vector Machine (SVM) as a classifier which transforms the nonlinear problem into linear using its kernel trick, logistic regression, KNN and at the end to enhance the classification rates we use Majority Voting. The experimental results obtained on a dataset of 282 writers with 2 samples per writer shows that the proposed method attains appealing performance on writer detection and text-independent environment.

  相似文献   
5.
Multibody System Dynamics - Collision between hard objects causes abrupt changes in the velocities of the system, which are characterized by very large contact forces over very small time...  相似文献   
6.
The ferroelectric liquid crystals, because of their fast electro‐optical response, are one of the most important classes of liquid crystals. Here, in this review, we have summarized the different electro‐optical modes for ferroelectric liquid crystals. Clark–Lagerwall effect (surface stabilized ferroelectric liquid crystal), deformed helix ferroelectric (DHF) effect, electrically suppressed helix (ESH) mode, DHF orientational Kerr effect, and ESH diffraction modes have been discussed. All of the crucial features, that is, optics, electro‐optics, dynamics, and their dependence on material parameters, operational regime, and applications, have been reviewed.  相似文献   
7.
8.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
9.
This article delves to study the effect of corrugated boundary surfaces on the propagation of horizontally-polarized shear waves (SH-waves) in a magnetoelastic transversely isotropic layer under a hydrostatic state of stress lying over an elastic half-space under gravity. A dispersion equation has been derived in closed-form and is found to be in good agreement to the classical Love-wave equation. The effect of magnetoelasticity, hydrostatic state of stress, gravity, corrugation, position parameter, and undulation on the phase velocity of the SH-wave has been identified. Numerical computation along with graphical demonstration has been carried out for cadmium, magnesium, and zinc materials of hexagonal symmetry to highlight some significant facts.  相似文献   
10.
Performance evaluation of mathematical expression recognition systems is attempted. The proposed method assumes expressions (input as well as recognition output) are coded following MathML or TEX/LaTEX (which also gets converted into MathML) format. Since any MathML representation follows a tree structure, evaluation of performance has been modeled as a tree-matching problem. The tree corresponding to the expression generated by the recognizer is compared with the groundtruthed one by comparing the corresponding Euler strings. The changes required to convert the tree corresponding to the expression generated by the recognizer into the groundtruthed one are noted. The number of changes required to make such a conversion is basically the distance between the trees. This distance gives the performance measure for the system under testing. The proposed algorithm also pinpoints the positions of the changes in the output MathML file. Testing of the proposed evaluation method considers a set of example groundtruthed expressions and their corresponding recognized results produced by an expression recognition system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号