首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   478篇
  免费   15篇
  国内免费   4篇
教育   297篇
科学研究   79篇
体育   47篇
综合类   41篇
信息传播   33篇
  2024年   1篇
  2023年   2篇
  2022年   7篇
  2021年   18篇
  2020年   20篇
  2019年   26篇
  2018年   13篇
  2017年   19篇
  2016年   12篇
  2015年   26篇
  2014年   42篇
  2013年   60篇
  2012年   37篇
  2011年   38篇
  2010年   29篇
  2009年   32篇
  2008年   22篇
  2007年   20篇
  2006年   10篇
  2005年   22篇
  2004年   11篇
  2003年   6篇
  2002年   6篇
  2001年   7篇
  1999年   3篇
  1998年   2篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
排序方式: 共有497条查询结果,搜索用时 15 毫秒
31.
在人体运动跟踪建模中,需要对样本集的多样性特征进行贫化处理,以提高全关节驱动模式运动状态跟踪的准确性。传统方法采用量子进化和粒子滤波算法进行人体运动跟踪贫化算法实现,算法在全关节多样化样本特征运动模式下,跟踪效果不好。提出一种采用动态分层二值进化处理的改进的量子进化粒子滤波全关节驱动模式跟踪方法,解决多样本特征的贫化问题。进行人体全关节驱动模式动力学分析及人体运动跟踪模型构建,通过动态分层处理技术,获得二值前景图像,求得人体关节的全方位信息特征,通过动态分层二值进化方法,准确地找到各关节位置,构建亮度模型函数,实现贫化处理。实验表明,改进算法能实现对体操运动员运动幅度大的肘、腕、踝部位均得到了准确的跟踪结果,贫化效果较好,运动状态估计精度较高。  相似文献   
32.
无线传感器网络WSN发射功率的优化调度是决定WSN使用寿命和提高WSN性能的关键,WSN路由节点的在进行数据转发时会导致热点随机扩散,发射功率无法难以实现最大化。提出一种基于路由热点循迹修正的WSN发射功率调度算法。设计了WSN节点路由热点循迹数据传输模型,对发射功率消耗能量模型采用一个高斯衰减信道建模,采用直线反馈线性化补偿方式对路由热点的偏移轨迹进行超负荷状态评估,采用贪婪算法生成一条多分簇路由链,对路由循迹轨迹进行修正,得到WSN优化发射功率的调度递推公式,实现能耗最佳的功率优化调度。实验结果表明,采用该优化调度方法,在准确实现热点循迹修正,传输功率较传统方法稳定,波动较小,WSN可靠性和生存性增强。  相似文献   
33.
The association between child sexual abuse (CSA) and risk for re-victimization is well-documented; however, less is known about the temporal progression of re-victimization experiences over the early life-course among CSA survivors, and whether this differs from that of those without known sexual abuse histories. This study investigated whether there are distinct temporal pathways of interpersonal re-victimization between the ages of 10–25 years among medically confirmed CSA cases, and considered whether abuse variables, re-victimization variables, and the presence of other adverse outcomes, were associated with heterogeneity in re-victimization pathways. The data were collected as part of a large-scale data-linkage study in which the medical records of 2759 cases of contact-CSA between 1964 and 1995 were linked, between 13 and 44 years following abuse, to police and public psychiatric databases; cases were compared to a matched community sample (n = 2677). Using a subsample of 510 (401 victims; 109 comparisons) individuals with an interpersonal (re)victimization history, we examined the aggregate ‘age-(re)victimization’ curves for CSA victims and comparisons, respectively. Further, we applied longitudinal latent class analysis to explore heterogeneity in re-victimization trajectories among abuse survivors across their early life-course. Four latent pathways were identified, labeled: Normative; Childhood-Limited; Emerging-Adulthood; and Chronic re-victimization trajectories. Older age at abuse, a criminal history, and mental health problems were uniquely predictive of membership to the more problematic and persistent re-victimization trajectories. Findings indicate that individuals exposed to CSA during adolescence may be particularly vulnerable to poorer re-victimization trajectories, characterized by multiple risk indices, and thus may warrant increased service provision.  相似文献   
34.
This paper examines some of the combinatorial issues associated with the batch data association problem arising in tracking and correlation applications. A procedure is developed that addresses a large class of data association problems involving the calculation of permanents of submatrices of the original association matrix. This procedure yields what is termed the Joint Assignment Matrix (JAM), which can be used to optimally rank associations for hypothesis selection. Because the computational cost of the permanent scales exponentially with the size of the matrix, improved algorithms are developed both for calculating the exact JAM and for generating approximations to it. Empirical results suggest that at least one of the approximations is suitable for real-time hypothesis generation in large scale tracking and correlation applications. Novel theoretical results include an improved upper bound on the calculation of the JAM and new upper bound inequalities for the permanent of general nonnegative matrices. One of these inequalities is an improvement over the best previously known inequality.  相似文献   
35.
In this paper, we propose a new language model, namely, a dependency structure language model, for topic detection and tracking (TDT) to compensate for weakness of unigram and bigram language models. The dependency structure language model is based on the Chow expansion theory and the dependency parse tree generated by a linguistic parser. So, long-distance dependencies can be naturally captured by the dependency structure language model. We carried out extensive experiments to verify the proposed model on topic tracking and link detection in TDT. In both cases, the dependency structure language models perform better than strong baseline approaches.  相似文献   
36.
分析了福岛核事故后信息跟踪的意义,简介了全球十大核事故,提出了核事故的信息收集与跟踪是辐射防护与核安全科研中的重要环节。  相似文献   
37.
文章针对目前互联网上科技信息需要定向追踪的需求,利用基于Web的信息采集技术,设计了一个基于B/S的高校科研信息采集系统,对科技管理人员所需科研信息进行自动采集、信息过滤和数据除重,帮助科研管理部门持续有效地捕获上级传达的科研信息,减轻工作人员重复查阅固定网站的负担。  相似文献   
38.
Rapid changes in digital consumer behaviour, influenced by exponential adoption of smartphones, require timely and sophisticated responses from retailers to these consumer needs. With a growing amount of big data available, fashion retailers need to innovate and develop more sophisticated analytics for new consumer behaviours such as m-commerce. This research has considered how Google Analytics data can be applied to develop customer journey maps to understand digital consumer behaviour. A multi-method research design was used, incorporating an innovative mobile eye tracking technology and mobile fashion consumer data from Google Analytics. Digital customers’ shopping journeys on the fashion retailer’s website were mapped using data sourced from eye tracking and Google Analytics, gathered in parallel. The comparison of these shopping journeys allowed a critical evaluation of the precision and usefulness of the Google Analytics database. Google Analytics tracked only half of the digital users’ activities, whereas eye tracking data documented digital consumers’ interaction with all elements of the fashion retailer’s website. The conclusion reached is that eye tracking can be used to audit the Google Analytics database for potential gaps in data and also to inform and improve marketing decision-making.  相似文献   
39.
针对目标跟踪中IVT(Incremental visual tracking)算法对遮挡问题比较敏感,1算法计算量大的缺点,将PCA(Principal Component Analysis)子空间假定为具有高斯噪声和拉普拉斯噪声,同时引入二进制值以排除遮挡因素,提出了基于最小软阈值和连续概率奇异值的目标跟踪算法。实验结果表明,新算法对光照、遮挡、尺度变化等因素具有较强的鲁棒性。  相似文献   
40.
从防止儿童被拐骗、监护儿童异常活动位置的角度出发,提出基于智能手机客户端与服务器的儿童定位追踪系统的物理架构、儿童客户端软件与监护者客户端软件的功能、服务器的体系结构等,并探讨该模式的系统应用方式。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号