首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   286篇
  免费   3篇
  国内免费   2篇
电工技术   4篇
综合类   1篇
化学工业   22篇
金属工艺   10篇
机械仪表   1篇
建筑科学   15篇
能源动力   1篇
轻工业   18篇
水利工程   1篇
无线电   22篇
一般工业技术   40篇
冶金工业   74篇
自动化技术   82篇
  2022年   3篇
  2021年   5篇
  2019年   5篇
  2018年   2篇
  2017年   7篇
  2016年   6篇
  2015年   7篇
  2014年   5篇
  2013年   10篇
  2012年   15篇
  2011年   11篇
  2010年   15篇
  2009年   14篇
  2008年   10篇
  2007年   6篇
  2006年   12篇
  2005年   10篇
  2004年   9篇
  2003年   8篇
  2002年   5篇
  2001年   5篇
  2000年   10篇
  1999年   15篇
  1998年   10篇
  1997年   9篇
  1996年   9篇
  1995年   4篇
  1994年   3篇
  1993年   5篇
  1992年   2篇
  1991年   3篇
  1990年   6篇
  1989年   4篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   7篇
  1984年   4篇
  1983年   4篇
  1982年   3篇
  1980年   3篇
  1978年   1篇
  1977年   3篇
  1976年   1篇
  1975年   3篇
  1974年   2篇
  1973年   1篇
  1972年   1篇
  1970年   1篇
  1969年   3篇
排序方式: 共有291条查询结果,搜索用时 828 毫秒
1.
A protocol for performance evaluation of line detection algorithms   总被引:4,自引:0,他引:4  
Accurate and efficient vectorization of line drawings is essential for any higher level processing in document analysis and recognition systems. In spite of the prevalence of vectorization and line detection methods, no standard for their performance evaluation protocol exists. We propose a protocol for evaluating both straight and circular line extraction to help compare, select, improve, and even design line detection algorithms to be incorporated into line drawing recognition and understanding systems. The protocol involves both positive and negative sets of indices, at pixel and vector levels. Time efficiency is also included in the protocol. The protocol may be extended to handle lines of any shape as well as other classes of graphic objects.  相似文献   
2.
This study addressed the issue of adjustment among Holocaust survivors by multidimensional assessment of subjective well-being (SWB). Participants were Israeli Holocaust survivors incidentally included in a life-span study (Group 1; n?=?466) or purposely approached for studying Holocaust survivors (Group 2; n?=?178). Comparison participants had immigrated to Israel before World War II, with their parents either undergoing (Group 3; n?=?270) or not undergoing the Holocaust (Group 4; n?=?388); other comparison participants had immigrated after the war with parents not undergoing the Holocaust (Group 5; n?=?166). Results showed that Group 1 scored lower than Group 2, mainly in positive affect. Group 1 scored lower than Group 4, and to a lesser extent also lower than Groups 3 and 5, mainly in aging-related themes of SWB. The study suggests that long-term effects of the Holocaust on the survivors' SWB are traceable but require a differential approach to the study groups and to the facets of SWB. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
In this article, we concern ourselves with massive traumatic events deliberately inflicted on individuals by fellow human beings. Specifically, we focus on the Holocaust and the fact that massive failure of the environment to mediate needs, as in genocide, will throw into question the existence of empathy, human communication, and ultimately ones own humanity, to which any mirroring ceases to exist. Such a life experience will represent, to the survivor of trauma, failure of a responsive empathic agent or function. Because it is precisely representations of need-satisfying interactions that provide the basis for links between personal existence and social connectedness, undermining the individual's representation of the need-mediating context will deconstruct the link between self and other. Destruction of the victim's representational matrix of interpersonal relatedness results in a vulnerability and loneliness in his or her internal world representation which is the sine qua non of man-made trauma. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
Current design of geosynthetic reinforced segmental retaining walls considers an a priori limitless length for reinforcement installation. Such length is typically 0.5–0.7 times the height of the wall. However, often there are constraints on such space; e.g., bedrock formation located at a small distance behind the facing. The objective of this note is to introduce a procedure for assessing the required long-term strength of the reinforcement while considering its limited length. Predictions by a conventional slope stability analysis were first checked against a continuum-mechanics based numerical analysis. Upon obtaining good agreement, a design chart was developed. The chart enables the determination of the reduction in the lateral earth pressure coefficient due to the constrained space. The revised earth pressure coefficient can be used with current analytical methods to account for the limited space. The results appear to be valid for conventional walls retaining a limited volume of soil. Comparison with limited experimental results for unreinforced backfill shows reasonably good agreement.  相似文献   
5.
Two studies explored how domestic violence may be implicitly or explicitly sanctioned and reinforced in cultures where honor is a salient organizing theme. Three general predictions were supported: (a) female infidelity damages a man's reputation, particularly in honor cultures; (b) this reputation can be partially restored through the use of violence; and (c) women in honor cultures are expected to remain loyal in the face of jealousy-related violence. Study 1 involved participants from Brazil (an honor culture) and the United States responding to written vignettes involving infidelity and violence in response to infidelity. Study 2 involved southern Anglo, Latino, and northern Anglo participants witnessing a "live" incident of aggression against a woman (actually a confederate) and subsequently interacting with her. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
In this paper, we propose a logic of argumentation for the specification and verification (LA4SV) of requirements on Dung??s abstract argumentation frameworks. We distinguish three kinds of decision problems for argumentation verification, called extension verification, framework verification, and specification verification respectively. For example, given a political requirement like ??if the argument to increase taxes is accepted, then the argument to increase services must be accepted too,?? we can either verify an extension of acceptable arguments, or all extensions of an argumentation framework, or all extensions of all argumentation frameworks satisfying a framework specification. We introduce the logic of argumentation verification to specify such requirements, and we represent the three verification problems of argumentation as model checking and theorem proving properties of the logic. Moreover, we recast the logic of argumentation verification in a modal framework, in order to express multiple extensions, and properties like transitivity and reflexivity of the attack relation. Finally, we introduce a logic of meta-argumentation where abstract argumentation is used to reason about abstract argumentation itself. We define the logic of meta-argumentation using the fibring methodology in such a way to represent attack relations not only among arguments but also among attacks. We show how to use this logic to verify the requirements of argumentation frameworks where higher-order attacks are allowed [A preliminary version of the logic of argumentation compliance was called the logic of abstract argumentation?(2005).]  相似文献   
7.
Autonomous manipulation in unstructured environments will enable a large variety of exciting and important applications. Despite its promise, autonomous manipulation remains largely unsolved. Even the most rudimentary manipulation task—such as removing objects from a pile—remains challenging for robots. We identify three major challenges that must be addressed to enable autonomous manipulation: object segmentation, action selection, and motion generation. These challenges become more pronounced when unknown man-made or natural objects are cluttered together in a pile. We present a system capable of manipulating unknown objects in such an environment. Our robot is tasked with clearing a table by removing objects from a pile and placing them into a bin. To that end, we address the three aforementioned challenges. Our robot perceives the environment with an RGB-D sensor, segmenting the pile into object hypotheses using non-parametric surface models. Our system then computes the affordances of each object, and selects the best affordance and its associated action to execute. Finally, our robot instantiates the proper compliant motion primitive to safely execute the desired action. For efficient and reliable action selection, we developed a framework for supervised learning of manipulation expertise. To verify the performance of our system, we conducted dozens of trials and report on several hours of experiments involving more than 1,500 interactions. The results show that our learning-based approach for pile manipulation outperforms a common sense heuristic as well as a random strategy, and is on par with human action selection.  相似文献   
8.
Data warehouse modeling is a complex task, which involves knowledge of business processes of the domain of discourse, understanding the structural and behavioral system's conceptual model, and familiarity with data warehouse technologies. The suitability of current data warehouse modeling methods for large-scale systems is questionable, as they require multiple manual actions to discover measures and relevant dimensional entities and they tend to disregard the system's dynamic aspects. We present an Object-process-based Data Warehouse Construction (ODWC) method that overcomes these limitations of existing methods by utilizing the operational system conceptual model to construct a corresponding data warehouse schema. We specify the ODWC method, apply it on a case study, evaluate it, and compare it to existing methods.  相似文献   
9.
Three experiments examined how norms characteristic of a "culture of honor" manifest themselves in the cognitions, emotions, behaviors, and physiological reactions of southern White males. Participants were University of Michigan students who grew up in the North or South. In 3 experiments, they were insulted by a confederate who bumped into the participant and called him an "asshole." Compared with northerners (who were relatively unaffected by the insult) southerners were more likely to think their masculine reputation was threatened, more upset (as shown by a rise in cortisol levels), more physiologically primed for aggression (as shown by a rise in testosterone levels), more cognitively primed for aggression, and more likely to engage in aggressive and dominant behavior. Findings highlight the insult–aggression cycle in cultures of honor, in which insults diminish a man's reputation and he tries to restore his status by aggressive or violent behavior. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
10.
From object-process analysis to object-process design   总被引:1,自引:1,他引:0  
The object-process methodology incorporates the system static-structural and dynamic-procedural aspects into a single, unified model. This unification bridges the gap that separates the static, object model from the dynamic, behavior, state, or function-oriented models found in many current object oriented methodologies. In this work we concentrate on the transition from object-process analysis to design within the development of information systems. We use a detailed case study as a running example throughout the paper to demonstrate how the structure-behavior unification, which characterizes object-process analysis, is carried on to object-process design. The case study first applies object-process analysis to perform the analysis stage. The sequence of steps that constitutes the design is then discussed and demonstrated through the case study. The design is divided into two phases: the analysis refinement phase and the implementation-dependent phase. Analysis refinement is concerned with adding details to the analysis results which are beyond the interest of the analysis itself, yet they are not related with a particular implementation. The implementation-dependent phase is concerned with code-level design, which takes place after specific implementation details, such as programming language, data organization, and user interface, have been made during the strategic design.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号