全文获取类型
收费全文 | 286篇 |
免费 | 3篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 4篇 |
综合类 | 1篇 |
化学工业 | 22篇 |
金属工艺 | 10篇 |
机械仪表 | 1篇 |
建筑科学 | 15篇 |
能源动力 | 1篇 |
轻工业 | 18篇 |
水利工程 | 1篇 |
无线电 | 22篇 |
一般工业技术 | 40篇 |
冶金工业 | 74篇 |
自动化技术 | 82篇 |
出版年
2022年 | 3篇 |
2021年 | 5篇 |
2019年 | 5篇 |
2018年 | 2篇 |
2017年 | 7篇 |
2016年 | 6篇 |
2015年 | 7篇 |
2014年 | 5篇 |
2013年 | 10篇 |
2012年 | 15篇 |
2011年 | 11篇 |
2010年 | 15篇 |
2009年 | 14篇 |
2008年 | 10篇 |
2007年 | 6篇 |
2006年 | 12篇 |
2005年 | 10篇 |
2004年 | 9篇 |
2003年 | 8篇 |
2002年 | 5篇 |
2001年 | 5篇 |
2000年 | 10篇 |
1999年 | 15篇 |
1998年 | 10篇 |
1997年 | 9篇 |
1996年 | 9篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 7篇 |
1984年 | 4篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1978年 | 1篇 |
1977年 | 3篇 |
1976年 | 1篇 |
1975年 | 3篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1970年 | 1篇 |
1969年 | 3篇 |
排序方式: 共有291条查询结果,搜索用时 828 毫秒
1.
Accurate and efficient vectorization of line drawings is essential for any higher level processing in document analysis and
recognition systems. In spite of the prevalence of vectorization and line detection methods, no standard for their performance
evaluation protocol exists. We propose a protocol for evaluating both straight and circular line extraction to help compare,
select, improve, and even design line detection algorithms to be incorporated into line drawing recognition and understanding
systems. The protocol involves both positive and negative sets of indices, at pixel and vector levels. Time efficiency is
also included in the protocol. The protocol may be extended to handle lines of any shape as well as other classes of graphic
objects. 相似文献
2.
This study addressed the issue of adjustment among Holocaust survivors by multidimensional assessment of subjective well-being (SWB). Participants were Israeli Holocaust survivors incidentally included in a life-span study (Group 1; n?=?466) or purposely approached for studying Holocaust survivors (Group 2; n?=?178). Comparison participants had immigrated to Israel before World War II, with their parents either undergoing (Group 3; n?=?270) or not undergoing the Holocaust (Group 4; n?=?388); other comparison participants had immigrated after the war with parents not undergoing the Holocaust (Group 5; n?=?166). Results showed that Group 1 scored lower than Group 2, mainly in positive affect. Group 1 scored lower than Group 4, and to a lesser extent also lower than Groups 3 and 5, mainly in aging-related themes of SWB. The study suggests that long-term effects of the Holocaust on the survivors' SWB are traceable but require a differential approach to the study groups and to the facets of SWB. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
3.
In this article, we concern ourselves with massive traumatic events deliberately inflicted on individuals by fellow human beings. Specifically, we focus on the Holocaust and the fact that massive failure of the environment to mediate needs, as in genocide, will throw into question the existence of empathy, human communication, and ultimately ones own humanity, to which any mirroring ceases to exist. Such a life experience will represent, to the survivor of trauma, failure of a responsive empathic agent or function. Because it is precisely representations of need-satisfying interactions that provide the basis for links between personal existence and social connectedness, undermining the individual's representation of the need-mediating context will deconstruct the link between self and other. Destruction of the victim's representational matrix of interpersonal relatedness results in a vulnerability and loneliness in his or her internal world representation which is the sine qua non of man-made trauma. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
4.
Current design of geosynthetic reinforced segmental retaining walls considers an a priori limitless length for reinforcement installation. Such length is typically 0.5–0.7 times the height of the wall. However, often there are constraints on such space; e.g., bedrock formation located at a small distance behind the facing. The objective of this note is to introduce a procedure for assessing the required long-term strength of the reinforcement while considering its limited length. Predictions by a conventional slope stability analysis were first checked against a continuum-mechanics based numerical analysis. Upon obtaining good agreement, a design chart was developed. The chart enables the determination of the reduction in the lateral earth pressure coefficient due to the constrained space. The revised earth pressure coefficient can be used with current analytical methods to account for the limited space. The results appear to be valid for conventional walls retaining a limited volume of soil. Comparison with limited experimental results for unreinforced backfill shows reasonably good agreement. 相似文献
5.
Two studies explored how domestic violence may be implicitly or explicitly sanctioned and reinforced in cultures where honor is a salient organizing theme. Three general predictions were supported: (a) female infidelity damages a man's reputation, particularly in honor cultures; (b) this reputation can be partially restored through the use of violence; and (c) women in honor cultures are expected to remain loyal in the face of jealousy-related violence. Study 1 involved participants from Brazil (an honor culture) and the United States responding to written vignettes involving infidelity and violence in response to infidelity. Study 2 involved southern Anglo, Latino, and northern Anglo participants witnessing a "live" incident of aggression against a woman (actually a confederate) and subsequently interacting with her. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
6.
Serena Villata Guido Boella Dov M. Gabbay Leendert van der Torre Joris Hulstijn 《Annals of Mathematics and Artificial Intelligence》2012,66(1-4):199-230
In this paper, we propose a logic of argumentation for the specification and verification (LA4SV) of requirements on Dung??s abstract argumentation frameworks. We distinguish three kinds of decision problems for argumentation verification, called extension verification, framework verification, and specification verification respectively. For example, given a political requirement like ??if the argument to increase taxes is accepted, then the argument to increase services must be accepted too,?? we can either verify an extension of acceptable arguments, or all extensions of an argumentation framework, or all extensions of all argumentation frameworks satisfying a framework specification. We introduce the logic of argumentation verification to specify such requirements, and we represent the three verification problems of argumentation as model checking and theorem proving properties of the logic. Moreover, we recast the logic of argumentation verification in a modal framework, in order to express multiple extensions, and properties like transitivity and reflexivity of the attack relation. Finally, we introduce a logic of meta-argumentation where abstract argumentation is used to reason about abstract argumentation itself. We define the logic of meta-argumentation using the fibring methodology in such a way to represent attack relations not only among arguments but also among attacks. We show how to use this logic to verify the requirements of argumentation frameworks where higher-order attacks are allowed [A preliminary version of the logic of argumentation compliance was called the logic of abstract argumentation?(2005).] 相似文献
7.
Dov Katz Arun Venkatraman Moslem Kazemi J. Andrew Bagnell Anthony Stentz 《Autonomous Robots》2014,37(4):369-382
Autonomous manipulation in unstructured environments will enable a large variety of exciting and important applications. Despite its promise, autonomous manipulation remains largely unsolved. Even the most rudimentary manipulation task—such as removing objects from a pile—remains challenging for robots. We identify three major challenges that must be addressed to enable autonomous manipulation: object segmentation, action selection, and motion generation. These challenges become more pronounced when unknown man-made or natural objects are cluttered together in a pile. We present a system capable of manipulating unknown objects in such an environment. Our robot is tasked with clearing a table by removing objects from a pile and placing them into a bin. To that end, we address the three aforementioned challenges. Our robot perceives the environment with an RGB-D sensor, segmenting the pile into object hypotheses using non-parametric surface models. Our system then computes the affordances of each object, and selects the best affordance and its associated action to execute. Finally, our robot instantiates the proper compliant motion primitive to safely execute the desired action. For efficient and reliable action selection, we developed a framework for supervised learning of manipulation expertise. To verify the performance of our system, we conducted dozens of trials and report on several hours of experiments involving more than 1,500 interactions. The results show that our learning-based approach for pile manipulation outperforms a common sense heuristic as well as a random strategy, and is on par with human action selection. 相似文献
8.
Data warehouse modeling is a complex task, which involves knowledge of business processes of the domain of discourse, understanding the structural and behavioral system's conceptual model, and familiarity with data warehouse technologies. The suitability of current data warehouse modeling methods for large-scale systems is questionable, as they require multiple manual actions to discover measures and relevant dimensional entities and they tend to disregard the system's dynamic aspects. We present an Object-process-based Data Warehouse Construction (ODWC) method that overcomes these limitations of existing methods by utilizing the operational system conceptual model to construct a corresponding data warehouse schema. We specify the ODWC method, apply it on a case study, evaluate it, and compare it to existing methods. 相似文献
9.
Cohen Dov; Nisbett Richard E.; Bowdle Brian F.; Schwarz Norbert 《Canadian Metallurgical Quarterly》1996,70(5):945
Three experiments examined how norms characteristic of a "culture of honor" manifest themselves in the cognitions, emotions, behaviors, and physiological reactions of southern White males. Participants were University of Michigan students who grew up in the North or South. In 3 experiments, they were insulted by a confederate who bumped into the participant and called him an "asshole." Compared with northerners (who were relatively unaffected by the insult) southerners were more likely to think their masculine reputation was threatened, more upset (as shown by a rise in cortisol levels), more physiologically primed for aggression (as shown by a rise in testosterone levels), more cognitively primed for aggression, and more likely to engage in aggressive and dominant behavior. Findings highlight the insult–aggression cycle in cultures of honor, in which insults diminish a man's reputation and he tries to restore his status by aggressive or violent behavior. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
10.
From object-process analysis to object-process design 总被引:1,自引:1,他引:0
The object-process methodology incorporates the system static-structural and dynamic-procedural aspects into a single, unified model. This unification bridges the gap that separates the static, object model from the dynamic, behavior, state, or function-oriented models found in many current object oriented methodologies. In this work we concentrate on the transition from object-process analysis to design within the development of information systems. We use a detailed case study as a running example throughout the paper to demonstrate how the structure-behavior unification, which characterizes object-process analysis, is carried on to object-process design. The case study first applies object-process analysis to perform the analysis stage. The sequence of steps that constitutes the design is then discussed and demonstrated through the case study. The design is divided into two phases: the analysis refinement phase and the implementation-dependent phase. Analysis refinement is concerned with adding details to the analysis results which are beyond the interest of the analysis itself, yet they are not related with a particular implementation. The implementation-dependent phase is concerned with code-level design, which takes place after specific implementation details, such as programming language, data organization, and user interface, have been made during the strategic design. 相似文献