首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   211篇
  免费   15篇
  国内免费   1篇
电工技术   2篇
化学工业   69篇
金属工艺   8篇
机械仪表   2篇
建筑科学   5篇
能源动力   19篇
轻工业   31篇
石油天然气   2篇
无线电   11篇
一般工业技术   38篇
冶金工业   16篇
自动化技术   24篇
  2024年   1篇
  2023年   4篇
  2022年   1篇
  2021年   1篇
  2020年   4篇
  2019年   1篇
  2018年   3篇
  2017年   4篇
  2016年   13篇
  2015年   11篇
  2014年   5篇
  2013年   12篇
  2012年   9篇
  2011年   13篇
  2010年   15篇
  2009年   16篇
  2008年   8篇
  2007年   11篇
  2006年   10篇
  2005年   6篇
  2004年   5篇
  2003年   5篇
  2002年   6篇
  2001年   5篇
  2000年   1篇
  1999年   7篇
  1998年   3篇
  1997年   5篇
  1996年   6篇
  1995年   6篇
  1994年   2篇
  1993年   7篇
  1992年   1篇
  1991年   2篇
  1990年   3篇
  1989年   1篇
  1988年   3篇
  1987年   1篇
  1986年   3篇
  1985年   1篇
  1984年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有227条查询结果,搜索用时 15 毫秒
61.
This paper deals with the different meanings given to the concept of virtual organisation. A typology developed by Campbell, consisting of four forms of virtual organisation, is presented. We illustrate this categorisation with practical examples. We will explain why we use the term virtual organising rather than virtual organisation. Our conclusion is that organisations planning to go virtual have to make technological and organisational decisions that are intertwined at a strategic level, resulting in a specific sociotechnical configuration of virtual organising.  相似文献   
62.
This article describes a model of motion planning instantiated for grasping. According to the model, one of the most important aspects of motion planning is establishing a constraint hierarchy—a set of prioritized requirements defining the task to be performed. For grasping, constraints include avoiding collisions with to-be-grasped objects and minimizing movement-related effort. These and other constraints are combined with instance retrieval (recall of stored postures) and instance generation (generation of new postures and movements to them) to simulate flexible prehension. Dynamic deadline setting is used to regulate termination of instance generation, and performance of more than one movement at a time with a single effector is used to permit obstacle avoidance. Old and new data are accounted for with the model. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
63.
Biometrics authentication offers many advantages over conventional authentication systems that rely on possessions or special knowledge. With conventional technology, often the mere possession of an employee ID card is proof of ID, while a password potentially can be used by large groups of colleagues for long times without change. The fact that biometrics authentication is non-repudiable (hard to refute) and, yet, convenient, is among its most important advantages. Biometrics systems, however, suffer from some inherent biometrics-specific security threats. These threats are mainly related to the use of digital signals and the need for additional input devices, though we also discuss brute-force attacks of biometrics systems. There are also problems common to any pattern recognition system. These include “wolves” and “lambs”, and a new group we call “chameleons”. An additional issue with the use of biometrics is the invasion of privacy because the user has to enroll with an image of a body part. We discuss these issues and suggest some methods for mitigating their impact.  相似文献   
64.
Generating cancelable fingerprint templates   总被引:5,自引:0,他引:5  
Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key". The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments  相似文献   
65.
Recent research has revealed that nonconscious activation of desired behavioral states--or behavioral goals--promotes motivational activity to accomplish these states. Six studies demonstrate that this nonconscious operation of behavioral goals emerges if mental representations of specific behavioral states are associated with positive affect. In an evaluative-conditioning paradigm, unobtrusive linking of behavioral states to positive, as compared with neutral or negative, affect increased participants' wanting to accomplish these states. Furthermore, participants worked harder on tasks that were instrumental in attaining behavioral states when these states were implicitly linked to positive affect, thereby mimicking the effects on motivational behavior of preexisting individual wanting and explicit goal instructions to attain the states. Together, these results suggest that positive affect plays a key role in nonconscious goal pursuit. Implications for behavior-priming research are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
66.
67.
68.
A revolution in molecular biological technology has allowed, for the first time, the study of pain at the level of the gene. The molecular genetic technique currently garnering the most interest is the use of transgenic mice that either overexpress, or do not express, presumably pain-related proteins. This paper reviews the findings of investigations in which a transgenic mouse has been assessed for nociceptive or analgesic sensitivity. As of this writing, 25 different kinds of mutant mice--lacking neurotrophins and their receptors, peripheral mediators of nociception and hyperalgesia, opioids and their receptors, non-opioid transmitter receptors, and intracellular molecules participating in signal transduction--have been produced and tested on behavioral assays of nociception. Results of these studies have been variously confirmatory, contradictory and enlightening compared to conventional investigations. The advantages and limitations of this approach to pain research are discussed.  相似文献   
69.
Dobber M  Dirksen R  Voors R  Mount GH  Levelt P 《Applied optics》2005,44(14):2846-2856
High-accuracy spectral-slit-function calibration measurements, in situ ambient absorption gas cell measurements for ozone and nitrogen dioxide, and ground-based zenith sky measurements with the Earth Observing System Aura Ozone Monitoring Instrument (OMI) flight instrument are reported and the results discussed. For use of high-spectral-resolution gas absorption cross sections from the literature in trace gas retrieval algorithms, accurate determination of the instrument's spectral slit function is essential. Ground-based measurements of the zenith sky provide a geophysical determination of atmospheric trace gas abundances. When compared with other measurements, they can be used to verify the performance of the OMI flight instrument. We show that the approach of using published high-resolution absolute absorption cross sections convolved with accurately calibrated spectral slit functions for OMI compares well with in situ gas absorption cell measurements made with the flight instrument and that use of these convolved cross sections works well for reduction of zenith sky data taken with the OMI flight instrument for ozone and nitrogen dioxide that are retrieved from measured spectra of the zenith sky with the differential optical absorption spectroscopy technique, the same method to be used for the generation of in-flight data products. Finally, it is demonstrated that the spectral stability and signal-to-noise ratio performance of the OMI flight instrument, as determined from preflight component and full instrument tests, are sufficient to meet OMI mission objectives.  相似文献   
70.
Various sequential derivative-free optimization algorithms exist for solving black-box optimization problems. Two important building blocks in these algorithms are the trust region and the geometry improvement. In this paper, we propose to incorporate the D-optimality criterion, well known in the design of experiments, into these algorithms in two different ways. Firstly, it is used to define a trust region that adapts its shape to the locations of the points in which the objective function has been evaluated. Secondly, it is used to determine an optimal geometry-improving point. The proposed trust region and geometry improvement can both be implemented into existing sequential algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号