全文获取类型
收费全文 | 211篇 |
免费 | 15篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 69篇 |
金属工艺 | 8篇 |
机械仪表 | 2篇 |
建筑科学 | 5篇 |
能源动力 | 19篇 |
轻工业 | 31篇 |
石油天然气 | 2篇 |
无线电 | 11篇 |
一般工业技术 | 38篇 |
冶金工业 | 16篇 |
自动化技术 | 24篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 4篇 |
2019年 | 1篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2016年 | 13篇 |
2015年 | 11篇 |
2014年 | 5篇 |
2013年 | 12篇 |
2012年 | 9篇 |
2011年 | 13篇 |
2010年 | 15篇 |
2009年 | 16篇 |
2008年 | 8篇 |
2007年 | 11篇 |
2006年 | 10篇 |
2005年 | 6篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 6篇 |
2001年 | 5篇 |
2000年 | 1篇 |
1999年 | 7篇 |
1998年 | 3篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 7篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有227条查询结果,搜索用时 15 毫秒
61.
This paper deals with the different meanings given to the concept of virtual organisation. A typology developed by Campbell, consisting of four forms of virtual organisation, is presented. We illustrate this categorisation with practical examples. We will explain why we use the term virtual organising rather than virtual organisation. Our conclusion is that organisations planning to go virtual have to make technological and organisational decisions that are intertwined at a strategic level, resulting in a specific sociotechnical configuration of virtual organising. 相似文献
62.
Rosenbaum David A.; Meulenbroek Ruud J.; Vaughan Jonathan; Jansen Chris 《Canadian Metallurgical Quarterly》2001,108(4):709
This article describes a model of motion planning instantiated for grasping. According to the model, one of the most important aspects of motion planning is establishing a constraint hierarchy—a set of prioritized requirements defining the task to be performed. For grasping, constraints include avoiding collisions with to-be-grasped objects and minimizing movement-related effort. These and other constraints are combined with instance retrieval (recall of stored postures) and instance generation (generation of new postures and movements to them) to simulate flexible prehension. Dynamic deadline setting is used to regulate termination of instance generation, and performance of more than one movement at a time with a single effector is used to permit obstacle avoidance. Old and new data are accounted for with the model. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
63.
Biometrics authentication offers many advantages over conventional authentication systems that rely on possessions or special knowledge. With conventional technology, often the mere possession of an employee ID card is proof of ID, while a password potentially can be used by large groups of colleagues for long times without change. The fact that biometrics authentication is non-repudiable (hard to refute) and, yet, convenient, is among its most important advantages. Biometrics systems, however, suffer from some inherent biometrics-specific security threats. These threats are mainly related to the use of digital signals and the need for additional input devices, though we also discuss brute-force attacks of biometrics systems. There are also problems common to any pattern recognition system. These include “wolves” and “lambs”, and a new group we call “chameleons”. An additional issue with the use of biometrics is the invasion of privacy because the user has to enroll with an image of a body part. We discuss these issues and suggest some methods for mitigating their impact. 相似文献
64.
Generating cancelable fingerprint templates 总被引:5,自引:0,他引:5
Ratha NK Chikkerur S Connell JH Bolle RM 《IEEE transactions on pattern analysis and machine intelligence》2007,29(4):561-572
Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key". The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments 相似文献
65.
Recent research has revealed that nonconscious activation of desired behavioral states--or behavioral goals--promotes motivational activity to accomplish these states. Six studies demonstrate that this nonconscious operation of behavioral goals emerges if mental representations of specific behavioral states are associated with positive affect. In an evaluative-conditioning paradigm, unobtrusive linking of behavioral states to positive, as compared with neutral or negative, affect increased participants' wanting to accomplish these states. Furthermore, participants worked harder on tasks that were instrumental in attaining behavioral states when these states were implicitly linked to positive affect, thereby mimicking the effects on motivational behavior of preexisting individual wanting and explicit goal instructions to attain the states. Together, these results suggest that positive affect plays a key role in nonconscious goal pursuit. Implications for behavior-priming research are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
66.
67.
68.
A revolution in molecular biological technology has allowed, for the first time, the study of pain at the level of the gene. The molecular genetic technique currently garnering the most interest is the use of transgenic mice that either overexpress, or do not express, presumably pain-related proteins. This paper reviews the findings of investigations in which a transgenic mouse has been assessed for nociceptive or analgesic sensitivity. As of this writing, 25 different kinds of mutant mice--lacking neurotrophins and their receptors, peripheral mediators of nociception and hyperalgesia, opioids and their receptors, non-opioid transmitter receptors, and intracellular molecules participating in signal transduction--have been produced and tested on behavioral assays of nociception. Results of these studies have been variously confirmatory, contradictory and enlightening compared to conventional investigations. The advantages and limitations of this approach to pain research are discussed. 相似文献
69.
High-accuracy spectral-slit-function calibration measurements, in situ ambient absorption gas cell measurements for ozone and nitrogen dioxide, and ground-based zenith sky measurements with the Earth Observing System Aura Ozone Monitoring Instrument (OMI) flight instrument are reported and the results discussed. For use of high-spectral-resolution gas absorption cross sections from the literature in trace gas retrieval algorithms, accurate determination of the instrument's spectral slit function is essential. Ground-based measurements of the zenith sky provide a geophysical determination of atmospheric trace gas abundances. When compared with other measurements, they can be used to verify the performance of the OMI flight instrument. We show that the approach of using published high-resolution absolute absorption cross sections convolved with accurately calibrated spectral slit functions for OMI compares well with in situ gas absorption cell measurements made with the flight instrument and that use of these convolved cross sections works well for reduction of zenith sky data taken with the OMI flight instrument for ozone and nitrogen dioxide that are retrieved from measured spectra of the zenith sky with the differential optical absorption spectroscopy technique, the same method to be used for the generation of in-flight data products. Finally, it is demonstrated that the spectral stability and signal-to-noise ratio performance of the OMI flight instrument, as determined from preflight component and full instrument tests, are sufficient to meet OMI mission objectives. 相似文献
70.
Lonneke Driessen Ruud Brekelmans Herbert Hamers Dick den Hertog 《Structural and Multidisciplinary Optimization》2006,31(1):40-48
Various sequential derivative-free optimization algorithms exist for solving black-box optimization problems. Two important
building blocks in these algorithms are the trust region and the geometry improvement. In this paper, we propose to incorporate
the D-optimality criterion, well known in the design of experiments, into these algorithms in two different ways. Firstly,
it is used to define a trust region that adapts its shape to the locations of the points in which the objective function has
been evaluated. Secondly, it is used to determine an optimal geometry-improving point. The proposed trust region and geometry
improvement can both be implemented into existing sequential algorithms. 相似文献