首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   618篇
  免费   29篇
  国内免费   1篇
电工技术   11篇
综合类   2篇
化学工业   90篇
金属工艺   7篇
机械仪表   9篇
建筑科学   28篇
矿业工程   2篇
能源动力   6篇
轻工业   73篇
水利工程   4篇
无线电   84篇
一般工业技术   122篇
冶金工业   69篇
自动化技术   141篇
  2024年   1篇
  2023年   5篇
  2022年   7篇
  2021年   11篇
  2020年   10篇
  2019年   10篇
  2018年   20篇
  2017年   27篇
  2016年   28篇
  2015年   21篇
  2014年   17篇
  2013年   39篇
  2012年   56篇
  2011年   58篇
  2010年   19篇
  2009年   23篇
  2008年   34篇
  2007年   41篇
  2006年   33篇
  2005年   26篇
  2004年   16篇
  2003年   15篇
  2002年   14篇
  2001年   6篇
  2000年   9篇
  1999年   4篇
  1998年   12篇
  1997年   21篇
  1996年   11篇
  1995年   11篇
  1994年   6篇
  1993年   3篇
  1992年   2篇
  1991年   5篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1977年   1篇
  1976年   3篇
  1970年   1篇
  1969年   1篇
排序方式: 共有648条查询结果,搜索用时 234 毫秒
11.
Tracking soft tissues in medical images using non-linear image registration algorithms requires methods that are fast and provide spatial transformations consistent with the biological characteristics of the tissues. LogDemons algorithm is a fast non-linear registration method that computes diffeomorphic transformations parameterised by stationary velocity fields. Although computationally efficient, its use for tissue tracking has been limited because of its ad-hoc Gaussian regularisation, which hampers the implementation of more biologically motivated regularisations. In this work, we improve the logDemons by integrating elasticity and incompressibility for soft-tissue tracking. To that end, a mathematical justification of demons Gaussian regularisation is proposed. Building on this result, we replace the Gaussian smoothing by an efficient elastic-like regulariser based on isotropic differential quadratic forms of vector fields. The registration energy functional is finally minimised under the divergence-free constraint to get incompressible deformations. As the elastic regulariser and the constraint are linear, the method remains computationally tractable and easy to implement. Tests on synthetic incompressible deformations showed that our approach outperforms the original logDemons in terms of elastic incompressible deformation recovery without reducing the image matching accuracy. As an application, we applied the proposed algorithm to estimate 3D myocardium strain on clinical cine MRI of two adult patients. Results showed that incompressibility constraint improves the cardiac motion recovery when compared to the ground truth provided by 3D tagged MRI.  相似文献   
12.
The shape of sedimentary particles is an important property, from which geographical hypotheses related to abrasion, distance of transport, river behavior, etc. can be formulated. In this paper, we use digital image analysis, especially discrete geometry, to automatically compute some shape parameters such as roundness, i.e. a measure of how much the corners and edges of a particle have been worn away.In contrast to previous work in which traditional digital images analysis techniques, such as Fourier transform, are used, we opted for a discrete geometry approach that allowed us to implement Wadell's original index, which is known to be more accurate, but more time consuming to implement in the field.Our implementation of Wadell's original index is highly correlated (92%) with the roundness classes of Krumbein's chart, used as a ground-truth. In addition, we show that other geometrical parameters, which are easier to compute, can be used to provide good approximations of roundness.We also used our shape parameters to study a set of pebbles digital images taken from the Progo basin river network (Indonesia). The results we obtained are in agreement with previous work and open new possibilities for geomorphologists thanks to automatic computation.  相似文献   
13.
Using a call-by-value functional language as an example, this article illustrates the use of coinductive definitions and proofs in big-step operational semantics, enabling it to describe diverging evaluations in addition to terminating evaluations. We formalize the connections between the coinductive big-step semantics and the standard small-step semantics, proving that both semantics are equivalent. We then study the use of coinductive big-step semantics in proofs of type soundness and proofs of semantic preservation for compilers. A methodological originality of this paper is that all results have been proved using the Coq proof assistant. We explain the proof-theoretic presentation of coinductive definitions and proofs offered by Coq, and show that it facilitates the discovery and the presentation of the results.  相似文献   
14.
We describe the research and the integration methods we developed to make the HRP-2 humanoid robot climb vertical industrial-norm ladders. We use our multi-contact planner and multi-objective closed-loop control formulated as a QP (quadratic program). First, a set of contacts to climb the ladder is planned off-line (automatically or by the user). These contacts are provided as an input for a finite state machine. The latter builds supplementary tasks that account for geometric uncertainties and specific grasps procedures to be added to the QP controller. The latter provides instant desired states in terms of joint accelerations and contact forces to be tracked by the embedded low-level motor controllers. Our trials revealed that hardware changes are necessary, and parts of software must be made more robust. Yet, we confirmed that HRP-2 has the kinematic and power capabilities to climb real industrial ladders, such as those found in nuclear power plants and large scale manufacturing factories (e.g. aircraft, shipyard) and construction sites.  相似文献   
15.
16.
We consider the problem of fitting a step function to a set of points. More precisely, given an integer k and a set P of n points in the plane, our goal is to find a step function f with k steps that minimizes the maximum vertical distance between f and all the points in P. We first give an optimal Θ(nlog n) algorithm for the general case. In the special case where the points in P are given in sorted order according to their x-coordinates, we give an optimal Θ(n) time algorithm. Then, we show how to solve the weighted version of this problem in time O(nlog 4 n). Finally, we give an O(nh 2log n) algorithm for the case where h outliers are allowed. The running time of all our algorithms is independent of k.  相似文献   
17.
This paper provides a formal connection between springs and continuum mechanics in the context of one-dimensional and two-dimensional elasticity. In the first stage, the equivalence between tensile springs and the finite element discretization of stretching energy of planar curves is established. Furthermore, when the strain is a quadratic function of stretch, this energy can be described with a new type of springs called tensile biquadratic springs. In the second stage, we extend this equivalence to nonlinear membranes (St Venant-Kirchhoff materials) on triangular meshes leading to triangular biquadratic and quadratic springs. Those tensile and angular springs produce isotropic deformations parameterized by Young modulus and Poisson ratios on unstructured meshes in an efficient and simple way. For a specific choice of the Poisson ratio, 1/3, we show that regular spring-mass models may be used realistically to simulate a membrane behavior. Finally, the different spring formulations are tested in pure traction and cloth simulation experiments.  相似文献   
18.
Behavioral detection differs from appearance detection in that it identifies the actions performed by the malware rather than syntactic markers. Identifying these malicious actions and interpreting their final purpose is a complex reasoning process. This paper draws up a survey of the different reasoning techniques deployed among the behavioral detectors. These detectors have been classified according to a new taxonomy introduced inside the paper. Strongly inspired from the domain of program testing, this taxonomy divides the behavioral detectors into two main families: simulation-based and formal detectors. Inside these families, ramifications are then derived according to the data collection mechanisms the data interpretation, the adopted model and its generation, and the decision support.  相似文献   
19.
Privacy and security solutions require today the protection of personal information so that it may not be disclosed to unauthorized participant for illegal purposes. It is a challenge to address these issues in networks with strong constraints such as Ad Hoc network. The security increase is often obtained with a quality of service (QoS) decrease. We propose in this paper a solution that provides at the anonymity, security to Ad Hoc network with a limited impact on QoS. This method could be efficient against some viral attacks. We also give some security proofs of our solution for Ad Hoc networks. The work of Hervé Aiache and Cédric Tavernier was supported by DISCREET, IST project no. 027679, funded in part by the European Commission’s Information Society Technology 6th Framework Programme.  相似文献   
20.
This paper reports the results of some further reflections by the writer on the nature of the flow physics in flooded channels where the floodplain flow overtops that in the main channel. A lot of the early conclusions drawn on this issue come from results of the Flood Channel Facility (FCF) program carried in the United Kingdom in the 1990s, but also from numerical work such as that of the writer. This paper takes this work further and reports that the FCF geometry may have led to conclusions that are dependent on a channel layout that is not fully representative of nature. It indicates that the flow structure evolves as a function of the channel width-to-depth ratio, and requires different turbulence model approaches to be computed accurately as this happens. In particular the standard k–ε is shown to become less adequate. It is also shown that the bank slope is influential in determining the flow structure, and that the flatter the slope the more likely it is to present increasing difficulties for modeling.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号