全文获取类型
收费全文 | 343篇 |
免费 | 8篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 39篇 |
金属工艺 | 1篇 |
机械仪表 | 6篇 |
建筑科学 | 10篇 |
矿业工程 | 1篇 |
能源动力 | 4篇 |
轻工业 | 13篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 49篇 |
一般工业技术 | 74篇 |
冶金工业 | 34篇 |
自动化技术 | 115篇 |
出版年
2023年 | 2篇 |
2022年 | 11篇 |
2021年 | 7篇 |
2020年 | 11篇 |
2019年 | 16篇 |
2018年 | 11篇 |
2017年 | 8篇 |
2016年 | 13篇 |
2015年 | 5篇 |
2014年 | 12篇 |
2013年 | 31篇 |
2012年 | 21篇 |
2011年 | 30篇 |
2010年 | 25篇 |
2009年 | 17篇 |
2008年 | 15篇 |
2007年 | 14篇 |
2006年 | 19篇 |
2005年 | 11篇 |
2004年 | 7篇 |
2003年 | 5篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 3篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有351条查询结果,搜索用时 0 毫秒
121.
Image alignment refers to finding the best transformation from a fixed reference image to a new image of a scene. This process is often optimizing a similarity measure between images, computed based on the image data. However, in time-critical applications state-of-the-art methods for computing similarity are too slow. Instead of using all the image data to compute similarity, one could use only a subset of pixels to improve the speed, but often this comes at the cost of reduced accuracy. These kinds of tradeoffs between the amount of computation and the accuracy of the result have been addressed in the field of real-time artificial intelligence as deliberation control problems. We propose that the optimization of a similarity measure is a natural application domain for deliberation control using the anytime algorithm framework. In this paper, we present anytime versions for the computation of two common image similarity measures: mean squared difference and mutual information. Off-line, we learn a performance profile specific to each measure, which is then used on-line to select the appropriate amount of pixels to process at each optimization step. When tested against existing techniques, our method achieves comparable quality and robustness with significantly less computation. 相似文献
122.
The same scene can be depicted by multiple visual media. For example, the same event can be captured by a comic image or a movie frame; the same object can be represented by a photograph or by a 3D computer graphics model. In order to extract the visual analogies that are at the heart of cross-media analysis, spatial matching is required. This matching is commonly achieved by extracting key points and scoring multiple, randomly generated mapping hypotheses. The more consensus a hypothesis can draw, the higher its score. In this paper, we go beyond the conventional set-size measure for the quality of a match and present a more general hypothesis score that attempts to reflect how likely is each hypothesized transformation to be the correct one for the matching task at hand. This is achieved by considering additional, contextual cues for the relevance of a hypothesized transformation. This context changes from one matching task to another and reflects different properties of the match, beyond the size of a consensus set. We demonstrate that by learning how to correctly score each hypothesis based on these features we are able to deal much more robustly with the challenges required to allow cross-media analysis, leading to correct matches where conventional methods fail. 相似文献
123.
Tal Moran 《Theoretical computer science》2010,411(10):1283-1310
In this article, we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes [such as in bit-commitment (BC) protocols] and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called “tamper-evident seals”. Another physical object with this property is the “scratch-off card”, often used in lottery tickets. We consider three variations of tamper-evident seals, and show that under some conditions they can be used to implement oblivious transfer, BC and coin flipping (CF). We also show a separation between the three models. One of our results is a strongly fair CF protocol with bias bounded by O(1/r) (where r is the number of rounds); this was a stepping stone towards achieving such a protocol in the standard model (in subsequent work). 相似文献
124.
To date, all published confirmations of the Pygmalion hypothesis among adults have involved men. The few studies among women have had methodological ambiguities. The authors conducted 2 experiments in the Israel Defense Forces to test the Pygmalion hypothesis among women. In both studies, the leaders were led to believe that the trainees randomly assigned to the Pygmalion condition had higher than usual potential. Experiment 1 tested the Pygmalion hypothesis among female officer cadets led by women. Although the treatment did raise expectations, none of the performance measures and none of the mediators or the moderators evidenced any expectancy effects. Experiment 2 tested the Pygmalion hypothesis among women and men taking the same course in gender-segregated platoons. The Pygmalion hypothesis was confirmed among men led by a man and among women led by a man but not among women led by a woman. The authors concluded that the Pygmalion effect can be produced among women but perhaps not by women. Pygmalion research among women leading men is now needed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
125.
This short paper focuses on an annual one-day conference that aims at exposing female high school students, who excel in mathematics, to the discipline of Electrical Engineering (EE). The findings presented in this short paper reinforce observations previously published at length in IEEE Transactions on Education. 相似文献
126.
针对目前有些企业在深化体制改革, 转换经营机制后仍存在以改代管, 以转代管, 忽视企业管理的片面做法, 指出转换经营机制, 建立现代企业制度是增强企业活力的必要条件, 实施科学管理则是企业生存和发展的基础。企业管理必须随着体制改革的深入发展而不断创新, 加强管理必须从更新观念, 完善法人治理结构, 大力培养管理人才, 建立以人为本的激励制度, 建立目标成本管理制度, 吸收和引进现代科学管理方法, 以及改革投资管理制度等方面着手。 相似文献
127.
128.
D Dayan A Kozlovsky H Tal N Kariv M Shemesh A Nyska 《Canadian Metallurgical Quarterly》1998,17(7):396-402
1. The purpose of this study was to investigate testosterone's role on the calcium channel antagonist oxodipine-inducing gingival hyperplasia in a dog model. 2. Two experiments were conducted using castrated and intact male dogs. Oxodipine was administered orally for 90 days, at a dose of 24 mg/kg/day. In the first experiment, the occurrence of gingival hyperplasia was evaluated. In the second, the gingival index (GI) and gingival hyperplasia index (GHI) were recorded and correlated with serum levels of testosterone. 3. A significant positive correlation between GI, GHI and plasma testosterone was noted. Castrated dogs were injected with testosterone, 4 months after the start of oxodipine treatment, while in the non-castrated dogs, administration of oxodipine was stopped. Castration correlated with lack of GH, while testosterone injection to the same dogs was associated with an increase of GI and GHI. 4. Since it is known that testosterone receptors are present in the gingiva, it is proposed that oxodipine-induced gingival hyperplasia could be mediated by the calcium channel blocker on plasma testosterone levels. 相似文献
129.
This study investigated the role that attachment style plays in preadolescent behavior in group counseling. The study population consisted of 77 preadolescents referred to counseling services in their schools in Israel. They were treated in 11 small counseling groups led by novice counselors. Variables included self-disclosure, client behavior in therapy, and responsiveness to other group members--all assessed based on transcribed sessions. Participants also completed attachment questionnaires. The analyses were performed with hierarchical modeling (mixed) nesting individuals within groups. Results indicated differences on all dependent variables among the three attachment styles: secure, preoccupied, and avoidant. Secure adolescents showed the highest rates of self-disclosure, productive client behavior, and responsiveness to others, whereas avoidant participants showed the lowest scores on all measures. Gender, age, and group size showed little effect. The discussion focuses on implications for group therapists. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
130.