首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   190篇
  免费   3篇
  国内免费   3篇
电工技术   2篇
综合类   1篇
化学工业   15篇
金属工艺   2篇
机械仪表   3篇
建筑科学   4篇
能源动力   2篇
轻工业   8篇
水利工程   2篇
石油天然气   1篇
无线电   40篇
一般工业技术   34篇
冶金工业   24篇
自动化技术   58篇
  2024年   1篇
  2023年   1篇
  2022年   3篇
  2021年   2篇
  2020年   10篇
  2019年   2篇
  2018年   3篇
  2017年   4篇
  2016年   6篇
  2015年   6篇
  2014年   3篇
  2013年   7篇
  2012年   14篇
  2011年   11篇
  2010年   12篇
  2009年   9篇
  2008年   11篇
  2007年   15篇
  2006年   5篇
  2005年   1篇
  2004年   9篇
  2003年   4篇
  2002年   4篇
  2001年   5篇
  2000年   2篇
  1999年   3篇
  1998年   1篇
  1997年   4篇
  1996年   2篇
  1995年   5篇
  1994年   5篇
  1993年   3篇
  1992年   3篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   1篇
  1987年   3篇
  1986年   1篇
  1985年   2篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1974年   1篇
  1973年   2篇
  1970年   1篇
排序方式: 共有196条查询结果,搜索用时 15 毫秒
91.
Objective  Electromechanical devices enable increased accuracy in surgical procedures, and the recent development of MRI-compatible mechatronics permits the use of MRI for real-time image guidance. Integrated imaging of resonant micro-coil fiducials provides an accurate method of tracking devices in a scanner with increased flexibility compared to gradient tracking. Here we report on the ability of ten different image-processing algorithms to track micro-coil fiducials with sub-pixel accuracy. Materials and methods  Five algorithms: maximum pixel, barycentric weighting, linear interpolation, quadratic fitting and Gaussian fitting were applied both directly to the pixel intensity matrix and to the cross-correlation matrix obtained by 2D convolution with a reference image. Results  Using images of a 3 mm fiducial marker and a pixel size of 1.1 mm, intensity linear interpolation, which calculates the position of the fiducial centre by interpolating the pixel data to find the fiducial edges, was found to give the best performance for minimal computing power; a maximum error of 0.22 mm was observed in fiducial localisation for displacements up to 40 mm. The inherent standard deviation of fiducial localisation was 0.04 mm. Conclusion  This work enables greater accuracy to be achieved in passive fiducial tracking.  相似文献   
92.
We consider the distributed complexity of the stable matching problem (a.k.a. “stable marriage”). In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of unmatched nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable matching problem requires ${\Omega(\sqrt{n/B\log n})}We consider the distributed complexity of the stable matching problem (a.k.a. “stable marriage”). In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of unmatched nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable matching problem requires W(?{n/Blogn}){\Omega(\sqrt{n/B\log n})} communication rounds in the worst case, even for graphs of diameter O(log n), where n is the number of nodes in the graph. Furthermore, the lower bound holds even if we allow the output to contain O(?n){O(\sqrt n)} blocking pairs, and if a pair is considered blocking only if they like each other much more then their assigned match.  相似文献   
93.
This paper considers the problem of distributively constructing a minimum-weight spanning tree (MST) for graphs of constant diameter in the bounded-messages model, where each message can contain at most B bits for some parameter B. It is shown that the number of communication rounds necessary to compute an MST for graphs of diameter 4 or 3 can be as high as and , respectively. The asymptotic lower bounds hold for randomized algorithms as well. On the other hand, we observe that O(log n) communication rounds always suffice to compute an MST deterministically for graphs with diameter 2, when B = O(log n). These results complement a previously known lower bound of for graphs of diameter Ω(log n). An extended abstract of this work appears in Proceedings of 20th ACM Symposium on Principles of Distributed Computing, August 2001.  相似文献   
94.
We examined patterns and correlates of arrest/re-arrests among offenders with a serious mental illness over a 4-year period. County criminal justice records and health and social service datasets were used to identify and describe inmates jailed in Pinellas County, Florida, between 7/03 and 6/04. A total of 3,769 participants (10.1% of arrestees) had a serious mental illness. Participants averaged 4.6 arrests (SD = 3.9, median = 4) and 150.6 days in jail (SD = 175.0, median = 90).Working from the trajectories of offending theory and literature we used latent class growth analysis to identify three classes of offenders with consistent numbers of arrests over a 4-year period and nearly parallel arrest trajectories; a sporadic arrest class (n = 469) with minimal arrests, a low arrest chronic class (n = 3,090, about one arrest/year); and a high arrest chronic class (n = 210, about four arrests/year). Analysis of arrests by age group within each of the classes suggested that for the low and high arrest chronic classes arrest rates persist throughout adult life. In multinomial logistic regression, homelessness, a co-occurring substance abuse diagnosis, fewer mental health outpatient service contacts and more mental health emergency room/inpatient contacts were associated with being in a class with more arrests. Arrests among offenders with a serious mental illness appear to be unusually high, to be firmly established in late adolescence and to persist over time. Successful strategies to reduce the arrest rates of this population must address the needs of these offenders early in their criminal careers. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
95.
When performing block-matching based motion estimation with the ML estimator, one would try to match blocks from the two images, within a predefined search area. The estimated motion vector is that which maximizes a likelihood function, formulated according to the image formation model. Two new maximum likelihood motion estimation schemes for ultrasound images are presented. The new likelihood functions are based on the assumption that both images are contaminated by a Rayleigh distributed multiplicative noise. The new approach enables motion estimation in cases where a noiseless reference image is not available. Experimental results show a motion estimation improvement with regards to other known ML estimation methods.  相似文献   
96.
Given a terrain and a point p on or above it, we wish to compute the region R p that is visible from p. We present a generic radar-like algorithm for computing an approximation of R p . The algorithm interpolates the visible region between two consecutive rays (emanating from p) whenever the rays are close enough; that is, whenever the difference between the sets of visible segments along the cross sections in the directions specified by the rays is below some threshold. Thus the density of the sampling by rays is sensitive to the shape of the visible region. We suggest a specific way to measure the resemblance (difference) and to interpolate the visible region between two consecutive rays. We also present an alternative algorithm, which uses circles of increasing radii centered at p instead of rays emanating from p. Both algorithms compute a representation of the (approximated) visible region that is especially suitable for is-visible-from-p queries, i.e., given a query point q on the terrain determine whether q is visible from p. Finally, we report on the experiments that we performed with these algorithms and with their corresponding fixed versions, using a natural error measure. Our main conclusion is that the radar-like algorithm is significantly better than the others.  相似文献   
97.
A highly accurate numerical scheme is presented for the Serre system of partial differential equations, which models the propagation of dispersive shallow water waves in the fully-nonlinear regime. The fully-discrete scheme utilizes the Galerkin / finite-element method based on smooth periodic splines in space, and an explicit fourth-order Runge–Kutta method in time. Computations compared with exact solitary and cnoidal wave solutions show that the scheme achieves the optimal orders of accuracy in space and time. These computations also show that the stability of this scheme does not impose very restrictive conditions on the temporal stepsize. In addition, solitary, cnoidal, and dispersive shock waves are studied in detail using this numerical scheme for the Serre system and compared with the ‘classical’ Boussinesq system for small-amplitude shallow water waves. The results show that the interaction of solitary waves in the Serre system is more inelastic. The efficacy of the numerical scheme for modeling dispersive shocks is shown by comparison with asymptotic results. These results have application to the modeling of shallow water waves of intermediate or large amplitude.  相似文献   
98.
We consider scheduling information units called frames, each with a delivery deadline. Frames consist of packets, which arrive online in a roughly periodic fashion, and compete on allocation of transmission slots. A frame is deemed useful only if all its packets are delivered before its deadline. We focus on a “proportional” variant, where the value of each frame is proportional to its size, but the sizes and periods of the frames are arbitrary. We give a constant-competitive algorithm for this setting, assuming bounded jitter and some slack in the frames’ deadlines, the latter of which is necessary. Using standard techniques, our algorithm yields polylog-competitive algorithms for general instances with slack and bounded jitter.  相似文献   
99.
We propose a goal programming framework that aims at automating e-commerce transactions. This framework consists of three basic layers: deal definition—defining the deal’s parameters and associated constraints (e.g., item, price, delivery dates); deal manipulation—a collection of procedures for shaping deals to attain desired goals (e.g., earliest delivery and minimum price) and an applications layer that employs these procedures within some negotiations settings (e.g., an auction-related application presents a “better offer” while bidding on a contract). Our proposed foundation is rich enough to support a wide array of applications ranging from 1-1 and 1-n negotiations (auctions) to deal valuation and deal splitting. Whereas the techniques are appropriate to a multitude of settings, we shall mainly present them in the context of business-to-business (B2B) commerce where we see the greatest short term benefits. O. Shmueli’s work is partially supported by the Fund for the Promotion of Research at the Technion.  相似文献   
100.
Reports editorial errors in the original article by T. L. Boaz and D. R. Denney (Psychology and Aging, 1993[Jun], Vol 8[2], 294–300). A short segment of text was misplaced in the Results section; the corrected text is included. (The following abstract of this article originally appeared in record 1993-42036-001.) The nature of the search of primary memory by persons with a presumptive diagnosis of mild Alzheimer's disease (dementia of the Alzheimer type [DAT]) was compared with that of normal elderly and young persons using the S. Sternberg (1966) paradigm. DAT Ss evidenced a substantial deficit in the speed of scanning in primary memory and a deficit in at least one other stage of processing. These findings are consistent with the hypothesis that the decline in memory performance evidenced by persons with DAT may be attributable to an increase in the time requirements of mnemonic processing. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号