全文获取类型
收费全文 | 190篇 |
免费 | 3篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 2篇 |
综合类 | 1篇 |
化学工业 | 15篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 4篇 |
能源动力 | 2篇 |
轻工业 | 8篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 40篇 |
一般工业技术 | 34篇 |
冶金工业 | 24篇 |
自动化技术 | 58篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 2篇 |
2020年 | 10篇 |
2019年 | 2篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2016年 | 6篇 |
2015年 | 6篇 |
2014年 | 3篇 |
2013年 | 7篇 |
2012年 | 14篇 |
2011年 | 11篇 |
2010年 | 12篇 |
2009年 | 9篇 |
2008年 | 11篇 |
2007年 | 15篇 |
2006年 | 5篇 |
2005年 | 1篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 5篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1970年 | 1篇 |
排序方式: 共有196条查询结果,搜索用时 15 毫秒
91.
Objective Electromechanical devices enable increased accuracy in surgical procedures, and the recent development of MRI-compatible mechatronics
permits the use of MRI for real-time image guidance. Integrated imaging of resonant micro-coil fiducials provides an accurate
method of tracking devices in a scanner with increased flexibility compared to gradient tracking. Here we report on the ability
of ten different image-processing algorithms to track micro-coil fiducials with sub-pixel accuracy.
Materials and methods Five algorithms: maximum pixel, barycentric weighting, linear interpolation, quadratic fitting and Gaussian fitting were applied both directly to the pixel intensity matrix and to the cross-correlation matrix obtained by 2D convolution with
a reference image.
Results Using images of a 3 mm fiducial marker and a pixel size of 1.1 mm, intensity linear interpolation, which calculates the position of the fiducial centre by interpolating the pixel data to find the fiducial edges, was found
to give the best performance for minimal computing power; a maximum error of 0.22 mm was observed in fiducial localisation
for displacements up to 40 mm. The inherent standard deviation of fiducial localisation was 0.04 mm.
Conclusion This work enables greater accuracy to be achieved in passive fiducial tracking. 相似文献
92.
We consider the distributed complexity of the stable matching problem (a.k.a. “stable marriage”). In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of unmatched nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable matching problem requires ${\Omega(\sqrt{n/B\log n})}We consider the distributed complexity of the stable matching problem (a.k.a. “stable marriage”). In this problem, the communication
graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of unmatched nodes
is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any
blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find
a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable matching problem requires W(?{n/Blogn}){\Omega(\sqrt{n/B\log n})} communication rounds in the worst case, even for graphs of diameter O(log n), where n is the number of nodes in the graph. Furthermore, the lower bound holds even if we allow the output to contain O(?n){O(\sqrt n)} blocking pairs, and if a pair is considered blocking only if they like each other much more then their assigned match. 相似文献
93.
This paper considers the problem of distributively constructing a minimum-weight spanning tree (MST) for graphs of constant
diameter in the bounded-messages model, where each message can contain at most B bits for some parameter B. It is shown that the number of communication rounds necessary to compute an MST for graphs of diameter 4 or 3 can be as
high as
and
, respectively. The asymptotic lower bounds hold for randomized algorithms as well. On the other hand, we observe that O(log n) communication rounds always suffice to compute an MST deterministically for graphs with diameter 2, when B = O(log n). These results complement a previously known lower bound of
for graphs of diameter Ω(log n).
An extended abstract of this work appears in Proceedings of 20th ACM Symposium on Principles of Distributed Computing, August
2001. 相似文献
94.
Constantine Robert J.; Petrila John; Andel Ross; Givens Eugena M.; Becker Marion; Robst John; Van Dorn Richard; Boaz Tim; Teague Greg; Haynes Diane; Howe Andrew 《Canadian Metallurgical Quarterly》2010,16(4):319
We examined patterns and correlates of arrest/re-arrests among offenders with a serious mental illness over a 4-year period. County criminal justice records and health and social service datasets were used to identify and describe inmates jailed in Pinellas County, Florida, between 7/03 and 6/04. A total of 3,769 participants (10.1% of arrestees) had a serious mental illness. Participants averaged 4.6 arrests (SD = 3.9, median = 4) and 150.6 days in jail (SD = 175.0, median = 90).Working from the trajectories of offending theory and literature we used latent class growth analysis to identify three classes of offenders with consistent numbers of arrests over a 4-year period and nearly parallel arrest trajectories; a sporadic arrest class (n = 469) with minimal arrests, a low arrest chronic class (n = 3,090, about one arrest/year); and a high arrest chronic class (n = 210, about four arrests/year). Analysis of arrests by age group within each of the classes suggested that for the low and high arrest chronic classes arrest rates persist throughout adult life. In multinomial logistic regression, homelessness, a co-occurring substance abuse diagnosis, fewer mental health outpatient service contacts and more mental health emergency room/inpatient contacts were associated with being in a class with more arrests. Arrests among offenders with a serious mental illness appear to be unusually high, to be firmly established in late adolescence and to persist over time. Successful strategies to reduce the arrest rates of this population must address the needs of these offenders early in their criminal careers. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
95.
When performing block-matching based motion estimation with the ML estimator, one would try to match blocks from the two images, within a predefined search area. The estimated motion vector is that which maximizes a likelihood function, formulated according to the image formation model. Two new maximum likelihood motion estimation schemes for ultrasound images are presented. The new likelihood functions are based on the assumption that both images are contaminated by a Rayleigh distributed multiplicative noise. The new approach enables motion estimation in cases where a noiseless reference image is not available. Experimental results show a motion estimation improvement with regards to other known ML estimation methods. 相似文献
96.
Given a terrain and a point p on or above it, we wish to compute the region R
p
that is visible from p. We present a generic radar-like algorithm for computing an approximation of R
p
. The algorithm interpolates the visible region between two consecutive rays (emanating from p) whenever the rays are close enough; that is, whenever the difference between the sets of visible segments along the cross sections in the directions specified
by the rays is below some threshold. Thus the density of the sampling by rays is sensitive to the shape of the visible region.
We suggest a specific way to measure the resemblance (difference) and to interpolate the visible region between two consecutive
rays. We also present an alternative algorithm, which uses circles of increasing radii centered at p instead of rays emanating from p. Both algorithms compute a representation of the (approximated) visible region that is especially suitable for is-visible-from-p queries, i.e., given a query point q on the terrain determine whether q is visible from p. Finally, we report on the experiments that we performed with these algorithms and with their corresponding fixed versions,
using a natural error measure. Our main conclusion is that the radar-like algorithm is significantly better than the others. 相似文献
97.
A highly accurate numerical scheme is presented for the Serre system of partial differential equations, which models the propagation of dispersive shallow water waves in the fully-nonlinear regime. The fully-discrete scheme utilizes the Galerkin / finite-element method based on smooth periodic splines in space, and an explicit fourth-order Runge–Kutta method in time. Computations compared with exact solitary and cnoidal wave solutions show that the scheme achieves the optimal orders of accuracy in space and time. These computations also show that the stability of this scheme does not impose very restrictive conditions on the temporal stepsize. In addition, solitary, cnoidal, and dispersive shock waves are studied in detail using this numerical scheme for the Serre system and compared with the ‘classical’ Boussinesq system for small-amplitude shallow water waves. The results show that the interaction of solitary waves in the Serre system is more inelastic. The efficacy of the numerical scheme for modeling dispersive shocks is shown by comparison with asymptotic results. These results have application to the modeling of shallow water waves of intermediate or large amplitude. 相似文献
98.
We consider scheduling information units called frames, each with a delivery deadline. Frames consist of packets, which arrive online in a roughly periodic fashion, and compete on allocation of transmission slots. A frame is deemed useful only if all its packets are delivered before its deadline. We focus on a “proportional” variant, where the value of each frame is proportional to its size, but the sizes and periods of the frames are arbitrary. We give a constant-competitive algorithm for this setting, assuming bounded jitter and some slack in the frames’ deadlines, the latter of which is necessary. Using standard techniques, our algorithm yields polylog-competitive algorithms for general instances with slack and bounded jitter. 相似文献
99.
We propose a goal programming framework that aims at automating e-commerce transactions. This framework consists of three
basic layers: deal definition—defining the deal’s parameters and associated constraints (e.g., item, price, delivery dates);
deal manipulation—a collection of procedures for shaping deals to attain desired goals (e.g., earliest delivery and minimum
price) and an applications layer that employs these procedures within some negotiations settings (e.g., an auction-related
application presents a “better offer” while bidding on a contract). Our proposed foundation is rich enough to support a wide
array of applications ranging from 1-1 and 1-n negotiations (auctions) to deal valuation and deal splitting. Whereas the techniques
are appropriate to a multitude of settings, we shall mainly present them in the context of business-to-business (B2B) commerce
where we see the greatest short term benefits.
O. Shmueli’s work is partially supported by the Fund for the Promotion of Research at the Technion. 相似文献
100.
Reports editorial errors in the original article by T. L. Boaz and D. R. Denney (Psychology and Aging, 1993[Jun], Vol 8[2], 294–300). A short segment of text was misplaced in the Results section; the corrected text is included. (The following abstract of this article originally appeared in record 1993-42036-001.) The nature of the search of primary memory by persons with a presumptive diagnosis of mild Alzheimer's disease (dementia of the Alzheimer type [DAT]) was compared with that of normal elderly and young persons using the S. Sternberg (1966) paradigm. DAT Ss evidenced a substantial deficit in the speed of scanning in primary memory and a deficit in at least one other stage of processing. These findings are consistent with the hypothesis that the decline in memory performance evidenced by persons with DAT may be attributable to an increase in the time requirements of mnemonic processing. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献