首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   135篇
  免费   8篇
电工技术   1篇
化学工业   16篇
金属工艺   1篇
建筑科学   3篇
能源动力   3篇
轻工业   8篇
水利工程   3篇
无线电   8篇
一般工业技术   26篇
冶金工业   11篇
原子能技术   1篇
自动化技术   62篇
  2023年   1篇
  2022年   2篇
  2021年   3篇
  2020年   2篇
  2019年   2篇
  2018年   7篇
  2017年   2篇
  2016年   6篇
  2015年   4篇
  2014年   9篇
  2013年   14篇
  2012年   8篇
  2011年   9篇
  2010年   9篇
  2009年   9篇
  2008年   5篇
  2007年   5篇
  2006年   11篇
  2005年   2篇
  2004年   2篇
  2003年   4篇
  2002年   5篇
  2001年   1篇
  2000年   2篇
  1999年   6篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1984年   1篇
  1977年   1篇
排序方式: 共有143条查询结果,搜索用时 15 毫秒
51.
52.
An experiment is reported that compared expandable indexes providing full menu context with sequential menus providing only partial context. Menu depth was varied using hierarchies of two, three and four levels deep in an asymmetric structure of 457 root level items. Menus were presented on the World Wide Web within a browser. Participants searched for specific targets. Results suggest that reducing the depth of hierarchies improves performance in terms of speed and search efficiency. Surprisingly, expandable indexes resulted in poorer performance with deeper hierarchies than did sequential menus.  相似文献   
53.
The purpose of this work is to apply an inverse boundary element formulation in order to develop efficient algorithms for identification of polarization curves in a cathodic protection system. The problem is to minimize an objective function measuring the difference between observed and BEM‐predicted surface potentials. The numerical formulation is based on the application of genetic algorithms, which are robust search techniques emulating the natural process of evolution as a means of progressing towards an optimum solution. Examples of application are included in the paper for different types of polarization curves in finite and infinite electrolytes. The accuracy and efficiency of the numerical results are verified by comparison with standard conjugate gradient techniques. As a result of this research, the genetic algorithm approach is shown to be more robust, independent of the position of the sensors and of initial guesses, and will be further developed for three‐dimensional applications. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
54.
Many advocate for artificial agents to be empathic. Crowdsourcing could help, by facilitating human-in-the-loop approaches and data set creation for visual emotion recognition algorithms. Although crowdsourcing has been employed successfully for a range of tasks, it is not clear how effective crowdsourcing is when the task involves subjective rating of emotions. We examined relationships between demographics, empathy, and ethnic identity in pain emotion recognition tasks. Amazon MTurkers viewed images of strangers in painful settings, and tagged subjects’ emotions. They rated their level of pain arousal and confidence in their responses, and completed tests to gauge trait empathy and ethnic identity. We found that Caucasian participants were less confident than others, even when viewing other Caucasians in pain. Gender correlated to word choices for describing images, though not to pain arousal or confidence. The results underscore the need for verified information on crowdworkers, to harness diversity effectively for metadata generation tasks.  相似文献   
55.
Bedload Transport in Gravel-Bed Streams with Unimodal Sediment   总被引:1,自引:0,他引:1  
Bedload transport in many gravel-bed streams becomes highly complicated because of the nonuniformity of the grain size and the vertical stratification of channel bed material. A new relation for computing bedload transport rates in gravel-bed streams is proposed here. In an effort to account for the variation of the makeup of the surface material within a wide range of Shields stresses, the relation employs a two-parameter approach, one related to the material in the pavement and the other to that in the subpavement layers. The mode is used to represent the grain sizes of each layer. Available bedload transport data from gravel-bed streams with unimodal sediment are used to test the accuracy of the relation. A comparison with other bedload transport relations is also considered.  相似文献   
56.
In this work, we present an end-to-end solution for autonomous water sampling by utilizing an unmanned aerial vehicle (UAV) with a cable-suspended mechanism. Towards this direction, a sampling mechanism is initially designed in such a manner that the water sampling success ratio is maximized. However, the disturbances, acting on the submerged mechanism due to the water flow during the sampling procedure, impede the stabilization of the vehicle above the desired sampling position. Consequently, to achieve the precise hovering of the UAV, the vehicle's sensor suite is further augmented with a load cell, a depth sensor, an ultrasonic sensor, and a camera. The respective measurements are appropriately fused by employing an extended Kalman filter (EKF). Hence, an estimate of the disturbances is available in real-time and is incorporated into a Model Predictive Control scheme which compensates for the aforementioned disturbances and stabilizes the vehicle above the sampling location. Finally, a complete water sampling mission entails the safe and swing-free transportation of the mechanism towards the sampling location and, then, to a position where the collected samples are postprocessed by human operators. Consequently, a model predictive controller is employed which ensures the navigation of the vehicle to the desired waypoints while minimizing the swinging motion of the mechanism. The state of the mechanism is obtained by fusing measurements provided by the load cell and the camera with an EKF. The performance of the proposed framework, which aims to address all the aspects of a water sampling mission, is demonstrated through real experiments with an octorotor.  相似文献   
57.
This paper proposes a visual representation named scene tunnel for capturing urban scenes along routes and visualizing them on the Internet. We scan scenes with multiple cameras or a fish-eye camera on a moving vehicle, which generates a real scene archive along streets that is more complete than previously proposed route panoramas. Using a translating spherical eye, properly set planes of scanning, and unique parallel-central projection, we explore the image acquisition of the scene tunnel from camera selection and alignment, slit calculation, scene scanning, to image integration. The scene tunnels cover high buildings, ground, and various viewing directions and have uniformed resolutions along the street. The sequentially organized scene tunnel benefits texture mapping onto the urban models. We analyze the shape characteristics in the scene tunnels for designing visualization algorithms. After combining this with a global panorama and forward image caps, the capped scene tunnels can provide continuous views directly for virtual or real navigation in a city. We render scene tunnel dynamically by view warping, fast transmission, and flexible interaction. The compact and continuous scene tunnel facilitates model construction, data streaming, and seamless route traversing on the Internet and mobile devices.  相似文献   
58.
This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm. Our objectives are to explore a given geographic region by detecting and aggregating spatio-temporal events of interest and to store these events in the network until the user requests them. Such a setting finds applications in mobile environments where the user (i.e., the sink) is infrequently within communication range from the field deployment. Our framework, coined SenseSwarm, dynamically partitions the sensing devices into perimeter and core nodes. Data acquisition is scheduled at the perimeter, in order to minimize energy consumption, while storage and replication takes place at the core nodes which are physically and logically shielded to threats and obstacles. To efficiently identify the nodes laying on the perimeter of the swarm we devise the Perimeter Algorithm (PA), an efficient distributed algorithm with a low communication complexity. For storage and fault-tolerance we devise the Data Replication Algorithm (DRA), a voting-based replication scheme that enables the exact retrieval of values from the network in cases of failures. We also extend DRA with a spatio-temporal in-network aggregation scheme based on minimum bounding rectangles to form the Hierarchical-DRA (HDRA) algorithm, which enables the approximate retrieval of events from the network. Our trace-driven experimentation shows that our framework can offer significant energy reductions while maintaining high data availability rates. In particular, we found that when failures across all nodes are less than 60%, our framework can recover over 80% of detected values exactly.  相似文献   
59.
This paper explores the affordances of social technologies for supporting the construction of a shareable artefact by a group of learners. A qualitative study that captures the use of five different types of social technologies (Facebook, blogs, wikis, Google Documents and Dropbox) in three different classroom settings sheds light on the potentials and challenges of these tools for supporting material exploration, artefact construction and evaluation. Qualitative content analysis of instructors’ field notes, students’ and instructors’ reflections, interviews and focus groups sheds light on the potential of social technologies to transform the activity of learning across a new culture of computational tools. The affordances of social technologies are discussed as well as design principles that need to be followed in these new arenas.  相似文献   
60.
This paper proposes a novel approach for the parallel execution of tiled Iteration Spaces onto a cluster of SMP PC nodes. Each SMP node has multiple CPUs and a single memory mapped PCI-SCI Network Interface Card. We apply a hyperplane-based grouping transformation to the tiled space, so as to group together independent neighboring tiles and assign them to the same SMP node. In this way, intranode (intragroup) communication is annihilated. Groups are atomically executed inside each node. Nodes exchange data between successive group computations. We schedule groups much more efficiently by exploiting the inherent overlapping between communication and computation phases among successive atomic group executions. The applied non-blocking schedule resembles a pipelined datapath, where group computation phases are overlapped with communication ones, instead of being interleaved with them. Our experimental results illustrate that the proposed method outperforms previous approaches involving blocking communication or conventional grouping schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号