全文获取类型
收费全文 | 77篇 |
免费 | 0篇 |
专业分类
化学工业 | 3篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
轻工业 | 1篇 |
无线电 | 2篇 |
一般工业技术 | 15篇 |
冶金工业 | 44篇 |
自动化技术 | 8篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 1篇 |
2011年 | 2篇 |
2010年 | 1篇 |
2009年 | 4篇 |
2008年 | 4篇 |
2007年 | 4篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 2篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1996年 | 6篇 |
1995年 | 6篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 6篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有77条查询结果,搜索用时 15 毫秒
1.
This paper addresses the problem of defining a simple End-Effector design for a robotic arm that is able to grasp a given set of planar objects. The OCOG (Objects COmmon Grasp search) algorithm proposed in this paper searches for a common grasp over the set of objects mapping all possible grasps for each object that satisfy force closure and quality criteria by taking into account the external wrenches (forces and torque) applied to the object. The mapped grasps are represented by feature vectors in a high-dimensional space. This feature vector describes the design of the gripper. A database is generated for all possible grasps for each object in the feature vector space. A search algorithm is then used for intersecting all possible grasps over all parts and finding a common grasp suitable for all objects. The search algorithm utilizes the kd-tree index structure for representing the database of the sets of feature vectors. The kd-tree structure enables an efficient and low cost nearest-neighbor search for common vectors between the sets. Each common vector found (feature vector) is the grasp configuration for a group of objects, which implies the future end-effector design. The final step classifies the grasps found to subsets of the objects, according to the common vectors found. Simulations and experiments are presented for four objects to validate the feasibility of the proposed algorithm. The algorithm will be useful for standardization of end-effector design and reducing its engineering time. 相似文献
2.
The relation between reflexive and voluntary orienting of visual attention was investigated with 4 experiments: a simple detection task, a localization task, a saccade toward the target task, and a target identification task in which discrimination difficulty was manipulated. Endogenous and exogenous orienting cues were presented in each trial and their validity was manipulated orthogonally to examine whether attention mechanisms are mediated by separate systems and whether they have additive and independent effects on visual detection and discrimination. The results showed that each orienting mechanism developed its typical and independent effect in every case except for the difficult identification task. A theoretical framework for understanding the relationship between endogenous and exogenous orienting of attention is proposed, tested, and confirmed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
3.
Lior Miller Amir Avishai Wayne D. Kaplan 《Journal of the American Ceramic Society》2006,89(1):350-353
The solubility of Mg in alumina was measured using wavelength-dispersive spectroscopy mounted on a scanning electron microscope. Careful calibration of the microscope's working conditions was performed in order to optimize the detection limit and accuracy. Measurements were conducted on water-quenched and furnace-cooled samples, without any thermal or chemical etching to avoid alteration of the bulk concentration. The results indicate the solubility limit of Mg in alumina to be 132±11 ppm at 1600°C. 相似文献
4.
5.
6.
The IEEE 802.11 Wireless LAN standard has been designed with very limited key management capabilities, using up to 4 static,
long term, keys, shared by all the stations on the LAN. This design makes it quite difficult to fully revoke access from previously-authorized
hosts. A host is fully revoked when it can no longer eavesdrop and decrypt traffic generated by other hosts on the wireless LAN.
This paper proposes WEP*, a lightweight solution to the host-revocation problem. The key management in WEP* is in the style
of pay-TV systems: The Access Point periodically generates new keys, and these keys are transferred to the hosts at authentication
time. The fact that the keys are only valid for one re-key period makes host revocation possible, and scalable: A revoked
host will simply not receive the new keys.
Clearly, WEP* is not an ideal solution, and does not address all the security problems that IEEE 802.11 suffers from. However,
what makes WEP* worthwhile is that it is 100% compatible with the existing standard. And, unlike other solutions, WEP* does not rely on external authentication servers. Therefore, WEP* is suitable
for use even in the most basic IEEE 802.11 LAN configurations, such as those deployed in small or home offices. A WEP* prototype
has been partially implemented using free, open-source tools.
Avishai Wool received a B.Sc. (Cum Laude) in Mathematics and Computer Science from Tel Aviv University, Israel, in 1989. He received an
M.Sc. and Ph.D. in Computer Science from the Weizmann Institute of Science, Israel, in 1992 and 1997, respectively. Dr. Wool
then spent three years as a Member of Technical Staff at Bell Laboratories, Murray Hill, NJ, USA. In 2000 Dr. Wool co-founded
Lumeta corporation, a startup company specializing in network security. Since 2002 Dr. Wool has been an Assistant Professor
at the Department of Electrical Engineering Systems, Tel Aviv University, Israel.
Dr. Wool is the creator of the Lumeta Firewall Analyzer. He is an associate editor of the ACM Transactions on Information
and System Security. He has served on the program committee of the leading IEEE and ACM conferences on computer and network
security. He is a member of the ACM, IEEE Computer Society, and USENIX. His research interests include firewall technology,
network and wireless security, data communication networks, and distributed computing. 相似文献
7.
Henik Avishai; Ro Tony; Merrill David; Rafal Robert; Safadi Ziad 《Canadian Metallurgical Quarterly》1999,25(1):198
To examine interactions between color and word attributes, participants responded, either manually or vocally, to a central target (color patch or word) flanked by a Stroop stimulus. Color and word attributes of the flanker affected both vocal and manual responding to color patches. Color and word flankers also affected manual responding to word targets, but only word flanker affected vocal responding to word targets. These results are not consistent with models (e.g., translational models) of Stroop tasks, which posit that interactions between colors and words occur only when vocal responding is required. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
8.
Rima Dardik Einat Avishai Shadan Lalezari Assaf A. Barg Sarina Levy-Mendelovich Ivan Budnik Ortal Barel Yulia Khavkin Gili Kenet Tami Livnat 《International journal of molecular sciences》2021,22(16)
Introduction: Hemophilia A (HA) is an X-linked bleeding disorder caused by factor VIII (FVIII) deficiency or dysfunction due to F8 gene mutations. HA carriers are usually asymptomatic because their FVIII levels correspond to approximately half of the concentration found in healthy individuals. However, in rare cases, a carrier may exhibit symptoms of moderate to severe HA primarily due to skewed inactivation of her non-hemophilic X chromosome. Aim: The aim of the study was to investigate X-chromosome inactivation (XCI) patterns in HA carriers, with special emphasis on three karyotypically normal HA carriers presenting with moderate to severe HA phenotype due to skewed XCI, in an attempt to elucidate the molecular mechanism underlying skewed XCI in these symptomatic HA carriers. The study was based on the hypothesis that the presence of a pathogenic mutation on the non-hemophilic X chromosome is the cause of extreme inactivation of that X chromosome. Methods: XCI patterns were studied by PCR analysis of the CAG repeat region in the HUMARA gene. HA carriers that demonstrated skewed XCI were further studied by whole-exome sequencing (WES) followed by X chromosome-targeted bioinformatic analysis. Results: All three HA carriers presenting with the moderate to severe HA phenotype due to skewed XCI were found to carry pathogenic mutations on their non-hemophilic X chromosomes. Patient 1 was diagnosed with a frameshift mutation in the PGK1 gene that was associated with familial XCI skewing in three generations. Patient 2 was diagnosed with a missense mutation in the SYTL4 gene that was associated with familial XCI skewing in two generations. Patient 3 was diagnosed with a nonsense mutation in the NKAP gene that was associated with familial XCI skewing in two generations. Conclusion: Our results indicate that the main reason for skewed XCI in our female HA patients was negative selection against cells with a disadvantage caused by an additional deleterious mutation on the silenced X chromosome, thus complicating the phenotype of a monogenic X-linked disease. Based on our study, we are currently offering the X inactivation test to symptomatic hemophilia carriers and plan to expand this approach to symptomatic carriers of other X-linked diseases, which can be further used in pregnancy planning. 相似文献
9.
Ryosuke Saigusa Jenifer Vallejo Rishab Gulati Sujit Silas Armstrong Suthahar Vasantika Suryawanshi Ahmad Alimadadi Jeffrey Makings Christopher P. Durant Antoine Freuchet Payel Roy Yanal Ghosheh William Pandori Tanyaporn Pattarabanjird Fabrizio Drago Angela Taylor Coleen A. McNamara Avishai Shemesh Lewis L. Lanier Catherine C. Hedrick Klaus Ley 《International journal of molecular sciences》2022,23(17)
10.