首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   232篇
  免费   3篇
  国内免费   1篇
电工技术   17篇
综合类   4篇
化学工业   4篇
机械仪表   7篇
建筑科学   3篇
能源动力   49篇
石油天然气   1篇
无线电   19篇
一般工业技术   8篇
冶金工业   1篇
原子能技术   2篇
自动化技术   121篇
  2020年   3篇
  2018年   1篇
  2014年   6篇
  2012年   2篇
  2005年   114篇
  2004年   95篇
  2003年   2篇
  2002年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1994年   1篇
  1992年   1篇
  1990年   3篇
  1984年   3篇
  1980年   1篇
排序方式: 共有236条查询结果,搜索用时 78 毫秒
1.
本文采用LM缝纫性测试仪对不同缝纫工艺下的针织物和机织物缝纫阻力进行了测试.测试了织物层数、织物正反面以及缝纫方向不同时,面料缝纫阻力的大小;测试了不同缝针、缝纫线时的缝纫阻力.实验结果表明:织物的缝纫阻力随织物的层数增加而成倍数以上的增大;机织物在45°角左右缝纫时,缝纫阻力最大;针织物在接近纵行和横列方向,缝纫阻力出现最大值;穿引缝纫线会增大缝纫阻力,但缝纫线对缝纫阻力的增大作用较缝针的作用微弱.同时,实验过程中还发现,针织物的缝纫阻力比机织物的不匀率高,缝针刺到纱线上的概率高,因此针织物不易于缝纫.本论文的研究,希望对服装加工给予帮助,以提高服装质量和服装加工效率.  相似文献   
2.
Teaching meshes, subdivision and multiresolution techniques   总被引:2,自引:0,他引:2  
In recent years, geometry processing algorithms that directly operate on polygonal meshes have become an indispensable tool in computer graphics, CAD/CAM applications, numerical simulations, and medical imaging. Because the demand for people that are specialized in these techniques increases steadily the topic is finding its way into the standard curricula of related lectures on computer graphics and geometric modeling and is often the subject of seminars and presentations. In this article we suggest a toolbox to educators who are planning to set up a lecture or talk about geometry processing for a specific audience. For this we propose a set of teaching blocks, each of which covers a specific subtopic. These teaching blocks can be assembled so as to fit different occasions like lectures, courses, seminars and talks and different audiences like students and industrial practitioners. We also provide examples that can be used to deepen the subject matter and give references to the most relevant work.  相似文献   
3.
The security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for the three aspects of ISMS—asset, threat, and vulnerability.  相似文献   
4.
A GUI for Jess     
The paper describes JessGUI, a graphical user interface developed on top of the Jess expert system shell. The central idea of the JessGUI project was to make building, revising, updating, and testing Jess-based expert systems easier, more flexible, and more user friendly. There are many other expert system building tools providing a rich and comfortable integrated development environment to expert system builders. However, they are all either commercial or proprietary products. Jess and JessGUI are open-source freeware, and yet they are well suited for building even complex expert system applications, both stand-alone and Web-based ones. An important feature of JessGUI is its capability of saving knowledge bases in XML format (in addition to the original Jess format), thus making them potentially easy to interoperate with other knowledge bases on the Internet. Jess and JessGUI are also used as practical knowledge engineering tools to support both introductory and advanced university courses on expert systems. The paper presents design details of JessGUI, explains its links with the underlying Jess knowledge representation and reasoning tools, and shows examples of using JessGUI in expert system development. It also discusses some of the current efforts in extending Jess/JessGUI in order to provide intelligent features originally not supported in Jess.  相似文献   
5.
As the transmission of 3D shape models through Internet becomes more important, the compression issue of shape models gets more critical. While the compressions of topology and geometry have been explored significantly, the same issue for normal vectors has not yet been studied as much as it deserves.

Presented in this paper is an approach to compress the normal vectors of a 3D mesh model using the concept of clustering and relative indexing. The model is assumed to be manifold triangular mesh model with normal vectors associated with vertices. The proposed scheme clusters the normal vectors of given model and the representative normal vector of each cluster is referred to via a mixed use of relative as well as absolute indexing concepts. It turns out that the proposed approach achieves a significant compression ratio (less than 10% of the original VRML model files) without a serious sacrifice of the visual quality.  相似文献   

6.
7.
8.
This paper presents a market-enabling framework where users, content providers and network operators can interact in the seamless, transparent sale and delivery of a wide range of services. The framework allows for dynamic creation, configuration and delivery of services with quality assurance, via automated management of Service Level Agreements (SLAs). We propose an approach relying on a systemic treatment of business, service and network layer issues, which translates into a layered architecture where components belonging to different levels interact on the basis of a mediation paradigm. We use mediation as a generic term for a combination of negotiation, brokerage and state notification, jointly concurring to the realization of the entire life-cycle of a service.  相似文献   
9.
A new optical CO2 sensor based on the overlay of the CO2 induced absorbance change of pH indicator dye α-naphtholphthalein with the fluorescence of tetraphenylporphyrin (TPP) was developed. The observed luminescence intensity from TPP at 655 nm increased with increasing the CO2 concentration. The ratio I100/I0 values of the sensing films consisting of α-naphtholphthalein in ethyl cellulose layer and TPP in polystyrene layer, where I0 and I100 represent the detected luminescence intensities from a layer exposed to 100% nitrogen and 100% CO2, respectively, that the sensitivity of the sensor, are more than 53.9. The response and recovery times of the sensing films consisting of α-naphtholphthalein in ethyl cellulose layer and TPP in polystyrene layer were less than 5 s for switching from nitrogen to CO2, and for switching from CO2 to nitrogen. The signal changes were fully reversible and no hysterisis was observed during the measurements. The highly sensitive optical CO2 sensor based on fluorescence intensity changes of TPP due to the absorption change of α-naphtholphthalein with CO2 was achieved.  相似文献   
10.
Pencil curve detection from visibility data   总被引:1,自引:0,他引:1  
Sang C. Park   《Computer aided design》2005,37(14):703-1498
The trajectory of the ball-center point of a ball-end mill slid along a concave-edge region on a part surface becomes a pencil curve, and the ball-end milling along the pencil curve is called pencil curve machining. Presented in the paper is a procedure for computing pencil curves for 3-axis sculptured surface machining. The proposed algorithm traces pencil curves from an offset triangular mesh having numerous intersections (self-intersections). Since the outer skin of an offset triangular mesh makes the valid CL-surface, pencil curves can be obtained by connecting valid intersections lying on the outer skin of the offset mesh. The underlying concept of the proposed algorithm is that visible intersections are always valid for pencil curves. To obtain the visibility data of intersections, the proposed algorithm uses a graphics board, which performs hidden surface removal at a rate of up to a million polygons per second. Various examples have been tested with implementation of the algorithm, and some examples are presented for illustration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号