首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92篇
  免费   2篇
  国内免费   1篇
电工技术   1篇
化学工业   1篇
金属工艺   4篇
机械仪表   3篇
建筑科学   1篇
能源动力   2篇
轻工业   1篇
石油天然气   12篇
一般工业技术   45篇
冶金工业   2篇
自动化技术   23篇
  2021年   1篇
  2016年   1篇
  2015年   4篇
  2013年   66篇
  2011年   3篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   1篇
  2006年   5篇
  2005年   1篇
  2004年   3篇
  2003年   3篇
  2002年   1篇
  2001年   1篇
排序方式: 共有95条查询结果,搜索用时 15 毫秒
1.
通过对IMAGE仪器MRX站A/D板的电路分析,利用综合测试和分析诊断程序,并借助示波器和万用表,针对不同的故障,找出A/D板产生故障的根源,切实有效地排除故障。  相似文献   
2.
《Advanced Robotics》2013,27(5):499-517
We are developing a helper robot that carries out tasks ordered by users through speech. The robot needs a vision system to recognize the objects appearing in the orders. However, conventional vision systems cannot recognize objects in complex scenes. They may find many objects and cannot determine which is the target. This paper proposes a method of using a conversation with the user to solve this problem. The robot asks a question to which the user can easily answer and whose answer can efficiently reduce the number of candidate objects. It considers the characteristics of features used for object identification such as the ease for humans to specify them by word, generating a user-friendly and efficient sequence of questions. Experimental results show that the robot can detect target objects by asking the questions generated by the method.  相似文献   
3.
The method and techniques employed in the investigation of the pore structure of graphites by serial sectioning combined with kinemicrography are discussed. Some of the simpler problems associated with the working of graphite somples to a good finish and yet with reasonable speed are also reviewed.  相似文献   
4.
The design of a compact high colour temperature source with a substantially continuous wide range spectral emission may be approached in various ways. This paper describes such a source which is finding many applications in a wide variety of investigations.  相似文献   
5.
In this paper, we present a novel method for detecting partial symmetries in very large point clouds of 3D city scans. Unlike previous work, which has only been demonstrated on data sets of a few hundred megabytes maximum, our method scales to very large scenes: We map the detection problem to a nearest‐neighbour problem in a low‐dimensional feature space, and follow this with a cascade of tests for geometric clustering of potential matches. Our algorithm robustly handles noisy real‐world scanner data, obtaining a recognition performance comparable to that of state‐of‐the‐art methods. In practice, it scales linearly with scene size and achieves a high absolute throughput, processing half a terabyte of scanner data overnight on a dual socket commodity PC.  相似文献   
6.
Neutral iodobromide emulsions made by the addition of silver nitrate to alkali halides in gelatin may, under certain conditions, contain a proportion of grains with cores of iodobromide phases. The maximum iodide contents (i) of these cores are related to the precipitation temperature (T) by the empirical equation i= 34.5+0.165(T–25). Grains containing such cores show very regular print-out distribution.  相似文献   
7.
《Advanced Robotics》2013,27(10):1105-1126
The development and expression of many higher-level cognitive functions, such as imitation, spatial perception and tool-use, relies on a multi-modal representation of the body known as the body schema. Although many studies support the hypothesis that the body schema is adaptive and alterable throughout ontogenetic development, the mechanisms underlying its plasticity have yet to be clarified. Here, we argue that the temporal integration of multisensory information is a plausible candidate mechanism to explain how manipulated objects (e.g., tools) can become incorporated into the body schema. To demonstrate the validity of our idea, we introduce a model of body schema adaptation instantiated in a small-sized, table-top, tool-using humanoid. The robot's task is to learn to reach for and touch a visually salient distant object, first with its 'bare' hand and then — using the acquired know-how — with a reach-extending tool (a stick). Our experimental results show that in order to successfully causally relate and integrate vision, touch and proprioception, and to learn to use the tool, timing is of crucial relevance. On a more general note, this study also suggests that synthetic modeling might not only be a valid avenue towards getting a better grasp on results provided by neuropsychology and neurophysiology, but also a powerful approach for building advanced tool-using robots.  相似文献   
8.
目前IMAGE仪器单台带载能力是1ms。3000道、通过主、从方式将它连接起来.使其能够达到1ms,6000道的带载能力,来满足野外大道数采集的要求。本文主要说明两台仪器联机时,硬件的连接方法,讲述了两台仪器连机的工作原理和工作时序关系,且通过室内和野外的试验分析,论述了联接的可靠性,并且在文中给出了该仪器在野外生产时发生的问题和排列方法,使该技术能够在野外生产中得到更广泛的应用。  相似文献   
9.
The photography of small moving particles can only be carried out with small depths of field since magnifications greater than unity must be employed for subsequent accurate analysis. Freely moving particles tend to wander from a straight path, particularly in the presence of strong convection fields, and thus may rapidly move out of focus. In this paper a technique is presented which helps to overcome this problem.  相似文献   
10.
《成像科学杂志》2013,61(5):266-273
Abstract

Because of properties in chaos system such as the sensitive dependence on initial conditions, system parameters, pseudorandom property and ergodicity, chaotic image encryption algorithm can suggest a new and efficient way of encryption scheme, which has been studied more and more in recent years. A novel chaotic image encryption algorithm based on Toeplitz matrix and Hankel matrix is proposed in this paper. We shuffle totally the positions of image pixels to confuse the relationship between the plain image and cipher image combined with Toeplitz matrix, Hankel matrix and logistic chaotic system. Another hyper-chaos system of Chen's chaotic system is taken to change the grey values of image pixels to enhance the security further. Experimental results in Sections 3 and 4 demonstrate that the key space is large enough and the key is sensitive to initial conditions to resist the brute force attack in the proposed algorithm. Additionally, the distribution of grey values in encrypted image has a random-like behaviour to resist statistical analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号