全文获取类型
收费全文 | 373篇 |
免费 | 5篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 44篇 |
金属工艺 | 24篇 |
机械仪表 | 15篇 |
建筑科学 | 13篇 |
矿业工程 | 1篇 |
能源动力 | 86篇 |
轻工业 | 33篇 |
水利工程 | 2篇 |
石油天然气 | 21篇 |
无线电 | 10篇 |
一般工业技术 | 53篇 |
冶金工业 | 2篇 |
原子能技术 | 6篇 |
自动化技术 | 61篇 |
出版年
2023年 | 2篇 |
2022年 | 6篇 |
2021年 | 5篇 |
2020年 | 16篇 |
2019年 | 11篇 |
2018年 | 8篇 |
2017年 | 12篇 |
2016年 | 24篇 |
2015年 | 20篇 |
2014年 | 24篇 |
2013年 | 40篇 |
2012年 | 11篇 |
2011年 | 21篇 |
2010年 | 22篇 |
2009年 | 18篇 |
2008年 | 9篇 |
2007年 | 13篇 |
2006年 | 15篇 |
2005年 | 14篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 12篇 |
2001年 | 12篇 |
2000年 | 8篇 |
1999年 | 9篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1989年 | 1篇 |
1988年 | 4篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 5篇 |
1981年 | 4篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有381条查询结果,搜索用时 31 毫秒
1.
2.
《Food Control》2015
A diverse range of genetic elements has been used to develop genetically modified organisms (GMOs) over the last 18 years. Screening methods that target few elements, such as the Cauliflower Mosaic Virus 35S promoter (P-35S) and Agrobacterium tumefaciens nopaline terminator (T-nos), are not sufficient to screen GMOs. In the present study, a multiplex PCR system for all globally commercialized GM soybean events was developed to easily trace the events. For this purpose, screening elements of 24 GM soybean events were investigated and 9 screening targets were selected and divided into three individual triplex PCR systems: P-35S, ribulose-1,5-bisphosphate carboxylase small subunit promoter of Arabidopsis thaliana, T-nos, T-35S, pea E9 terminator, open reading frame 23 terminator of A. tumefaciens, proteinase inhibitor II terminator of potato, acetohydroxy acid synthase large subunit terminator of A. thaliana, and the revealed 3′ flanking sequences of DP-305423-1. The specificity of the assays was confirmed using thirteen GM soybean events as the respective positive/negative controls. The limit of detection of each multiplex set, as determined using certified reference materials of specific GM events, ranged from 0.03 to 0.5%, depending upon target. Furthermore, 26 food samples that contained soybean ingredients, which were purchased from the USA, China, Japan, and Korea, were analyzed, 17 of which contained one or more GM soybean events. These results suggest that the developed screening method can be used to efficiently track and identify 24 GM soybean events in food and feed. 相似文献
3.
Anoirel Issa 《Journal in Computer Virology》2012,8(4):141-149
Virtual Machines are important infrastructural tools for malware analysis. They provide safe yet accurate way of evaluating real life behavior and impact of any executable code, thus providing a better understanding of obfuscated or non conventional portions of code within a binary file. Many virtual machines, such as VMware, Qemu, VirtualBox and SandBoxes, are available and are widely adopted by malware researchers and analysts. Moreover, many antivirus scanners have their own implementation of emulators to achieve comparable results by running malicious code within a controlled environment in order to decrypt obfuscated code. Virus writers have always responded to these technologies. Most malware today uses anti-debug techniques to counter analysis and evade antivirus detection. Lately, malware like Zeus/SpyEye and associated families such as Smoaler, Dromedan, Kazy, Yakes, and other malware such as Spyrat or W32.Pilleuz, have deployed techniques to disrupt the use of virtual machines and emulators. These malware families are able to implement different variations of disruption techniques within single samples or within related groups of malware before propagation. This paper will present a study of these anti-emulation and anti-virtual machine techniques. 相似文献
4.
Fides Aarts Harco Kuppens Jan Tretmans Frits Vaandrager Sicco Verwer 《Machine Learning》2014,96(1-2):189-224
Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M R of reference implementation R, which serves as input for a model-based testing tool that checks conformance of implementation I to M R . In addition, we also explore an alternative approach in which we learn a model M I of implementation I, which is compared to model M R using an equivalence checker. Our work uses a unique combination of software tools for model construction (Uppaal), active learning (LearnLib, Tomte), model-based testing (JTorX, TorXakis) and verification (CADP, MRMC). We show how these tools can be used for learning models of and revealing errors in implementations, present the new notion of a conformance oracle, and demonstrate how conformance oracles can be used to speed up conformance checking. 相似文献
5.
Mono-carboxylic, straight-chain fatty acids are present in extracts of lignite and subbituminous coal (0.4–1.0 wt%, daf basis), but not in those of a bituminous coal. They are removed with nearly equal ease by both solvent and supercritical gas (SCG) extraction. Octacosanoic acid is the major constituent, and values of the carbon preference index (even over odd) lie between 2 and 6. Solvent extraction of the coals also removes small quantities (< 0.08 wt%) of straight-chain alkanes which are closely related in composition to the straight-chain fatty acids and are probably derived from them during maturation. However, previous SCG extraction of the coals yielded much larger quantities of straight-chain alkanes (0.3–0.7 wt%). Pyrolysis experiments with a lignite fatty acid fraction and with tetracosanoic acid show that these acids largely survive SCG extraction and, therefore, are not the main source of the relatively large quantity of straight-chain alkanes in these extracts. 相似文献
6.
Sybren de Kinderen Khaled Gaaloul Henderik A. Proper 《Software and Systems Modeling》2014,13(3):1043-1057
The ArchiMate modelling language provides a coherent and a holistic view of an enterprise in terms of its products, services, business processes, actors, business units, software applications and more. Yet, ArchiMate currently lacks (1) expressivity in modelling an enterprise from a value exchange perspective, and (2) rigour and guidelines in modelling business processes that realize the transactions relevant from a value perspective. To address these issues, we show how to connect e \(^{3}\) value, a technique for value modelling, to ArchiMate via transaction patterns from the DEMO methodology. Using ontology alignment techniques, we show a transformation between the meta models underlying e \(^{3}\) value, DEMO and ArchiMate. Furthermore, we present a step-wise approach that shows how this model transformation is achieved and, in doing so, we also show the of such a transformation. We exemplify the transformation of DEMO and e \(^{3}\) value into ArchiMate by means of a case study in the insurance industry. As a proof of concept, we present a software tool supporting our transformation approach. Finally, we discuss the functionalities and limitations of our approach; thereby, we analyze its and practical applicability. 相似文献
7.
We present a categorical logic formulation of induction and coinduction principles for reasoning about inductively and coinductively defined types. Our main results provide sufficient criteria for the validity of such principles: in the presence of comprehension, the induction principle for initial algebras is admissible, and dually, in the presence of quotient types, the coinduction principle for terminal coalgebras is admissible. After giving an alternative formulation of induction in terms of binary relations, we combine both principles and obtain a mixed induction/coinduction principle which allows us to reason about minimal solutionsX≅σ(X) whereXmay occur both positively and negatively in the type constructor σ. We further strengthen these logical principles to deal with contexts and prove that such strengthening is valid when the (abstract) logic we consider is contextually/functionally complete. All the main results follow from a basic result about adjunctions between “categories of algebras” (inserters). 相似文献
8.
Welding simulation is a powerful, cost-efficient tool to predict welding induced distortion. Nevertheless, effects on calculation result quality are often unknown, thus, sensitivity analyses should be performed to evaluate the influences of certain parameters on distortion development.In the present paper, a single-layer gas metal arc (GMA) weld of 5 mm thick structural steel S355J2+N is experimentally and numerically investigated. Subsequent to welding, the numerical modeling begins with a mesh analysis based on modal analyses. Hereby, the influence of different coarsening methods and element edge length (EEL) in welding direction on the deformation behavior or the stiffness of the discrete geometry is the focus of the analysis. Secondly, phase transformations in structural steels such as S355J2+N are decisive for final product properties. The sensitivity of welding-induced distortion is examined regarding different continuous cooling transformation (CCT) diagrams for S355J2+N.The present investigations deal with different relevant influences on numerical calculation of welding-induced distortion. The quality and quantity of these effects are clarified based on the experimental and numerical set-up employed. Consequently, prediction of welding-induced distortion is possible and potential for pre-production optimization is present. 相似文献
9.
10.